Dec 13 15:50:04.561967 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 15:50:04.561980 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 15:50:04.561987 kernel: BIOS-provided physical RAM map: Dec 13 15:50:04.561991 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Dec 13 15:50:04.561994 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Dec 13 15:50:04.561998 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Dec 13 15:50:04.562002 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Dec 13 15:50:04.562006 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Dec 13 15:50:04.562010 kernel: BIOS-e820: [mem 0x0000000040400000-0x0000000081b25fff] usable Dec 13 15:50:04.562014 kernel: BIOS-e820: [mem 0x0000000081b26000-0x0000000081b26fff] ACPI NVS Dec 13 15:50:04.562018 kernel: BIOS-e820: [mem 0x0000000081b27000-0x0000000081b27fff] reserved Dec 13 15:50:04.562022 kernel: BIOS-e820: [mem 0x0000000081b28000-0x000000008afccfff] usable Dec 13 15:50:04.562026 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Dec 13 15:50:04.562030 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Dec 13 15:50:04.562035 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Dec 13 15:50:04.562040 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Dec 13 15:50:04.562044 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Dec 13 15:50:04.562048 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Dec 13 15:50:04.562052 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Dec 13 15:50:04.562056 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Dec 13 15:50:04.562061 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Dec 13 15:50:04.562065 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Dec 13 15:50:04.562069 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Dec 13 15:50:04.562073 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Dec 13 15:50:04.562077 kernel: NX (Execute Disable) protection: active Dec 13 15:50:04.562081 kernel: SMBIOS 3.2.1 present. Dec 13 15:50:04.562086 kernel: DMI: Supermicro SYS-5019C-MR-PH004/X11SCM-F, BIOS 1.9 09/16/2022 Dec 13 15:50:04.562091 kernel: tsc: Detected 3400.000 MHz processor Dec 13 15:50:04.562095 kernel: tsc: Detected 3399.906 MHz TSC Dec 13 15:50:04.562099 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 15:50:04.562104 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 15:50:04.562108 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Dec 13 15:50:04.562112 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 15:50:04.562117 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Dec 13 15:50:04.562121 kernel: Using GB pages for direct mapping Dec 13 15:50:04.562125 kernel: ACPI: Early table checksum verification disabled Dec 13 15:50:04.562130 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Dec 13 15:50:04.562134 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Dec 13 15:50:04.562139 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Dec 13 15:50:04.562143 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Dec 13 15:50:04.562149 kernel: ACPI: FACS 0x000000008C66CF80 000040 Dec 13 15:50:04.562154 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Dec 13 15:50:04.562159 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Dec 13 15:50:04.562164 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Dec 13 15:50:04.562169 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Dec 13 15:50:04.562173 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Dec 13 15:50:04.562178 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Dec 13 15:50:04.562183 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Dec 13 15:50:04.562187 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Dec 13 15:50:04.562192 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Dec 13 15:50:04.562197 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Dec 13 15:50:04.562202 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Dec 13 15:50:04.562207 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Dec 13 15:50:04.562211 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Dec 13 15:50:04.562216 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Dec 13 15:50:04.562220 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Dec 13 15:50:04.562225 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Dec 13 15:50:04.562230 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Dec 13 15:50:04.562235 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Dec 13 15:50:04.562240 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Dec 13 15:50:04.562244 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Dec 13 15:50:04.562249 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Dec 13 15:50:04.562253 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Dec 13 15:50:04.562258 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Dec 13 15:50:04.562263 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Dec 13 15:50:04.562267 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Dec 13 15:50:04.562272 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Dec 13 15:50:04.562277 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Dec 13 15:50:04.562282 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Dec 13 15:50:04.562287 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Dec 13 15:50:04.562291 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Dec 13 15:50:04.562296 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Dec 13 15:50:04.562301 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Dec 13 15:50:04.562305 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Dec 13 15:50:04.562310 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Dec 13 15:50:04.562315 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Dec 13 15:50:04.562320 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Dec 13 15:50:04.562324 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Dec 13 15:50:04.562329 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Dec 13 15:50:04.562333 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Dec 13 15:50:04.562338 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Dec 13 15:50:04.562343 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Dec 13 15:50:04.562347 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Dec 13 15:50:04.562352 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Dec 13 15:50:04.562357 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Dec 13 15:50:04.562362 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Dec 13 15:50:04.562366 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Dec 13 15:50:04.562371 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Dec 13 15:50:04.562376 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Dec 13 15:50:04.562380 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Dec 13 15:50:04.562385 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Dec 13 15:50:04.562389 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Dec 13 15:50:04.562394 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Dec 13 15:50:04.562399 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Dec 13 15:50:04.562404 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Dec 13 15:50:04.562409 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Dec 13 15:50:04.562413 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Dec 13 15:50:04.562418 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Dec 13 15:50:04.562422 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Dec 13 15:50:04.562427 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Dec 13 15:50:04.562432 kernel: No NUMA configuration found Dec 13 15:50:04.562436 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Dec 13 15:50:04.562442 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Dec 13 15:50:04.562446 kernel: Zone ranges: Dec 13 15:50:04.562451 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 15:50:04.562456 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Dec 13 15:50:04.562460 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Dec 13 15:50:04.562465 kernel: Movable zone start for each node Dec 13 15:50:04.562469 kernel: Early memory node ranges Dec 13 15:50:04.562474 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Dec 13 15:50:04.562479 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Dec 13 15:50:04.562486 kernel: node 0: [mem 0x0000000040400000-0x0000000081b25fff] Dec 13 15:50:04.562491 kernel: node 0: [mem 0x0000000081b28000-0x000000008afccfff] Dec 13 15:50:04.562496 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Dec 13 15:50:04.562500 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Dec 13 15:50:04.562505 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Dec 13 15:50:04.562510 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Dec 13 15:50:04.562514 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 15:50:04.562522 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Dec 13 15:50:04.562528 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Dec 13 15:50:04.562533 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Dec 13 15:50:04.562538 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Dec 13 15:50:04.562543 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Dec 13 15:50:04.562549 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Dec 13 15:50:04.562554 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Dec 13 15:50:04.562559 kernel: ACPI: PM-Timer IO Port: 0x1808 Dec 13 15:50:04.562564 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Dec 13 15:50:04.562568 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Dec 13 15:50:04.562573 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Dec 13 15:50:04.562579 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Dec 13 15:50:04.562584 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Dec 13 15:50:04.562589 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Dec 13 15:50:04.562594 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Dec 13 15:50:04.562599 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Dec 13 15:50:04.562604 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Dec 13 15:50:04.562608 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Dec 13 15:50:04.562613 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Dec 13 15:50:04.562618 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Dec 13 15:50:04.562624 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Dec 13 15:50:04.562629 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Dec 13 15:50:04.562634 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Dec 13 15:50:04.562639 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Dec 13 15:50:04.562644 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Dec 13 15:50:04.562649 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 15:50:04.562654 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 15:50:04.562659 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 15:50:04.562663 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Dec 13 15:50:04.562669 kernel: TSC deadline timer available Dec 13 15:50:04.562674 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Dec 13 15:50:04.562679 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Dec 13 15:50:04.562684 kernel: Booting paravirtualized kernel on bare hardware Dec 13 15:50:04.562689 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 15:50:04.562694 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Dec 13 15:50:04.562699 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Dec 13 15:50:04.562704 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Dec 13 15:50:04.562709 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Dec 13 15:50:04.562715 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Dec 13 15:50:04.562720 kernel: Policy zone: Normal Dec 13 15:50:04.562725 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 15:50:04.562730 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 15:50:04.562735 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Dec 13 15:50:04.562740 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Dec 13 15:50:04.562745 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 15:50:04.562751 kernel: Memory: 32722604K/33452980K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 730116K reserved, 0K cma-reserved) Dec 13 15:50:04.562756 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Dec 13 15:50:04.562761 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 15:50:04.562766 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 15:50:04.562771 kernel: rcu: Hierarchical RCU implementation. Dec 13 15:50:04.562777 kernel: rcu: RCU event tracing is enabled. Dec 13 15:50:04.562782 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Dec 13 15:50:04.562787 kernel: Rude variant of Tasks RCU enabled. Dec 13 15:50:04.562792 kernel: Tracing variant of Tasks RCU enabled. Dec 13 15:50:04.562797 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 15:50:04.562802 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Dec 13 15:50:04.562807 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Dec 13 15:50:04.562812 kernel: random: crng init done Dec 13 15:50:04.562817 kernel: Console: colour dummy device 80x25 Dec 13 15:50:04.562822 kernel: printk: console [tty0] enabled Dec 13 15:50:04.562827 kernel: printk: console [ttyS1] enabled Dec 13 15:50:04.562832 kernel: ACPI: Core revision 20210730 Dec 13 15:50:04.562837 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Dec 13 15:50:04.562842 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 15:50:04.562848 kernel: DMAR: Host address width 39 Dec 13 15:50:04.562853 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Dec 13 15:50:04.562858 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Dec 13 15:50:04.562863 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Dec 13 15:50:04.562868 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Dec 13 15:50:04.562873 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Dec 13 15:50:04.562878 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Dec 13 15:50:04.562883 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Dec 13 15:50:04.562888 kernel: x2apic enabled Dec 13 15:50:04.562893 kernel: Switched APIC routing to cluster x2apic. Dec 13 15:50:04.562898 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Dec 13 15:50:04.562903 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Dec 13 15:50:04.562908 kernel: CPU0: Thermal monitoring enabled (TM1) Dec 13 15:50:04.562913 kernel: process: using mwait in idle threads Dec 13 15:50:04.562918 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Dec 13 15:50:04.562923 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Dec 13 15:50:04.562928 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 15:50:04.562933 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Dec 13 15:50:04.562939 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Dec 13 15:50:04.562944 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Dec 13 15:50:04.562948 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Dec 13 15:50:04.562953 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 15:50:04.562958 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Dec 13 15:50:04.562963 kernel: RETBleed: Mitigation: Enhanced IBRS Dec 13 15:50:04.562968 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 15:50:04.562973 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 15:50:04.562978 kernel: TAA: Mitigation: TSX disabled Dec 13 15:50:04.562983 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Dec 13 15:50:04.562988 kernel: SRBDS: Mitigation: Microcode Dec 13 15:50:04.562993 kernel: GDS: Vulnerable: No microcode Dec 13 15:50:04.562998 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 15:50:04.563003 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 15:50:04.563008 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 15:50:04.563013 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Dec 13 15:50:04.563018 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Dec 13 15:50:04.563023 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 15:50:04.563027 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Dec 13 15:50:04.563032 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Dec 13 15:50:04.563037 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Dec 13 15:50:04.563042 kernel: Freeing SMP alternatives memory: 32K Dec 13 15:50:04.563048 kernel: pid_max: default: 32768 minimum: 301 Dec 13 15:50:04.563053 kernel: LSM: Security Framework initializing Dec 13 15:50:04.563057 kernel: SELinux: Initializing. Dec 13 15:50:04.563062 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 15:50:04.563067 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 15:50:04.563072 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Dec 13 15:50:04.563077 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Dec 13 15:50:04.563082 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Dec 13 15:50:04.563087 kernel: ... version: 4 Dec 13 15:50:04.563092 kernel: ... bit width: 48 Dec 13 15:50:04.563097 kernel: ... generic registers: 4 Dec 13 15:50:04.563103 kernel: ... value mask: 0000ffffffffffff Dec 13 15:50:04.563108 kernel: ... max period: 00007fffffffffff Dec 13 15:50:04.563112 kernel: ... fixed-purpose events: 3 Dec 13 15:50:04.563117 kernel: ... event mask: 000000070000000f Dec 13 15:50:04.563122 kernel: signal: max sigframe size: 2032 Dec 13 15:50:04.563127 kernel: rcu: Hierarchical SRCU implementation. Dec 13 15:50:04.563132 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Dec 13 15:50:04.563137 kernel: smp: Bringing up secondary CPUs ... Dec 13 15:50:04.563142 kernel: x86: Booting SMP configuration: Dec 13 15:50:04.563148 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Dec 13 15:50:04.563153 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Dec 13 15:50:04.563158 kernel: #9 #10 #11 #12 #13 #14 #15 Dec 13 15:50:04.563163 kernel: smp: Brought up 1 node, 16 CPUs Dec 13 15:50:04.563168 kernel: smpboot: Max logical packages: 1 Dec 13 15:50:04.563173 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Dec 13 15:50:04.563178 kernel: devtmpfs: initialized Dec 13 15:50:04.563183 kernel: x86/mm: Memory block size: 128MB Dec 13 15:50:04.563188 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x81b26000-0x81b26fff] (4096 bytes) Dec 13 15:50:04.563194 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Dec 13 15:50:04.563199 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 15:50:04.563204 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Dec 13 15:50:04.563209 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 15:50:04.563214 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 15:50:04.563218 kernel: audit: initializing netlink subsys (disabled) Dec 13 15:50:04.563223 kernel: audit: type=2000 audit(1734104999.041:1): state=initialized audit_enabled=0 res=1 Dec 13 15:50:04.563228 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 15:50:04.563234 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 15:50:04.563239 kernel: cpuidle: using governor menu Dec 13 15:50:04.563244 kernel: ACPI: bus type PCI registered Dec 13 15:50:04.563249 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 15:50:04.563254 kernel: dca service started, version 1.12.1 Dec 13 15:50:04.563259 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Dec 13 15:50:04.563264 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Dec 13 15:50:04.563269 kernel: PCI: Using configuration type 1 for base access Dec 13 15:50:04.563274 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Dec 13 15:50:04.563279 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 15:50:04.563284 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 15:50:04.563289 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 15:50:04.563294 kernel: ACPI: Added _OSI(Module Device) Dec 13 15:50:04.563299 kernel: ACPI: Added _OSI(Processor Device) Dec 13 15:50:04.563304 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 15:50:04.563309 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 15:50:04.563314 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 15:50:04.563319 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 15:50:04.563325 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 15:50:04.563330 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Dec 13 15:50:04.563334 kernel: ACPI: Dynamic OEM Table Load: Dec 13 15:50:04.563339 kernel: ACPI: SSDT 0xFFFF9A7DC0219C00 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Dec 13 15:50:04.563345 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Dec 13 15:50:04.563349 kernel: ACPI: Dynamic OEM Table Load: Dec 13 15:50:04.563354 kernel: ACPI: SSDT 0xFFFF9A7DC1AE6000 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Dec 13 15:50:04.563359 kernel: ACPI: Dynamic OEM Table Load: Dec 13 15:50:04.563364 kernel: ACPI: SSDT 0xFFFF9A7DC1A59000 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Dec 13 15:50:04.563369 kernel: ACPI: Dynamic OEM Table Load: Dec 13 15:50:04.563375 kernel: ACPI: SSDT 0xFFFF9A7DC1B4A000 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Dec 13 15:50:04.563379 kernel: ACPI: Dynamic OEM Table Load: Dec 13 15:50:04.563384 kernel: ACPI: SSDT 0xFFFF9A7DC014E000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Dec 13 15:50:04.563389 kernel: ACPI: Dynamic OEM Table Load: Dec 13 15:50:04.563394 kernel: ACPI: SSDT 0xFFFF9A7DC1AE5000 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Dec 13 15:50:04.563399 kernel: ACPI: Interpreter enabled Dec 13 15:50:04.563404 kernel: ACPI: PM: (supports S0 S5) Dec 13 15:50:04.563409 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 15:50:04.563414 kernel: HEST: Enabling Firmware First mode for corrected errors. Dec 13 15:50:04.563420 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Dec 13 15:50:04.563424 kernel: HEST: Table parsing has been initialized. Dec 13 15:50:04.563429 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Dec 13 15:50:04.563434 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 15:50:04.563439 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Dec 13 15:50:04.563444 kernel: ACPI: PM: Power Resource [USBC] Dec 13 15:50:04.563449 kernel: ACPI: PM: Power Resource [V0PR] Dec 13 15:50:04.563454 kernel: ACPI: PM: Power Resource [V1PR] Dec 13 15:50:04.563459 kernel: ACPI: PM: Power Resource [V2PR] Dec 13 15:50:04.563465 kernel: ACPI: PM: Power Resource [WRST] Dec 13 15:50:04.563470 kernel: ACPI: PM: Power Resource [FN00] Dec 13 15:50:04.563474 kernel: ACPI: PM: Power Resource [FN01] Dec 13 15:50:04.563479 kernel: ACPI: PM: Power Resource [FN02] Dec 13 15:50:04.563486 kernel: ACPI: PM: Power Resource [FN03] Dec 13 15:50:04.563491 kernel: ACPI: PM: Power Resource [FN04] Dec 13 15:50:04.563496 kernel: ACPI: PM: Power Resource [PIN] Dec 13 15:50:04.563501 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Dec 13 15:50:04.563565 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 15:50:04.563613 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Dec 13 15:50:04.563656 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Dec 13 15:50:04.563663 kernel: PCI host bridge to bus 0000:00 Dec 13 15:50:04.563706 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 15:50:04.563744 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 15:50:04.563782 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 15:50:04.563819 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Dec 13 15:50:04.563856 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Dec 13 15:50:04.563893 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Dec 13 15:50:04.563943 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Dec 13 15:50:04.563994 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Dec 13 15:50:04.564039 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Dec 13 15:50:04.564084 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Dec 13 15:50:04.564130 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Dec 13 15:50:04.564175 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Dec 13 15:50:04.564218 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Dec 13 15:50:04.564266 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Dec 13 15:50:04.564308 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Dec 13 15:50:04.564353 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Dec 13 15:50:04.564400 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Dec 13 15:50:04.564443 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Dec 13 15:50:04.564487 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Dec 13 15:50:04.564533 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Dec 13 15:50:04.564576 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Dec 13 15:50:04.564622 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Dec 13 15:50:04.564667 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Dec 13 15:50:04.564711 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Dec 13 15:50:04.564754 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Dec 13 15:50:04.564795 kernel: pci 0000:00:16.0: PME# supported from D3hot Dec 13 15:50:04.564841 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Dec 13 15:50:04.564883 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Dec 13 15:50:04.564924 kernel: pci 0000:00:16.1: PME# supported from D3hot Dec 13 15:50:04.564972 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Dec 13 15:50:04.565014 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Dec 13 15:50:04.565056 kernel: pci 0000:00:16.4: PME# supported from D3hot Dec 13 15:50:04.565101 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Dec 13 15:50:04.565144 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Dec 13 15:50:04.565188 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Dec 13 15:50:04.565235 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Dec 13 15:50:04.565280 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Dec 13 15:50:04.565321 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Dec 13 15:50:04.565364 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Dec 13 15:50:04.565405 kernel: pci 0000:00:17.0: PME# supported from D3hot Dec 13 15:50:04.565452 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Dec 13 15:50:04.565498 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Dec 13 15:50:04.565544 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Dec 13 15:50:04.565589 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Dec 13 15:50:04.565637 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Dec 13 15:50:04.565680 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Dec 13 15:50:04.565726 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Dec 13 15:50:04.565770 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Dec 13 15:50:04.565819 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Dec 13 15:50:04.565863 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Dec 13 15:50:04.565910 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Dec 13 15:50:04.565953 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Dec 13 15:50:04.566000 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Dec 13 15:50:04.566044 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Dec 13 15:50:04.566088 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Dec 13 15:50:04.566130 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Dec 13 15:50:04.566177 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Dec 13 15:50:04.566219 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Dec 13 15:50:04.566271 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Dec 13 15:50:04.566315 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Dec 13 15:50:04.566360 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Dec 13 15:50:04.566403 kernel: pci 0000:01:00.0: PME# supported from D3cold Dec 13 15:50:04.566446 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Dec 13 15:50:04.566494 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Dec 13 15:50:04.566541 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Dec 13 15:50:04.566588 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Dec 13 15:50:04.566632 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Dec 13 15:50:04.566677 kernel: pci 0000:01:00.1: PME# supported from D3cold Dec 13 15:50:04.566735 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Dec 13 15:50:04.566778 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Dec 13 15:50:04.566821 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Dec 13 15:50:04.566863 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Dec 13 15:50:04.566906 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Dec 13 15:50:04.566949 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Dec 13 15:50:04.566997 kernel: pci 0000:03:00.0: working around ROM BAR overlap defect Dec 13 15:50:04.567040 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Dec 13 15:50:04.567083 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Dec 13 15:50:04.567126 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Dec 13 15:50:04.567169 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Dec 13 15:50:04.567211 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Dec 13 15:50:04.567256 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Dec 13 15:50:04.567298 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Dec 13 15:50:04.567340 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Dec 13 15:50:04.567386 kernel: pci 0000:04:00.0: working around ROM BAR overlap defect Dec 13 15:50:04.567430 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Dec 13 15:50:04.567472 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Dec 13 15:50:04.567562 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Dec 13 15:50:04.567607 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Dec 13 15:50:04.567649 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Dec 13 15:50:04.567692 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Dec 13 15:50:04.567734 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Dec 13 15:50:04.567776 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Dec 13 15:50:04.567818 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Dec 13 15:50:04.567865 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Dec 13 15:50:04.567910 kernel: pci 0000:06:00.0: enabling Extended Tags Dec 13 15:50:04.567954 kernel: pci 0000:06:00.0: supports D1 D2 Dec 13 15:50:04.567996 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 15:50:04.568037 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Dec 13 15:50:04.568079 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Dec 13 15:50:04.568120 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Dec 13 15:50:04.568168 kernel: pci_bus 0000:07: extended config space not accessible Dec 13 15:50:04.568250 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Dec 13 15:50:04.568322 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Dec 13 15:50:04.568368 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Dec 13 15:50:04.568413 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Dec 13 15:50:04.568458 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 15:50:04.568544 kernel: pci 0000:07:00.0: supports D1 D2 Dec 13 15:50:04.568589 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 15:50:04.568632 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Dec 13 15:50:04.568677 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Dec 13 15:50:04.568721 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Dec 13 15:50:04.568729 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Dec 13 15:50:04.568735 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Dec 13 15:50:04.568740 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Dec 13 15:50:04.568745 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Dec 13 15:50:04.568750 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Dec 13 15:50:04.568756 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Dec 13 15:50:04.568761 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Dec 13 15:50:04.568768 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Dec 13 15:50:04.568773 kernel: iommu: Default domain type: Translated Dec 13 15:50:04.568778 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 15:50:04.568822 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Dec 13 15:50:04.568868 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 15:50:04.568912 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Dec 13 15:50:04.568919 kernel: vgaarb: loaded Dec 13 15:50:04.568925 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 15:50:04.568931 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 15:50:04.568937 kernel: PTP clock support registered Dec 13 15:50:04.568942 kernel: PCI: Using ACPI for IRQ routing Dec 13 15:50:04.568947 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 15:50:04.568952 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Dec 13 15:50:04.568957 kernel: e820: reserve RAM buffer [mem 0x81b26000-0x83ffffff] Dec 13 15:50:04.568962 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Dec 13 15:50:04.568967 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Dec 13 15:50:04.568972 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Dec 13 15:50:04.568978 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Dec 13 15:50:04.568983 kernel: clocksource: Switched to clocksource tsc-early Dec 13 15:50:04.568988 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 15:50:04.568994 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 15:50:04.568999 kernel: pnp: PnP ACPI init Dec 13 15:50:04.569042 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Dec 13 15:50:04.569084 kernel: pnp 00:02: [dma 0 disabled] Dec 13 15:50:04.569125 kernel: pnp 00:03: [dma 0 disabled] Dec 13 15:50:04.569170 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Dec 13 15:50:04.569207 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Dec 13 15:50:04.569248 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Dec 13 15:50:04.569288 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Dec 13 15:50:04.569326 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Dec 13 15:50:04.569362 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Dec 13 15:50:04.569401 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Dec 13 15:50:04.569437 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Dec 13 15:50:04.569474 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Dec 13 15:50:04.569557 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Dec 13 15:50:04.569594 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Dec 13 15:50:04.569634 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Dec 13 15:50:04.569672 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Dec 13 15:50:04.569712 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Dec 13 15:50:04.569748 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Dec 13 15:50:04.569786 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Dec 13 15:50:04.569822 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Dec 13 15:50:04.569859 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Dec 13 15:50:04.569901 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Dec 13 15:50:04.569908 kernel: pnp: PnP ACPI: found 10 devices Dec 13 15:50:04.569915 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 15:50:04.569921 kernel: NET: Registered PF_INET protocol family Dec 13 15:50:04.569926 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 15:50:04.569931 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 15:50:04.569937 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 15:50:04.569943 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 15:50:04.569948 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Dec 13 15:50:04.569953 kernel: TCP: Hash tables configured (established 262144 bind 65536) Dec 13 15:50:04.569958 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Dec 13 15:50:04.569964 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Dec 13 15:50:04.569970 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 15:50:04.569975 kernel: NET: Registered PF_XDP protocol family Dec 13 15:50:04.570016 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Dec 13 15:50:04.570059 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Dec 13 15:50:04.570100 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Dec 13 15:50:04.570145 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Dec 13 15:50:04.570188 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Dec 13 15:50:04.570233 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Dec 13 15:50:04.570276 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Dec 13 15:50:04.570318 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Dec 13 15:50:04.570361 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Dec 13 15:50:04.570401 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Dec 13 15:50:04.570444 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Dec 13 15:50:04.570511 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Dec 13 15:50:04.570555 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Dec 13 15:50:04.570597 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Dec 13 15:50:04.570639 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Dec 13 15:50:04.570681 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Dec 13 15:50:04.570723 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Dec 13 15:50:04.570766 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Dec 13 15:50:04.570811 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Dec 13 15:50:04.570856 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Dec 13 15:50:04.570899 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Dec 13 15:50:04.570942 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Dec 13 15:50:04.570985 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Dec 13 15:50:04.571028 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Dec 13 15:50:04.571066 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Dec 13 15:50:04.571103 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 15:50:04.571141 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 15:50:04.571179 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 15:50:04.571216 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Dec 13 15:50:04.571252 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Dec 13 15:50:04.571295 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Dec 13 15:50:04.571336 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Dec 13 15:50:04.571381 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Dec 13 15:50:04.571423 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Dec 13 15:50:04.571465 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Dec 13 15:50:04.571508 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Dec 13 15:50:04.571551 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Dec 13 15:50:04.571591 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Dec 13 15:50:04.571632 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Dec 13 15:50:04.571673 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Dec 13 15:50:04.571681 kernel: PCI: CLS 64 bytes, default 64 Dec 13 15:50:04.571687 kernel: DMAR: No ATSR found Dec 13 15:50:04.571692 kernel: DMAR: No SATC found Dec 13 15:50:04.571698 kernel: DMAR: dmar0: Using Queued invalidation Dec 13 15:50:04.571741 kernel: pci 0000:00:00.0: Adding to iommu group 0 Dec 13 15:50:04.571784 kernel: pci 0000:00:01.0: Adding to iommu group 1 Dec 13 15:50:04.571827 kernel: pci 0000:00:08.0: Adding to iommu group 2 Dec 13 15:50:04.571869 kernel: pci 0000:00:12.0: Adding to iommu group 3 Dec 13 15:50:04.571914 kernel: pci 0000:00:14.0: Adding to iommu group 4 Dec 13 15:50:04.571956 kernel: pci 0000:00:14.2: Adding to iommu group 4 Dec 13 15:50:04.571998 kernel: pci 0000:00:15.0: Adding to iommu group 5 Dec 13 15:50:04.572039 kernel: pci 0000:00:15.1: Adding to iommu group 5 Dec 13 15:50:04.572081 kernel: pci 0000:00:16.0: Adding to iommu group 6 Dec 13 15:50:04.572123 kernel: pci 0000:00:16.1: Adding to iommu group 6 Dec 13 15:50:04.572164 kernel: pci 0000:00:16.4: Adding to iommu group 6 Dec 13 15:50:04.572206 kernel: pci 0000:00:17.0: Adding to iommu group 7 Dec 13 15:50:04.572248 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Dec 13 15:50:04.572292 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Dec 13 15:50:04.572334 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Dec 13 15:50:04.572376 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Dec 13 15:50:04.572419 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Dec 13 15:50:04.572460 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Dec 13 15:50:04.572505 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Dec 13 15:50:04.572547 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Dec 13 15:50:04.572590 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Dec 13 15:50:04.572637 kernel: pci 0000:01:00.0: Adding to iommu group 1 Dec 13 15:50:04.572681 kernel: pci 0000:01:00.1: Adding to iommu group 1 Dec 13 15:50:04.572724 kernel: pci 0000:03:00.0: Adding to iommu group 15 Dec 13 15:50:04.572769 kernel: pci 0000:04:00.0: Adding to iommu group 16 Dec 13 15:50:04.572812 kernel: pci 0000:06:00.0: Adding to iommu group 17 Dec 13 15:50:04.572858 kernel: pci 0000:07:00.0: Adding to iommu group 17 Dec 13 15:50:04.572866 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Dec 13 15:50:04.572871 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 15:50:04.572878 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Dec 13 15:50:04.572883 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Dec 13 15:50:04.572888 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Dec 13 15:50:04.572894 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Dec 13 15:50:04.572899 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Dec 13 15:50:04.572945 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Dec 13 15:50:04.572953 kernel: Initialise system trusted keyrings Dec 13 15:50:04.572958 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Dec 13 15:50:04.572965 kernel: Key type asymmetric registered Dec 13 15:50:04.572970 kernel: Asymmetric key parser 'x509' registered Dec 13 15:50:04.572975 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 15:50:04.572981 kernel: io scheduler mq-deadline registered Dec 13 15:50:04.572986 kernel: io scheduler kyber registered Dec 13 15:50:04.572991 kernel: io scheduler bfq registered Dec 13 15:50:04.573033 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Dec 13 15:50:04.573078 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Dec 13 15:50:04.573121 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Dec 13 15:50:04.573165 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Dec 13 15:50:04.573207 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Dec 13 15:50:04.573250 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Dec 13 15:50:04.573297 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Dec 13 15:50:04.573305 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Dec 13 15:50:04.573310 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Dec 13 15:50:04.573316 kernel: pstore: Registered erst as persistent store backend Dec 13 15:50:04.573322 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 15:50:04.573327 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 15:50:04.573333 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 15:50:04.573338 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Dec 13 15:50:04.573344 kernel: hpet_acpi_add: no address or irqs in _CRS Dec 13 15:50:04.573387 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Dec 13 15:50:04.573395 kernel: i8042: PNP: No PS/2 controller found. Dec 13 15:50:04.573433 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Dec 13 15:50:04.573474 kernel: rtc_cmos rtc_cmos: registered as rtc0 Dec 13 15:50:04.573516 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-12-13T15:50:03 UTC (1734105003) Dec 13 15:50:04.573555 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Dec 13 15:50:04.573562 kernel: fail to initialize ptp_kvm Dec 13 15:50:04.573568 kernel: intel_pstate: Intel P-state driver initializing Dec 13 15:50:04.573573 kernel: intel_pstate: Disabling energy efficiency optimization Dec 13 15:50:04.573579 kernel: intel_pstate: HWP enabled Dec 13 15:50:04.573584 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Dec 13 15:50:04.573590 kernel: vesafb: scrolling: redraw Dec 13 15:50:04.573596 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Dec 13 15:50:04.573602 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x0000000075aad131, using 768k, total 768k Dec 13 15:50:04.573607 kernel: Console: switching to colour frame buffer device 128x48 Dec 13 15:50:04.573612 kernel: fb0: VESA VGA frame buffer device Dec 13 15:50:04.573618 kernel: NET: Registered PF_INET6 protocol family Dec 13 15:50:04.573623 kernel: Segment Routing with IPv6 Dec 13 15:50:04.573628 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 15:50:04.573634 kernel: NET: Registered PF_PACKET protocol family Dec 13 15:50:04.573639 kernel: Key type dns_resolver registered Dec 13 15:50:04.573645 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Dec 13 15:50:04.573650 kernel: microcode: Microcode Update Driver: v2.2. Dec 13 15:50:04.573656 kernel: IPI shorthand broadcast: enabled Dec 13 15:50:04.573661 kernel: sched_clock: Marking stable (1681069187, 1339834366)->(4465958377, -1445054824) Dec 13 15:50:04.573666 kernel: registered taskstats version 1 Dec 13 15:50:04.573672 kernel: Loading compiled-in X.509 certificates Dec 13 15:50:04.573677 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 15:50:04.573682 kernel: Key type .fscrypt registered Dec 13 15:50:04.573687 kernel: Key type fscrypt-provisioning registered Dec 13 15:50:04.573693 kernel: pstore: Using crash dump compression: deflate Dec 13 15:50:04.573699 kernel: ima: Allocated hash algorithm: sha1 Dec 13 15:50:04.573704 kernel: ima: No architecture policies found Dec 13 15:50:04.573709 kernel: clk: Disabling unused clocks Dec 13 15:50:04.573715 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 15:50:04.573720 kernel: Write protecting the kernel read-only data: 28672k Dec 13 15:50:04.573744 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 15:50:04.573750 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 15:50:04.573755 kernel: Run /init as init process Dec 13 15:50:04.573761 kernel: with arguments: Dec 13 15:50:04.573766 kernel: /init Dec 13 15:50:04.573771 kernel: with environment: Dec 13 15:50:04.573776 kernel: HOME=/ Dec 13 15:50:04.573781 kernel: TERM=linux Dec 13 15:50:04.573786 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 15:50:04.573792 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 15:50:04.573799 systemd[1]: Detected architecture x86-64. Dec 13 15:50:04.573805 systemd[1]: Running in initrd. Dec 13 15:50:04.573811 systemd[1]: No hostname configured, using default hostname. Dec 13 15:50:04.573816 systemd[1]: Hostname set to . Dec 13 15:50:04.573821 systemd[1]: Initializing machine ID from random generator. Dec 13 15:50:04.573827 systemd[1]: Queued start job for default target initrd.target. Dec 13 15:50:04.573832 systemd[1]: Started systemd-ask-password-console.path. Dec 13 15:50:04.573837 systemd[1]: Reached target cryptsetup.target. Dec 13 15:50:04.573842 systemd[1]: Reached target paths.target. Dec 13 15:50:04.573849 systemd[1]: Reached target slices.target. Dec 13 15:50:04.573854 systemd[1]: Reached target swap.target. Dec 13 15:50:04.573859 systemd[1]: Reached target timers.target. Dec 13 15:50:04.573865 systemd[1]: Listening on iscsid.socket. Dec 13 15:50:04.573870 systemd[1]: Listening on iscsiuio.socket. Dec 13 15:50:04.573876 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 15:50:04.573881 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 15:50:04.573887 systemd[1]: Listening on systemd-journald.socket. Dec 13 15:50:04.573893 kernel: tsc: Refined TSC clocksource calibration: 3408.050 MHz Dec 13 15:50:04.573898 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x312002ef75a, max_idle_ns: 440795238381 ns Dec 13 15:50:04.573903 kernel: clocksource: Switched to clocksource tsc Dec 13 15:50:04.573908 systemd[1]: Listening on systemd-networkd.socket. Dec 13 15:50:04.573914 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 15:50:04.573919 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 15:50:04.573925 systemd[1]: Reached target sockets.target. Dec 13 15:50:04.573930 systemd[1]: Starting kmod-static-nodes.service... Dec 13 15:50:04.573936 systemd[1]: Finished network-cleanup.service. Dec 13 15:50:04.573941 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 15:50:04.573947 systemd[1]: Starting systemd-journald.service... Dec 13 15:50:04.573952 systemd[1]: Starting systemd-modules-load.service... Dec 13 15:50:04.573960 systemd-journald[269]: Journal started Dec 13 15:50:04.573985 systemd-journald[269]: Runtime Journal (/run/log/journal/24c12a96cb9a4021a4c0235b8d20185f) is 8.0M, max 640.1M, 632.1M free. Dec 13 15:50:04.576874 systemd-modules-load[270]: Inserted module 'overlay' Dec 13 15:50:04.582000 audit: BPF prog-id=6 op=LOAD Dec 13 15:50:04.600632 kernel: audit: type=1334 audit(1734105004.582:2): prog-id=6 op=LOAD Dec 13 15:50:04.600647 systemd[1]: Starting systemd-resolved.service... Dec 13 15:50:04.649487 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 15:50:04.649517 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 15:50:04.683541 kernel: Bridge firewalling registered Dec 13 15:50:04.683572 systemd[1]: Started systemd-journald.service. Dec 13 15:50:04.697994 systemd-modules-load[270]: Inserted module 'br_netfilter' Dec 13 15:50:04.746785 kernel: audit: type=1130 audit(1734105004.705:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:04.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:04.700365 systemd-resolved[272]: Positive Trust Anchors: Dec 13 15:50:04.809531 kernel: SCSI subsystem initialized Dec 13 15:50:04.809543 kernel: audit: type=1130 audit(1734105004.759:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:04.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:04.700370 systemd-resolved[272]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 15:50:04.926571 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 15:50:04.926583 kernel: audit: type=1130 audit(1734105004.829:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:04.926591 kernel: device-mapper: uevent: version 1.0.3 Dec 13 15:50:04.926597 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 15:50:04.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:04.700390 systemd-resolved[272]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 15:50:04.999744 kernel: audit: type=1130 audit(1734105004.934:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:04.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:04.701916 systemd-resolved[272]: Defaulting to hostname 'linux'. Dec 13 15:50:05.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:04.705718 systemd[1]: Started systemd-resolved.service. Dec 13 15:50:05.109669 kernel: audit: type=1130 audit(1734105005.008:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:05.109680 kernel: audit: type=1130 audit(1734105005.063:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:05.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:04.759660 systemd[1]: Finished kmod-static-nodes.service. Dec 13 15:50:04.829639 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 15:50:04.927742 systemd-modules-load[270]: Inserted module 'dm_multipath' Dec 13 15:50:04.934788 systemd[1]: Finished systemd-modules-load.service. Dec 13 15:50:05.008858 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 15:50:05.063780 systemd[1]: Reached target nss-lookup.target. Dec 13 15:50:05.119082 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 15:50:05.139047 systemd[1]: Starting systemd-sysctl.service... Dec 13 15:50:05.139345 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 15:50:05.142266 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 15:50:05.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:05.143019 systemd[1]: Finished systemd-sysctl.service. Dec 13 15:50:05.191486 kernel: audit: type=1130 audit(1734105005.141:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:05.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:05.204856 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 15:50:05.270575 kernel: audit: type=1130 audit(1734105005.204:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:05.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:05.262099 systemd[1]: Starting dracut-cmdline.service... Dec 13 15:50:05.284581 dracut-cmdline[293]: dracut-dracut-053 Dec 13 15:50:05.284581 dracut-cmdline[293]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Dec 13 15:50:05.284581 dracut-cmdline[293]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 15:50:05.352571 kernel: Loading iSCSI transport class v2.0-870. Dec 13 15:50:05.352584 kernel: iscsi: registered transport (tcp) Dec 13 15:50:05.408085 kernel: iscsi: registered transport (qla4xxx) Dec 13 15:50:05.408101 kernel: QLogic iSCSI HBA Driver Dec 13 15:50:05.424153 systemd[1]: Finished dracut-cmdline.service. Dec 13 15:50:05.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:05.434288 systemd[1]: Starting dracut-pre-udev.service... Dec 13 15:50:05.490558 kernel: raid6: avx2x4 gen() 46792 MB/s Dec 13 15:50:05.525516 kernel: raid6: avx2x4 xor() 21259 MB/s Dec 13 15:50:05.560516 kernel: raid6: avx2x2 gen() 53711 MB/s Dec 13 15:50:05.595557 kernel: raid6: avx2x2 xor() 32069 MB/s Dec 13 15:50:05.630557 kernel: raid6: avx2x1 gen() 45199 MB/s Dec 13 15:50:05.664514 kernel: raid6: avx2x1 xor() 27895 MB/s Dec 13 15:50:05.698553 kernel: raid6: sse2x4 gen() 21367 MB/s Dec 13 15:50:05.732516 kernel: raid6: sse2x4 xor() 11977 MB/s Dec 13 15:50:05.766516 kernel: raid6: sse2x2 gen() 21665 MB/s Dec 13 15:50:05.800516 kernel: raid6: sse2x2 xor() 13417 MB/s Dec 13 15:50:05.834553 kernel: raid6: sse2x1 gen() 18300 MB/s Dec 13 15:50:05.886418 kernel: raid6: sse2x1 xor() 8922 MB/s Dec 13 15:50:05.886433 kernel: raid6: using algorithm avx2x2 gen() 53711 MB/s Dec 13 15:50:05.886441 kernel: raid6: .... xor() 32069 MB/s, rmw enabled Dec 13 15:50:05.904635 kernel: raid6: using avx2x2 recovery algorithm Dec 13 15:50:05.950487 kernel: xor: automatically using best checksumming function avx Dec 13 15:50:06.030491 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 15:50:06.035027 systemd[1]: Finished dracut-pre-udev.service. Dec 13 15:50:06.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:06.044000 audit: BPF prog-id=7 op=LOAD Dec 13 15:50:06.044000 audit: BPF prog-id=8 op=LOAD Dec 13 15:50:06.045535 systemd[1]: Starting systemd-udevd.service... Dec 13 15:50:06.053973 systemd-udevd[474]: Using default interface naming scheme 'v252'. Dec 13 15:50:06.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:06.059773 systemd[1]: Started systemd-udevd.service. Dec 13 15:50:06.100620 dracut-pre-trigger[485]: rd.md=0: removing MD RAID activation Dec 13 15:50:06.077161 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 15:50:06.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:06.103411 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 15:50:06.118490 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 15:50:06.169069 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 15:50:06.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:06.196491 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 15:50:06.198495 kernel: libata version 3.00 loaded. Dec 13 15:50:06.222492 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 15:50:06.222532 kernel: ACPI: bus type USB registered Dec 13 15:50:06.239491 kernel: usbcore: registered new interface driver usbfs Dec 13 15:50:06.275047 kernel: usbcore: registered new interface driver hub Dec 13 15:50:06.275070 kernel: AES CTR mode by8 optimization enabled Dec 13 15:50:06.308928 kernel: usbcore: registered new device driver usb Dec 13 15:50:06.330055 kernel: ahci 0000:00:17.0: version 3.0 Dec 13 15:50:06.372639 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Dec 13 15:50:06.372714 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Dec 13 15:50:06.372776 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Dec 13 15:50:06.372786 kernel: mlx5_core 0000:01:00.0: firmware version: 14.27.1016 Dec 13 15:50:06.959243 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Dec 13 15:50:06.959257 kernel: scsi host0: ahci Dec 13 15:50:06.959330 kernel: scsi host1: ahci Dec 13 15:50:06.959436 kernel: scsi host2: ahci Dec 13 15:50:06.959688 kernel: scsi host3: ahci Dec 13 15:50:06.959751 kernel: scsi host4: ahci Dec 13 15:50:06.959812 kernel: scsi host5: ahci Dec 13 15:50:06.959872 kernel: scsi host6: ahci Dec 13 15:50:06.959933 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 127 Dec 13 15:50:06.959942 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 127 Dec 13 15:50:06.959950 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 127 Dec 13 15:50:06.959959 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 127 Dec 13 15:50:06.959967 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 127 Dec 13 15:50:06.959975 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 127 Dec 13 15:50:06.959983 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 127 Dec 13 15:50:06.959990 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Dec 13 15:50:06.960053 kernel: pps pps0: new PPS source ptp0 Dec 13 15:50:06.960125 kernel: igb 0000:03:00.0: added PHC on eth0 Dec 13 15:50:06.960191 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Dec 13 15:50:06.960251 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:6a:ef:80 Dec 13 15:50:06.960309 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Dec 13 15:50:06.960368 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Dec 13 15:50:06.960426 kernel: ata3: SATA link down (SStatus 0 SControl 300) Dec 13 15:50:06.960434 kernel: ata4: SATA link down (SStatus 0 SControl 300) Dec 13 15:50:06.960442 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Dec 13 15:50:06.960450 kernel: pps pps1: new PPS source ptp1 Dec 13 15:50:06.960512 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Dec 13 15:50:06.960521 kernel: igb 0000:04:00.0: added PHC on eth1 Dec 13 15:50:06.960583 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Dec 13 15:50:06.960642 kernel: ata6: SATA link down (SStatus 0 SControl 300) Dec 13 15:50:06.960650 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Dec 13 15:50:06.960709 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Dec 13 15:50:06.960766 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Dec 13 15:50:06.960774 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:6a:ef:81 Dec 13 15:50:06.960834 kernel: ata5: SATA link down (SStatus 0 SControl 300) Dec 13 15:50:06.960843 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Dec 13 15:50:06.960901 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Dec 13 15:50:06.960909 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Dec 13 15:50:06.960967 kernel: ata7: SATA link down (SStatus 0 SControl 300) Dec 13 15:50:06.960976 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Dec 13 15:50:06.960984 kernel: mlx5_core 0000:01:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Dec 13 15:50:06.961042 kernel: ata2.00: Features: NCQ-prio Dec 13 15:50:06.961052 kernel: mlx5_core 0000:01:00.1: firmware version: 14.27.1016 Dec 13 15:50:07.786367 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Dec 13 15:50:07.786379 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Dec 13 15:50:07.786444 kernel: ata1.00: Features: NCQ-prio Dec 13 15:50:07.786452 kernel: ata2.00: configured for UDMA/133 Dec 13 15:50:07.786458 kernel: ata1.00: configured for UDMA/133 Dec 13 15:50:07.786465 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Dec 13 15:50:07.786532 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Dec 13 15:50:07.786596 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Dec 13 15:50:07.786649 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Dec 13 15:50:07.786703 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Dec 13 15:50:07.786752 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Dec 13 15:50:07.786800 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Dec 13 15:50:07.786847 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Dec 13 15:50:07.786895 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Dec 13 15:50:07.786945 kernel: hub 1-0:1.0: USB hub found Dec 13 15:50:07.787009 kernel: hub 1-0:1.0: 16 ports detected Dec 13 15:50:07.787062 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 15:50:07.787070 kernel: hub 2-0:1.0: USB hub found Dec 13 15:50:07.787128 kernel: ata2.00: Enabling discard_zeroes_data Dec 13 15:50:07.787135 kernel: hub 2-0:1.0: 10 ports detected Dec 13 15:50:07.787187 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Dec 13 15:50:07.787243 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Dec 13 15:50:07.787297 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Dec 13 15:50:07.787351 kernel: sd 1:0:0:0: [sdb] Write Protect is off Dec 13 15:50:07.787404 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Dec 13 15:50:07.787457 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Dec 13 15:50:07.787513 kernel: ata2.00: Enabling discard_zeroes_data Dec 13 15:50:07.787521 kernel: ata2.00: Enabling discard_zeroes_data Dec 13 15:50:07.787527 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Dec 13 15:50:07.787582 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Dec 13 15:50:07.787634 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Dec 13 15:50:07.787685 kernel: port_module: 9 callbacks suppressed Dec 13 15:50:07.787693 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged Dec 13 15:50:07.787743 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Dec 13 15:50:07.787797 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Dec 13 15:50:07.787890 kernel: sd 0:0:0:0: [sda] Write Protect is off Dec 13 15:50:07.787950 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Dec 13 15:50:07.788005 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Dec 13 15:50:07.788061 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 15:50:07.788068 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Dec 13 15:50:07.788119 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 15:50:07.788127 kernel: GPT:9289727 != 937703087 Dec 13 15:50:07.788133 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 15:50:07.788140 kernel: hub 1-14:1.0: USB hub found Dec 13 15:50:07.788201 kernel: GPT:9289727 != 937703087 Dec 13 15:50:07.788208 kernel: hub 1-14:1.0: 4 ports detected Dec 13 15:50:07.788263 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 15:50:07.788270 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 15:50:07.788277 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 15:50:07.788283 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Dec 13 15:50:07.788337 kernel: mlx5_core 0000:01:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Dec 13 15:50:07.788388 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by (udev-worker) (535) Dec 13 15:50:07.762081 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 15:50:07.822763 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth2 Dec 13 15:50:07.816737 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 15:50:07.848603 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth0 Dec 13 15:50:07.842031 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 15:50:07.859588 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 15:50:07.901567 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 15:50:07.862984 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 15:50:07.919559 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 15:50:07.882297 systemd[1]: Starting disk-uuid.service... Dec 13 15:50:07.931612 disk-uuid[687]: Primary Header is updated. Dec 13 15:50:07.931612 disk-uuid[687]: Secondary Entries is updated. Dec 13 15:50:07.931612 disk-uuid[687]: Secondary Header is updated. Dec 13 15:50:08.005510 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 15:50:08.005521 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 15:50:08.005530 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 15:50:08.005537 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Dec 13 15:50:08.005555 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 15:50:08.105499 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 15:50:08.138757 kernel: usbcore: registered new interface driver usbhid Dec 13 15:50:08.138808 kernel: usbhid: USB HID core driver Dec 13 15:50:08.173563 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Dec 13 15:50:08.291538 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Dec 13 15:50:08.291683 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Dec 13 15:50:08.291693 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Dec 13 15:50:08.970341 kernel: ata1.00: Enabling discard_zeroes_data Dec 13 15:50:08.989498 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 15:50:08.989831 disk-uuid[688]: The operation has completed successfully. Dec 13 15:50:09.029836 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 15:50:09.142603 kernel: audit: type=1130 audit(1734105009.036:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:09.142622 kernel: audit: type=1131 audit(1734105009.036:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:09.142629 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 15:50:09.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:09.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:09.029881 systemd[1]: Finished disk-uuid.service. Dec 13 15:50:09.037542 systemd[1]: Starting verity-setup.service... Dec 13 15:50:09.188969 systemd[1]: Found device dev-mapper-usr.device. Dec 13 15:50:09.189815 systemd[1]: Mounting sysusr-usr.mount... Dec 13 15:50:09.203841 systemd[1]: Finished verity-setup.service. Dec 13 15:50:09.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:09.269501 kernel: audit: type=1130 audit(1734105009.222:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:09.298109 systemd[1]: Mounted sysusr-usr.mount. Dec 13 15:50:09.313601 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 15:50:09.305851 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 15:50:09.306246 systemd[1]: Starting ignition-setup.service... Dec 13 15:50:09.404559 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 15:50:09.404575 kernel: BTRFS info (device sda6): using free space tree Dec 13 15:50:09.404584 kernel: BTRFS info (device sda6): has skinny extents Dec 13 15:50:09.404591 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 15:50:09.314062 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 15:50:09.460522 kernel: audit: type=1130 audit(1734105009.412:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:09.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:09.397728 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 15:50:09.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:09.413390 systemd[1]: Finished ignition-setup.service. Dec 13 15:50:09.554191 kernel: audit: type=1130 audit(1734105009.474:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:09.554206 kernel: audit: type=1334 audit(1734105009.531:24): prog-id=9 op=LOAD Dec 13 15:50:09.531000 audit: BPF prog-id=9 op=LOAD Dec 13 15:50:09.475595 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 15:50:09.532708 systemd[1]: Starting systemd-networkd.service... Dec 13 15:50:09.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:09.568132 systemd-networkd[877]: lo: Link UP Dec 13 15:50:09.634623 kernel: audit: type=1130 audit(1734105009.568:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:09.593019 ignition[865]: Ignition 2.14.0 Dec 13 15:50:09.568134 systemd-networkd[877]: lo: Gained carrier Dec 13 15:50:09.593023 ignition[865]: Stage: fetch-offline Dec 13 15:50:09.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:09.568428 systemd-networkd[877]: Enumeration completed Dec 13 15:50:09.795502 kernel: audit: type=1130 audit(1734105009.661:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:09.795520 kernel: audit: type=1130 audit(1734105009.721:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:09.795531 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Dec 13 15:50:09.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:09.593048 ignition[865]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:50:09.568501 systemd[1]: Started systemd-networkd.service. Dec 13 15:50:09.593062 ignition[865]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 15:50:09.568780 systemd[1]: Reached target network.target. Dec 13 15:50:09.846742 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f1np1: link becomes ready Dec 13 15:50:09.595861 ignition[865]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 15:50:09.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:09.864607 iscsid[897]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 15:50:09.864607 iscsid[897]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 15:50:09.864607 iscsid[897]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 15:50:09.864607 iscsid[897]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 15:50:09.864607 iscsid[897]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 15:50:09.864607 iscsid[897]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 15:50:09.864607 iscsid[897]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 15:50:10.033648 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Dec 13 15:50:09.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:09.590347 systemd-networkd[877]: enp1s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 15:50:10.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:09.595925 ignition[865]: parsed url from cmdline: "" Dec 13 15:50:09.606814 unknown[865]: fetched base config from "system" Dec 13 15:50:09.595927 ignition[865]: no config URL provided Dec 13 15:50:09.606818 unknown[865]: fetched user config from "system" Dec 13 15:50:09.595929 ignition[865]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 15:50:09.628132 systemd[1]: Starting iscsiuio.service... Dec 13 15:50:09.595949 ignition[865]: parsing config with SHA512: 704c6ad539820ccc2b6b0f9bb27efe172846e1c208d758cb5761dfc0c9494c3ccee2e84330d4a47e472e0a29c29c9448c4d3cbc3f977357c8346b778067f48d1 Dec 13 15:50:09.641862 systemd[1]: Started iscsiuio.service. Dec 13 15:50:09.607082 ignition[865]: fetch-offline: fetch-offline passed Dec 13 15:50:09.662007 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 15:50:09.607085 ignition[865]: POST message to Packet Timeline Dec 13 15:50:09.721876 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 15:50:09.607089 ignition[865]: POST Status error: resource requires networking Dec 13 15:50:09.722696 systemd[1]: Starting ignition-kargs.service... Dec 13 15:50:09.607123 ignition[865]: Ignition finished successfully Dec 13 15:50:09.796278 systemd-networkd[877]: enp1s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 15:50:09.799786 ignition[887]: Ignition 2.14.0 Dec 13 15:50:09.810040 systemd[1]: Starting iscsid.service... Dec 13 15:50:09.799789 ignition[887]: Stage: kargs Dec 13 15:50:09.839844 systemd[1]: Started iscsid.service. Dec 13 15:50:09.799846 ignition[887]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:50:09.854130 systemd[1]: Starting dracut-initqueue.service... Dec 13 15:50:09.799857 ignition[887]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 15:50:09.871732 systemd[1]: Finished dracut-initqueue.service. Dec 13 15:50:09.801189 ignition[887]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 15:50:09.883702 systemd[1]: Reached target remote-fs-pre.target. Dec 13 15:50:09.802475 ignition[887]: kargs: kargs passed Dec 13 15:50:09.944645 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 15:50:09.802478 ignition[887]: POST message to Packet Timeline Dec 13 15:50:09.960675 systemd[1]: Reached target remote-fs.target. Dec 13 15:50:09.802491 ignition[887]: GET https://metadata.packet.net/metadata: attempt #1 Dec 13 15:50:09.983298 systemd[1]: Starting dracut-pre-mount.service... Dec 13 15:50:09.805420 ignition[887]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:56768->[::1]:53: read: connection refused Dec 13 15:50:09.995755 systemd[1]: Finished dracut-pre-mount.service. Dec 13 15:50:10.006190 ignition[887]: GET https://metadata.packet.net/metadata: attempt #2 Dec 13 15:50:10.022492 systemd-networkd[877]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 15:50:10.006574 ignition[887]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:40004->[::1]:53: read: connection refused Dec 13 15:50:10.051190 systemd-networkd[877]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 15:50:10.080460 systemd-networkd[877]: enp1s0f1np1: Link UP Dec 13 15:50:10.080709 systemd-networkd[877]: enp1s0f1np1: Gained carrier Dec 13 15:50:10.095993 systemd-networkd[877]: enp1s0f0np0: Link UP Dec 13 15:50:10.096373 systemd-networkd[877]: eno2: Link UP Dec 13 15:50:10.096746 systemd-networkd[877]: eno1: Link UP Dec 13 15:50:10.407226 ignition[887]: GET https://metadata.packet.net/metadata: attempt #3 Dec 13 15:50:10.408227 ignition[887]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:59377->[::1]:53: read: connection refused Dec 13 15:50:10.864103 systemd-networkd[877]: enp1s0f0np0: Gained carrier Dec 13 15:50:10.872611 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f0np0: link becomes ready Dec 13 15:50:10.892723 systemd-networkd[877]: enp1s0f0np0: DHCPv4 address 147.28.180.221/31, gateway 147.28.180.220 acquired from 145.40.83.140 Dec 13 15:50:11.208735 ignition[887]: GET https://metadata.packet.net/metadata: attempt #4 Dec 13 15:50:11.209314 ignition[887]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:33843->[::1]:53: read: connection refused Dec 13 15:50:11.417094 systemd-networkd[877]: enp1s0f1np1: Gained IPv6LL Dec 13 15:50:12.633074 systemd-networkd[877]: enp1s0f0np0: Gained IPv6LL Dec 13 15:50:12.810604 ignition[887]: GET https://metadata.packet.net/metadata: attempt #5 Dec 13 15:50:12.811954 ignition[887]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:56850->[::1]:53: read: connection refused Dec 13 15:50:16.012570 ignition[887]: GET https://metadata.packet.net/metadata: attempt #6 Dec 13 15:50:17.855619 ignition[887]: GET result: OK Dec 13 15:50:18.191990 ignition[887]: Ignition finished successfully Dec 13 15:50:18.196262 systemd[1]: Finished ignition-kargs.service. Dec 13 15:50:18.285177 kernel: kauditd_printk_skb: 3 callbacks suppressed Dec 13 15:50:18.285193 kernel: audit: type=1130 audit(1734105018.207:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:18.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:18.216211 ignition[915]: Ignition 2.14.0 Dec 13 15:50:18.209779 systemd[1]: Starting ignition-disks.service... Dec 13 15:50:18.216214 ignition[915]: Stage: disks Dec 13 15:50:18.216291 ignition[915]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:50:18.216300 ignition[915]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 15:50:18.217850 ignition[915]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 15:50:18.219758 ignition[915]: disks: disks passed Dec 13 15:50:18.219762 ignition[915]: POST message to Packet Timeline Dec 13 15:50:18.219773 ignition[915]: GET https://metadata.packet.net/metadata: attempt #1 Dec 13 15:50:19.409646 ignition[915]: GET result: OK Dec 13 15:50:19.725814 ignition[915]: Ignition finished successfully Dec 13 15:50:19.727200 systemd[1]: Finished ignition-disks.service. Dec 13 15:50:19.798527 kernel: audit: type=1130 audit(1734105019.741:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:19.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:19.742077 systemd[1]: Reached target initrd-root-device.target. Dec 13 15:50:19.806756 systemd[1]: Reached target local-fs-pre.target. Dec 13 15:50:19.806789 systemd[1]: Reached target local-fs.target. Dec 13 15:50:19.829728 systemd[1]: Reached target sysinit.target. Dec 13 15:50:19.836727 systemd[1]: Reached target basic.target. Dec 13 15:50:19.857488 systemd[1]: Starting systemd-fsck-root.service... Dec 13 15:50:19.876494 systemd-fsck[931]: ROOT: clean, 621/553520 files, 56021/553472 blocks Dec 13 15:50:19.889669 systemd[1]: Finished systemd-fsck-root.service. Dec 13 15:50:19.983972 kernel: audit: type=1130 audit(1734105019.898:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:19.983987 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 15:50:19.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:19.904351 systemd[1]: Mounting sysroot.mount... Dec 13 15:50:19.992182 systemd[1]: Mounted sysroot.mount. Dec 13 15:50:20.006784 systemd[1]: Reached target initrd-root-fs.target. Dec 13 15:50:20.028475 systemd[1]: Mounting sysroot-usr.mount... Dec 13 15:50:20.036468 systemd[1]: Starting flatcar-metadata-hostname.service... Dec 13 15:50:20.044188 systemd[1]: Starting flatcar-static-network.service... Dec 13 15:50:20.065623 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 15:50:20.065709 systemd[1]: Reached target ignition-diskful.target. Dec 13 15:50:20.084643 systemd[1]: Mounted sysroot-usr.mount. Dec 13 15:50:20.108156 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 15:50:20.258580 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (942) Dec 13 15:50:20.258601 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 15:50:20.258609 kernel: BTRFS info (device sda6): using free space tree Dec 13 15:50:20.258616 kernel: BTRFS info (device sda6): has skinny extents Dec 13 15:50:20.258623 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 15:50:20.120365 systemd[1]: Starting initrd-setup-root.service... Dec 13 15:50:20.322623 kernel: audit: type=1130 audit(1734105020.267:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:20.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:20.322662 coreos-metadata[938]: Dec 13 15:50:20.206 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Dec 13 15:50:20.350738 coreos-metadata[939]: Dec 13 15:50:20.206 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Dec 13 15:50:20.369575 initrd-setup-root[949]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 15:50:20.199036 systemd[1]: Finished initrd-setup-root.service. Dec 13 15:50:20.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:20.421703 initrd-setup-root[957]: cut: /sysroot/etc/group: No such file or directory Dec 13 15:50:20.460704 kernel: audit: type=1130 audit(1734105020.395:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:20.268791 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 15:50:20.468768 initrd-setup-root[965]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 15:50:20.337076 systemd[1]: Starting ignition-mount.service... Dec 13 15:50:20.485774 initrd-setup-root[973]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 15:50:20.358049 systemd[1]: Starting sysroot-boot.service... Dec 13 15:50:20.502658 ignition[1015]: INFO : Ignition 2.14.0 Dec 13 15:50:20.502658 ignition[1015]: INFO : Stage: mount Dec 13 15:50:20.502658 ignition[1015]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:50:20.502658 ignition[1015]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 15:50:20.502658 ignition[1015]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 15:50:20.502658 ignition[1015]: INFO : mount: mount passed Dec 13 15:50:20.502658 ignition[1015]: INFO : POST message to Packet Timeline Dec 13 15:50:20.502658 ignition[1015]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Dec 13 15:50:20.378258 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 15:50:20.378299 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 15:50:20.378874 systemd[1]: Finished sysroot-boot.service. Dec 13 15:50:21.321273 coreos-metadata[939]: Dec 13 15:50:21.321 INFO Fetch successful Dec 13 15:50:21.396833 systemd[1]: flatcar-static-network.service: Deactivated successfully. Dec 13 15:50:21.530720 kernel: audit: type=1130 audit(1734105021.406:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:21.530734 kernel: audit: type=1131 audit(1734105021.406:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:21.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:21.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:21.396889 systemd[1]: Finished flatcar-static-network.service. Dec 13 15:50:21.793472 ignition[1015]: INFO : GET result: OK Dec 13 15:50:22.022274 coreos-metadata[938]: Dec 13 15:50:22.022 INFO Fetch successful Dec 13 15:50:22.097729 coreos-metadata[938]: Dec 13 15:50:22.097 INFO wrote hostname ci-3510.3.6-a-a4f471fe95 to /sysroot/etc/hostname Dec 13 15:50:22.110615 ignition[1015]: INFO : Ignition finished successfully Dec 13 15:50:22.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:22.170530 kernel: audit: type=1130 audit(1734105022.110:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:22.098373 systemd[1]: Finished flatcar-metadata-hostname.service. Dec 13 15:50:22.243755 kernel: audit: type=1130 audit(1734105022.178:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:22.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:22.110857 systemd[1]: Finished ignition-mount.service. Dec 13 15:50:22.179139 systemd[1]: Starting ignition-files.service... Dec 13 15:50:22.305530 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sda6 scanned by mount (1029) Dec 13 15:50:22.305542 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 15:50:22.252486 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 15:50:22.351565 kernel: BTRFS info (device sda6): using free space tree Dec 13 15:50:22.351577 kernel: BTRFS info (device sda6): has skinny extents Dec 13 15:50:22.351584 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 15:50:22.386408 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 15:50:22.403622 ignition[1048]: INFO : Ignition 2.14.0 Dec 13 15:50:22.403622 ignition[1048]: INFO : Stage: files Dec 13 15:50:22.403622 ignition[1048]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:50:22.403622 ignition[1048]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 15:50:22.403622 ignition[1048]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 15:50:22.403622 ignition[1048]: DEBUG : files: compiled without relabeling support, skipping Dec 13 15:50:22.403622 ignition[1048]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 15:50:22.403622 ignition[1048]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 15:50:22.405457 unknown[1048]: wrote ssh authorized keys file for user: core Dec 13 15:50:22.503714 ignition[1048]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 15:50:22.503714 ignition[1048]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 15:50:22.503714 ignition[1048]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 15:50:22.503714 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 15:50:22.503714 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 15:50:22.503714 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 13 15:50:22.585281 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 15:50:22.612570 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 15:50:22.612570 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 15:50:22.612570 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 15:50:22.612570 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 15:50:22.612570 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 15:50:22.612570 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 15:50:22.612570 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 15:50:22.612570 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 15:50:22.612570 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 15:50:22.612570 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 15:50:22.612570 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 15:50:22.612570 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 15:50:22.612570 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Dec 13 15:50:22.612570 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 15:50:22.612570 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2340525075" Dec 13 15:50:22.879785 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1068) Dec 13 15:50:22.879887 ignition[1048]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2340525075": device or resource busy Dec 13 15:50:22.879887 ignition[1048]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2340525075", trying btrfs: device or resource busy Dec 13 15:50:22.879887 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2340525075" Dec 13 15:50:22.879887 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2340525075" Dec 13 15:50:22.879887 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem2340525075" Dec 13 15:50:22.879887 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem2340525075" Dec 13 15:50:22.879887 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Dec 13 15:50:22.879887 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 15:50:22.879887 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 Dec 13 15:50:23.176967 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Dec 13 15:50:24.202855 ignition[1048]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 15:50:24.202855 ignition[1048]: INFO : files: op(f): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 15:50:24.202855 ignition[1048]: INFO : files: op(f): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 15:50:24.202855 ignition[1048]: INFO : files: op(10): [started] processing unit "packet-phone-home.service" Dec 13 15:50:24.202855 ignition[1048]: INFO : files: op(10): [finished] processing unit "packet-phone-home.service" Dec 13 15:50:24.202855 ignition[1048]: INFO : files: op(11): [started] processing unit "prepare-helm.service" Dec 13 15:50:24.285814 ignition[1048]: INFO : files: op(11): op(12): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 15:50:24.285814 ignition[1048]: INFO : files: op(11): op(12): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 15:50:24.285814 ignition[1048]: INFO : files: op(11): [finished] processing unit "prepare-helm.service" Dec 13 15:50:24.285814 ignition[1048]: INFO : files: op(13): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 15:50:24.285814 ignition[1048]: INFO : files: op(13): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 15:50:24.285814 ignition[1048]: INFO : files: op(14): [started] setting preset to enabled for "packet-phone-home.service" Dec 13 15:50:24.285814 ignition[1048]: INFO : files: op(14): [finished] setting preset to enabled for "packet-phone-home.service" Dec 13 15:50:24.285814 ignition[1048]: INFO : files: op(15): [started] setting preset to enabled for "prepare-helm.service" Dec 13 15:50:24.285814 ignition[1048]: INFO : files: op(15): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 15:50:24.285814 ignition[1048]: INFO : files: createResultFile: createFiles: op(16): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 15:50:24.285814 ignition[1048]: INFO : files: createResultFile: createFiles: op(16): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 15:50:24.285814 ignition[1048]: INFO : files: files passed Dec 13 15:50:24.285814 ignition[1048]: INFO : POST message to Packet Timeline Dec 13 15:50:24.285814 ignition[1048]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Dec 13 15:50:25.985777 ignition[1048]: INFO : GET result: OK Dec 13 15:50:26.314218 ignition[1048]: INFO : Ignition finished successfully Dec 13 15:50:26.316959 systemd[1]: Finished ignition-files.service. Dec 13 15:50:26.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:26.390498 kernel: audit: type=1130 audit(1734105026.331:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:26.337991 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 15:50:26.399747 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 15:50:26.435678 initrd-setup-root-after-ignition[1085]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 15:50:26.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:26.400189 systemd[1]: Starting ignition-quench.service... Dec 13 15:50:26.624443 kernel: audit: type=1130 audit(1734105026.445:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:26.624459 kernel: audit: type=1130 audit(1734105026.511:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:26.624467 kernel: audit: type=1131 audit(1734105026.511:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:26.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:26.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:26.418927 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 15:50:26.446055 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 15:50:26.446170 systemd[1]: Finished ignition-quench.service. Dec 13 15:50:26.780198 kernel: audit: type=1130 audit(1734105026.666:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:26.780211 kernel: audit: type=1131 audit(1734105026.666:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:26.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:26.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:26.511747 systemd[1]: Reached target ignition-complete.target. Dec 13 15:50:26.633089 systemd[1]: Starting initrd-parse-etc.service... Dec 13 15:50:26.653604 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 15:50:26.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:26.653645 systemd[1]: Finished initrd-parse-etc.service. Dec 13 15:50:26.901725 kernel: audit: type=1130 audit(1734105026.828:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:26.666769 systemd[1]: Reached target initrd-fs.target. Dec 13 15:50:26.788697 systemd[1]: Reached target initrd.target. Dec 13 15:50:26.788757 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 15:50:26.789098 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 15:50:26.809827 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 15:50:26.967000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:26.829289 systemd[1]: Starting initrd-cleanup.service... Dec 13 15:50:27.043742 kernel: audit: type=1131 audit(1734105026.967:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:26.897570 systemd[1]: Stopped target nss-lookup.target. Dec 13 15:50:26.910766 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 15:50:26.926744 systemd[1]: Stopped target timers.target. Dec 13 15:50:26.951773 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 15:50:26.951885 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 15:50:26.967925 systemd[1]: Stopped target initrd.target. Dec 13 15:50:27.036793 systemd[1]: Stopped target basic.target. Dec 13 15:50:27.050749 systemd[1]: Stopped target ignition-complete.target. Dec 13 15:50:27.072793 systemd[1]: Stopped target ignition-diskful.target. Dec 13 15:50:27.088778 systemd[1]: Stopped target initrd-root-device.target. Dec 13 15:50:27.104837 systemd[1]: Stopped target remote-fs.target. Dec 13 15:50:27.120983 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 15:50:27.286536 kernel: audit: type=1131 audit(1734105027.217:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:27.217000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:27.136078 systemd[1]: Stopped target sysinit.target. Dec 13 15:50:27.152194 systemd[1]: Stopped target local-fs.target. Dec 13 15:50:27.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:27.170177 systemd[1]: Stopped target local-fs-pre.target. Dec 13 15:50:27.386734 kernel: audit: type=1131 audit(1734105027.310:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:27.379000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:27.187079 systemd[1]: Stopped target swap.target. Dec 13 15:50:27.201963 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 15:50:27.202328 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 15:50:27.218309 systemd[1]: Stopped target cryptsetup.target. Dec 13 15:50:27.294785 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 15:50:27.294864 systemd[1]: Stopped dracut-initqueue.service. Dec 13 15:50:27.472000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:27.310855 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 15:50:27.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:27.310926 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 15:50:27.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:27.379889 systemd[1]: Stopped target paths.target. Dec 13 15:50:27.529612 ignition[1101]: INFO : Ignition 2.14.0 Dec 13 15:50:27.529612 ignition[1101]: INFO : Stage: umount Dec 13 15:50:27.529612 ignition[1101]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 15:50:27.529612 ignition[1101]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Dec 13 15:50:27.529612 ignition[1101]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Dec 13 15:50:27.529612 ignition[1101]: INFO : umount: umount passed Dec 13 15:50:27.529612 ignition[1101]: INFO : POST message to Packet Timeline Dec 13 15:50:27.529612 ignition[1101]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Dec 13 15:50:27.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:27.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:27.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:27.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:27.393734 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 15:50:27.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:27.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:27.397716 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 15:50:27.400806 systemd[1]: Stopped target slices.target. Dec 13 15:50:27.424775 systemd[1]: Stopped target sockets.target. Dec 13 15:50:27.439776 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 15:50:27.439856 systemd[1]: Closed iscsid.socket. Dec 13 15:50:27.453955 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 15:50:27.454101 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 15:50:27.473206 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 15:50:27.473509 systemd[1]: Stopped ignition-files.service. Dec 13 15:50:27.488157 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Dec 13 15:50:27.488530 systemd[1]: Stopped flatcar-metadata-hostname.service. Dec 13 15:50:27.509348 systemd[1]: Stopping ignition-mount.service... Dec 13 15:50:27.522640 systemd[1]: Stopping iscsiuio.service... Dec 13 15:50:27.537210 systemd[1]: Stopping sysroot-boot.service... Dec 13 15:50:27.551658 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 15:50:27.551790 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 15:50:27.577160 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 15:50:27.577452 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 15:50:27.610226 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 15:50:27.610550 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 15:50:27.610596 systemd[1]: Stopped iscsiuio.service. Dec 13 15:50:27.615927 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 15:50:27.615968 systemd[1]: Stopped sysroot-boot.service. Dec 13 15:50:27.629095 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 15:50:27.629159 systemd[1]: Closed iscsiuio.socket. Dec 13 15:50:27.643051 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 15:50:27.643127 systemd[1]: Finished initrd-cleanup.service. Dec 13 15:50:29.121073 ignition[1101]: INFO : GET result: OK Dec 13 15:50:29.456984 ignition[1101]: INFO : Ignition finished successfully Dec 13 15:50:29.458337 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 15:50:29.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:29.458538 systemd[1]: Stopped ignition-mount.service. Dec 13 15:50:29.476166 systemd[1]: Stopped target network.target. Dec 13 15:50:29.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:29.491712 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 15:50:29.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:29.491852 systemd[1]: Stopped ignition-disks.service. Dec 13 15:50:29.538000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:29.506811 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 15:50:29.553000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:29.506933 systemd[1]: Stopped ignition-kargs.service. Dec 13 15:50:29.521894 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 15:50:29.522041 systemd[1]: Stopped ignition-setup.service. Dec 13 15:50:29.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:29.538888 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 15:50:29.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:29.617000 audit: BPF prog-id=6 op=UNLOAD Dec 13 15:50:29.539035 systemd[1]: Stopped initrd-setup-root.service. Dec 13 15:50:29.554176 systemd[1]: Stopping systemd-networkd.service... Dec 13 15:50:29.558606 systemd-networkd[877]: enp1s0f0np0: DHCPv6 lease lost Dec 13 15:50:29.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:29.567687 systemd-networkd[877]: enp1s0f1np1: DHCPv6 lease lost Dec 13 15:50:29.675000 audit: BPF prog-id=9 op=UNLOAD Dec 13 15:50:29.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:29.568893 systemd[1]: Stopping systemd-resolved.service... Dec 13 15:50:29.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:29.583313 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 15:50:29.583575 systemd[1]: Stopped systemd-resolved.service. Dec 13 15:50:29.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:29.601219 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 15:50:29.601592 systemd[1]: Stopped systemd-networkd.service. Dec 13 15:50:29.616206 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 15:50:29.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:29.616302 systemd[1]: Closed systemd-networkd.socket. Dec 13 15:50:29.795000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:29.635332 systemd[1]: Stopping network-cleanup.service... Dec 13 15:50:29.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:29.649704 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 15:50:29.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:29.649853 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 15:50:29.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:29.666906 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 15:50:29.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:29.667051 systemd[1]: Stopped systemd-sysctl.service. Dec 13 15:50:29.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:29.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:29.684227 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 15:50:29.684375 systemd[1]: Stopped systemd-modules-load.service. Dec 13 15:50:29.701236 systemd[1]: Stopping systemd-udevd.service... Dec 13 15:50:29.720402 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 15:50:29.721622 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 15:50:29.721682 systemd[1]: Stopped systemd-udevd.service. Dec 13 15:50:29.726881 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 15:50:29.726907 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 15:50:29.748696 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 15:50:29.748721 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 15:50:29.764727 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 15:50:29.764789 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 15:50:29.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:29.779728 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 15:50:29.779800 systemd[1]: Stopped dracut-cmdline.service. Dec 13 15:50:29.795759 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 15:50:29.795896 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 15:50:29.814062 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 15:50:29.827722 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 15:50:30.083665 iscsid[897]: iscsid shutting down. Dec 13 15:50:29.827750 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 15:50:29.827831 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 15:50:29.827850 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 15:50:29.852914 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 15:50:29.853044 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 15:50:29.871624 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 15:50:29.873085 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 15:50:29.873305 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 15:50:29.988551 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 15:50:29.988791 systemd[1]: Stopped network-cleanup.service. Dec 13 15:50:29.998079 systemd[1]: Reached target initrd-switch-root.target. Dec 13 15:50:30.014560 systemd[1]: Starting initrd-switch-root.service... Dec 13 15:50:30.039276 systemd[1]: Switching root. Dec 13 15:50:30.083958 systemd-journald[269]: Journal stopped Dec 13 15:50:33.919759 systemd-journald[269]: Received SIGTERM from PID 1 (n/a). Dec 13 15:50:33.919773 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 15:50:33.919781 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 15:50:33.919787 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 15:50:33.919792 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 15:50:33.919798 kernel: SELinux: policy capability open_perms=1 Dec 13 15:50:33.919803 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 15:50:33.919809 kernel: SELinux: policy capability always_check_network=0 Dec 13 15:50:33.919814 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 15:50:33.919821 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 15:50:33.919826 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 15:50:33.919831 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 15:50:33.919837 systemd[1]: Successfully loaded SELinux policy in 322.607ms. Dec 13 15:50:33.919844 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.224ms. Dec 13 15:50:33.919852 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 15:50:33.919859 systemd[1]: Detected architecture x86-64. Dec 13 15:50:33.919865 systemd[1]: Detected first boot. Dec 13 15:50:33.919871 systemd[1]: Hostname set to . Dec 13 15:50:33.919877 systemd[1]: Initializing machine ID from random generator. Dec 13 15:50:33.919883 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 15:50:33.919889 systemd[1]: Populated /etc with preset unit settings. Dec 13 15:50:33.919896 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 15:50:33.919903 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 15:50:33.919909 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 15:50:33.919916 kernel: kauditd_printk_skb: 49 callbacks suppressed Dec 13 15:50:33.919921 kernel: audit: type=1334 audit(1734105032.418:92): prog-id=12 op=LOAD Dec 13 15:50:33.919927 kernel: audit: type=1334 audit(1734105032.418:93): prog-id=3 op=UNLOAD Dec 13 15:50:33.919933 kernel: audit: type=1334 audit(1734105032.463:94): prog-id=13 op=LOAD Dec 13 15:50:33.919939 kernel: audit: type=1334 audit(1734105032.508:95): prog-id=14 op=LOAD Dec 13 15:50:33.919944 kernel: audit: type=1334 audit(1734105032.508:96): prog-id=4 op=UNLOAD Dec 13 15:50:33.919950 kernel: audit: type=1334 audit(1734105032.508:97): prog-id=5 op=UNLOAD Dec 13 15:50:33.919956 kernel: audit: type=1334 audit(1734105032.551:98): prog-id=15 op=LOAD Dec 13 15:50:33.919961 kernel: audit: type=1334 audit(1734105032.551:99): prog-id=12 op=UNLOAD Dec 13 15:50:33.919967 kernel: audit: type=1334 audit(1734105032.593:100): prog-id=16 op=LOAD Dec 13 15:50:33.919972 kernel: audit: type=1334 audit(1734105032.633:101): prog-id=17 op=LOAD Dec 13 15:50:33.919978 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 15:50:33.919984 systemd[1]: Stopped iscsid.service. Dec 13 15:50:33.919991 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 15:50:33.919997 systemd[1]: Stopped initrd-switch-root.service. Dec 13 15:50:33.920003 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 15:50:33.920011 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 15:50:33.920018 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 15:50:33.920024 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 15:50:33.920031 systemd[1]: Created slice system-getty.slice. Dec 13 15:50:33.920038 systemd[1]: Created slice system-modprobe.slice. Dec 13 15:50:33.920045 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 15:50:33.920051 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 15:50:33.920057 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 15:50:33.920064 systemd[1]: Created slice user.slice. Dec 13 15:50:33.920070 systemd[1]: Started systemd-ask-password-console.path. Dec 13 15:50:33.920076 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 15:50:33.920083 systemd[1]: Set up automount boot.automount. Dec 13 15:50:33.920089 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 15:50:33.920096 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 15:50:33.920103 systemd[1]: Stopped target initrd-fs.target. Dec 13 15:50:33.920109 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 15:50:33.920115 systemd[1]: Reached target integritysetup.target. Dec 13 15:50:33.920122 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 15:50:33.920128 systemd[1]: Reached target remote-fs.target. Dec 13 15:50:33.920134 systemd[1]: Reached target slices.target. Dec 13 15:50:33.920142 systemd[1]: Reached target swap.target. Dec 13 15:50:33.920148 systemd[1]: Reached target torcx.target. Dec 13 15:50:33.920154 systemd[1]: Reached target veritysetup.target. Dec 13 15:50:33.920161 systemd[1]: Listening on systemd-coredump.socket. Dec 13 15:50:33.920168 systemd[1]: Listening on systemd-initctl.socket. Dec 13 15:50:33.920175 systemd[1]: Listening on systemd-networkd.socket. Dec 13 15:50:33.920182 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 15:50:33.920188 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 15:50:33.920194 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 15:50:33.920201 systemd[1]: Mounting dev-hugepages.mount... Dec 13 15:50:33.920207 systemd[1]: Mounting dev-mqueue.mount... Dec 13 15:50:33.920214 systemd[1]: Mounting media.mount... Dec 13 15:50:33.920220 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:50:33.920227 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 15:50:33.920234 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 15:50:33.920241 systemd[1]: Mounting tmp.mount... Dec 13 15:50:33.920247 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 15:50:33.920254 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 15:50:33.920260 systemd[1]: Starting kmod-static-nodes.service... Dec 13 15:50:33.920266 systemd[1]: Starting modprobe@configfs.service... Dec 13 15:50:33.920273 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 15:50:33.920279 systemd[1]: Starting modprobe@drm.service... Dec 13 15:50:33.920286 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 15:50:33.920293 systemd[1]: Starting modprobe@fuse.service... Dec 13 15:50:33.920300 kernel: fuse: init (API version 7.34) Dec 13 15:50:33.920306 systemd[1]: Starting modprobe@loop.service... Dec 13 15:50:33.920312 kernel: loop: module loaded Dec 13 15:50:33.920318 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 15:50:33.920325 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 15:50:33.920331 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 15:50:33.920338 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 15:50:33.920344 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 15:50:33.920352 systemd[1]: Stopped systemd-journald.service. Dec 13 15:50:33.920358 systemd[1]: Starting systemd-journald.service... Dec 13 15:50:33.920365 systemd[1]: Starting systemd-modules-load.service... Dec 13 15:50:33.920373 systemd-journald[1255]: Journal started Dec 13 15:50:33.920399 systemd-journald[1255]: Runtime Journal (/run/log/journal/de6e206965fc49fcb4a7425d223dda70) is 8.0M, max 640.1M, 632.1M free. Dec 13 15:50:30.518000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 15:50:30.786000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 15:50:30.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 15:50:30.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 15:50:30.788000 audit: BPF prog-id=10 op=LOAD Dec 13 15:50:30.788000 audit: BPF prog-id=10 op=UNLOAD Dec 13 15:50:30.788000 audit: BPF prog-id=11 op=LOAD Dec 13 15:50:30.788000 audit: BPF prog-id=11 op=UNLOAD Dec 13 15:50:30.857000 audit[1144]: AVC avc: denied { associate } for pid=1144 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 15:50:30.857000 audit[1144]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001a78e2 a1=c00002ce58 a2=c00002b100 a3=32 items=0 ppid=1127 pid=1144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:50:30.857000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 15:50:30.883000 audit[1144]: AVC avc: denied { associate } for pid=1144 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 15:50:30.883000 audit[1144]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001a79b9 a2=1ed a3=0 items=2 ppid=1127 pid=1144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:50:30.883000 audit: CWD cwd="/" Dec 13 15:50:30.883000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:30.883000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:30.883000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 15:50:32.418000 audit: BPF prog-id=12 op=LOAD Dec 13 15:50:32.418000 audit: BPF prog-id=3 op=UNLOAD Dec 13 15:50:32.463000 audit: BPF prog-id=13 op=LOAD Dec 13 15:50:32.508000 audit: BPF prog-id=14 op=LOAD Dec 13 15:50:32.508000 audit: BPF prog-id=4 op=UNLOAD Dec 13 15:50:32.508000 audit: BPF prog-id=5 op=UNLOAD Dec 13 15:50:32.551000 audit: BPF prog-id=15 op=LOAD Dec 13 15:50:32.551000 audit: BPF prog-id=12 op=UNLOAD Dec 13 15:50:32.593000 audit: BPF prog-id=16 op=LOAD Dec 13 15:50:32.633000 audit: BPF prog-id=17 op=LOAD Dec 13 15:50:32.633000 audit: BPF prog-id=13 op=UNLOAD Dec 13 15:50:32.633000 audit: BPF prog-id=14 op=UNLOAD Dec 13 15:50:32.653000 audit: BPF prog-id=18 op=LOAD Dec 13 15:50:32.653000 audit: BPF prog-id=15 op=UNLOAD Dec 13 15:50:32.653000 audit: BPF prog-id=19 op=LOAD Dec 13 15:50:32.653000 audit: BPF prog-id=20 op=LOAD Dec 13 15:50:32.653000 audit: BPF prog-id=16 op=UNLOAD Dec 13 15:50:32.653000 audit: BPF prog-id=17 op=UNLOAD Dec 13 15:50:32.653000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:32.692000 audit: BPF prog-id=18 op=UNLOAD Dec 13 15:50:32.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:32.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:32.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:33.835000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:33.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:33.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:33.892000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:33.892000 audit: BPF prog-id=21 op=LOAD Dec 13 15:50:33.893000 audit: BPF prog-id=22 op=LOAD Dec 13 15:50:33.893000 audit: BPF prog-id=23 op=LOAD Dec 13 15:50:33.893000 audit: BPF prog-id=19 op=UNLOAD Dec 13 15:50:33.893000 audit: BPF prog-id=20 op=UNLOAD Dec 13 15:50:33.917000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 15:50:33.917000 audit[1255]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffecb65f0a0 a2=4000 a3=7ffecb65f13c items=0 ppid=1 pid=1255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:50:33.917000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 15:50:30.856150 /usr/lib/systemd/system-generators/torcx-generator[1144]: time="2024-12-13T15:50:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 15:50:32.417256 systemd[1]: Queued start job for default target multi-user.target. Dec 13 15:50:30.856629 /usr/lib/systemd/system-generators/torcx-generator[1144]: time="2024-12-13T15:50:30Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 15:50:32.654174 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 15:50:30.856645 /usr/lib/systemd/system-generators/torcx-generator[1144]: time="2024-12-13T15:50:30Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 15:50:30.856668 /usr/lib/systemd/system-generators/torcx-generator[1144]: time="2024-12-13T15:50:30Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 15:50:30.856676 /usr/lib/systemd/system-generators/torcx-generator[1144]: time="2024-12-13T15:50:30Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 15:50:30.856699 /usr/lib/systemd/system-generators/torcx-generator[1144]: time="2024-12-13T15:50:30Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 15:50:30.856709 /usr/lib/systemd/system-generators/torcx-generator[1144]: time="2024-12-13T15:50:30Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 15:50:30.856853 /usr/lib/systemd/system-generators/torcx-generator[1144]: time="2024-12-13T15:50:30Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 15:50:30.856883 /usr/lib/systemd/system-generators/torcx-generator[1144]: time="2024-12-13T15:50:30Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 15:50:30.856893 /usr/lib/systemd/system-generators/torcx-generator[1144]: time="2024-12-13T15:50:30Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 15:50:30.857299 /usr/lib/systemd/system-generators/torcx-generator[1144]: time="2024-12-13T15:50:30Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 15:50:30.857326 /usr/lib/systemd/system-generators/torcx-generator[1144]: time="2024-12-13T15:50:30Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 15:50:30.857340 /usr/lib/systemd/system-generators/torcx-generator[1144]: time="2024-12-13T15:50:30Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 15:50:30.857351 /usr/lib/systemd/system-generators/torcx-generator[1144]: time="2024-12-13T15:50:30Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 15:50:30.857363 /usr/lib/systemd/system-generators/torcx-generator[1144]: time="2024-12-13T15:50:30Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 15:50:30.857374 /usr/lib/systemd/system-generators/torcx-generator[1144]: time="2024-12-13T15:50:30Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 15:50:32.060775 /usr/lib/systemd/system-generators/torcx-generator[1144]: time="2024-12-13T15:50:32Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 15:50:32.060915 /usr/lib/systemd/system-generators/torcx-generator[1144]: time="2024-12-13T15:50:32Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 15:50:32.060967 /usr/lib/systemd/system-generators/torcx-generator[1144]: time="2024-12-13T15:50:32Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 15:50:32.061066 /usr/lib/systemd/system-generators/torcx-generator[1144]: time="2024-12-13T15:50:32Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 15:50:32.061095 /usr/lib/systemd/system-generators/torcx-generator[1144]: time="2024-12-13T15:50:32Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 15:50:32.061128 /usr/lib/systemd/system-generators/torcx-generator[1144]: time="2024-12-13T15:50:32Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 15:50:33.951665 systemd[1]: Starting systemd-network-generator.service... Dec 13 15:50:33.973536 systemd[1]: Starting systemd-remount-fs.service... Dec 13 15:50:33.995536 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 15:50:34.027975 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 15:50:34.027995 systemd[1]: Stopped verity-setup.service. Dec 13 15:50:34.034000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:34.062531 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:50:34.076530 systemd[1]: Started systemd-journald.service. Dec 13 15:50:34.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:34.085044 systemd[1]: Mounted dev-hugepages.mount. Dec 13 15:50:34.092759 systemd[1]: Mounted dev-mqueue.mount. Dec 13 15:50:34.099732 systemd[1]: Mounted media.mount. Dec 13 15:50:34.106749 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 15:50:34.115723 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 15:50:34.123581 systemd[1]: Mounted tmp.mount. Dec 13 15:50:34.130807 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 15:50:34.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:34.139823 systemd[1]: Finished kmod-static-nodes.service. Dec 13 15:50:34.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:34.148885 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 15:50:34.149008 systemd[1]: Finished modprobe@configfs.service. Dec 13 15:50:34.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:34.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:34.157920 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 15:50:34.158056 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 15:50:34.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:34.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:34.167046 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 15:50:34.167244 systemd[1]: Finished modprobe@drm.service. Dec 13 15:50:34.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:34.175000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:34.176335 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 15:50:34.176670 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 15:50:34.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:34.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:34.185346 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 15:50:34.185688 systemd[1]: Finished modprobe@fuse.service. Dec 13 15:50:34.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:34.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:34.194322 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 15:50:34.194790 systemd[1]: Finished modprobe@loop.service. Dec 13 15:50:34.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:34.203000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:34.204354 systemd[1]: Finished systemd-modules-load.service. Dec 13 15:50:34.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:34.213474 systemd[1]: Finished systemd-network-generator.service. Dec 13 15:50:34.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:34.222332 systemd[1]: Finished systemd-remount-fs.service. Dec 13 15:50:34.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:34.231282 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 15:50:34.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:34.240815 systemd[1]: Reached target network-pre.target. Dec 13 15:50:34.252373 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 15:50:34.263105 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 15:50:34.269738 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 15:50:34.273573 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 15:50:34.282967 systemd[1]: Starting systemd-journal-flush.service... Dec 13 15:50:34.291626 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 15:50:34.292118 systemd[1]: Starting systemd-random-seed.service... Dec 13 15:50:34.292330 systemd-journald[1255]: Time spent on flushing to /var/log/journal/de6e206965fc49fcb4a7425d223dda70 is 15.083ms for 1598 entries. Dec 13 15:50:34.292330 systemd-journald[1255]: System Journal (/var/log/journal/de6e206965fc49fcb4a7425d223dda70) is 8.0M, max 195.6M, 187.6M free. Dec 13 15:50:34.333995 systemd-journald[1255]: Received client request to flush runtime journal. Dec 13 15:50:34.306632 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 15:50:34.307167 systemd[1]: Starting systemd-sysctl.service... Dec 13 15:50:34.317128 systemd[1]: Starting systemd-sysusers.service... Dec 13 15:50:34.324267 systemd[1]: Starting systemd-udev-settle.service... Dec 13 15:50:34.331627 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 15:50:34.339645 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 15:50:34.347716 systemd[1]: Finished systemd-journal-flush.service. Dec 13 15:50:34.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:34.355755 systemd[1]: Finished systemd-random-seed.service. Dec 13 15:50:34.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:34.363672 systemd[1]: Finished systemd-sysctl.service. Dec 13 15:50:34.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:34.371692 systemd[1]: Finished systemd-sysusers.service. Dec 13 15:50:34.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:34.380860 systemd[1]: Reached target first-boot-complete.target. Dec 13 15:50:34.389254 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 15:50:34.398461 udevadm[1270]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 15:50:34.407909 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 15:50:34.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:34.587280 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 15:50:34.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:34.597000 audit: BPF prog-id=24 op=LOAD Dec 13 15:50:34.597000 audit: BPF prog-id=25 op=LOAD Dec 13 15:50:34.597000 audit: BPF prog-id=7 op=UNLOAD Dec 13 15:50:34.597000 audit: BPF prog-id=8 op=UNLOAD Dec 13 15:50:34.599189 systemd[1]: Starting systemd-udevd.service... Dec 13 15:50:34.614845 systemd-udevd[1274]: Using default interface naming scheme 'v252'. Dec 13 15:50:34.632692 systemd[1]: Started systemd-udevd.service. Dec 13 15:50:34.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:34.642878 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Dec 13 15:50:34.644074 systemd[1]: Starting systemd-networkd.service... Dec 13 15:50:34.643000 audit: BPF prog-id=26 op=LOAD Dec 13 15:50:34.662498 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Dec 13 15:50:34.662573 kernel: ACPI: button: Sleep Button [SLPB] Dec 13 15:50:34.675000 audit: BPF prog-id=27 op=LOAD Dec 13 15:50:34.675000 audit: BPF prog-id=28 op=LOAD Dec 13 15:50:34.675000 audit: BPF prog-id=29 op=LOAD Dec 13 15:50:34.676491 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 15:50:34.677168 systemd[1]: Starting systemd-userdbd.service... Dec 13 15:50:34.674000 audit[1290]: AVC avc: denied { confidentiality } for pid=1290 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 15:50:34.696490 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Dec 13 15:50:34.696525 kernel: IPMI message handler: version 39.2 Dec 13 15:50:34.696548 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1285) Dec 13 15:50:34.713705 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 15:50:34.725490 kernel: ACPI: button: Power Button [PWRF] Dec 13 15:50:34.674000 audit[1290]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7ff17f80a010 a1=11e65c a2=7ff181625bc5 a3=5 items=312 ppid=1274 pid=1290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:50:34.674000 audit: CWD cwd="/" Dec 13 15:50:34.674000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=1 name=(null) inode=25865 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=2 name=(null) inode=25865 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=3 name=(null) inode=25866 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=4 name=(null) inode=25865 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=5 name=(null) inode=25867 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=6 name=(null) inode=25865 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=7 name=(null) inode=25868 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=8 name=(null) inode=25868 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=9 name=(null) inode=25869 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=10 name=(null) inode=25868 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=11 name=(null) inode=25870 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=12 name=(null) inode=25868 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=13 name=(null) inode=25871 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=14 name=(null) inode=25868 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=15 name=(null) inode=25872 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=16 name=(null) inode=25868 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=17 name=(null) inode=25873 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=18 name=(null) inode=25865 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=19 name=(null) inode=25874 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=20 name=(null) inode=25874 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=21 name=(null) inode=25875 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=22 name=(null) inode=25874 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=23 name=(null) inode=25876 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=24 name=(null) inode=25874 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=25 name=(null) inode=25877 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=26 name=(null) inode=25874 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=27 name=(null) inode=25878 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=28 name=(null) inode=25874 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=29 name=(null) inode=25879 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=30 name=(null) inode=25865 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=31 name=(null) inode=25880 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=32 name=(null) inode=25880 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=33 name=(null) inode=25881 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=34 name=(null) inode=25880 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=35 name=(null) inode=25882 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=36 name=(null) inode=25880 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=37 name=(null) inode=25883 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=38 name=(null) inode=25880 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=39 name=(null) inode=25884 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=40 name=(null) inode=25880 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=41 name=(null) inode=25885 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=42 name=(null) inode=25865 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=43 name=(null) inode=25886 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=44 name=(null) inode=25886 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=45 name=(null) inode=25887 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=46 name=(null) inode=25886 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=47 name=(null) inode=25888 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=48 name=(null) inode=25886 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=49 name=(null) inode=25889 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=50 name=(null) inode=25886 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=51 name=(null) inode=25890 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=52 name=(null) inode=25886 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=53 name=(null) inode=25891 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=54 name=(null) inode=25865 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=55 name=(null) inode=25892 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=56 name=(null) inode=25892 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=57 name=(null) inode=25893 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=58 name=(null) inode=25892 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=59 name=(null) inode=25894 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=60 name=(null) inode=25892 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=61 name=(null) inode=25895 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=62 name=(null) inode=25892 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=63 name=(null) inode=25896 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=64 name=(null) inode=25892 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=65 name=(null) inode=25897 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=66 name=(null) inode=25865 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=67 name=(null) inode=25898 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=68 name=(null) inode=25898 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=69 name=(null) inode=25899 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=70 name=(null) inode=25898 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=71 name=(null) inode=25900 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=72 name=(null) inode=25898 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=73 name=(null) inode=25901 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=74 name=(null) inode=25898 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=75 name=(null) inode=25902 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=76 name=(null) inode=25898 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=77 name=(null) inode=25903 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=78 name=(null) inode=25865 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=79 name=(null) inode=25904 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=80 name=(null) inode=25904 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=81 name=(null) inode=25905 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=82 name=(null) inode=25904 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=83 name=(null) inode=25906 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=84 name=(null) inode=25904 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=85 name=(null) inode=25907 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=86 name=(null) inode=25904 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=87 name=(null) inode=25908 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=88 name=(null) inode=25904 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=89 name=(null) inode=25909 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=90 name=(null) inode=25865 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=91 name=(null) inode=25910 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=92 name=(null) inode=25910 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=93 name=(null) inode=25911 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=94 name=(null) inode=25910 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=95 name=(null) inode=25912 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=96 name=(null) inode=25910 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=97 name=(null) inode=25913 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=98 name=(null) inode=25910 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=99 name=(null) inode=25914 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=100 name=(null) inode=25910 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=101 name=(null) inode=25915 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=102 name=(null) inode=25865 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=103 name=(null) inode=25916 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=104 name=(null) inode=25916 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=105 name=(null) inode=25917 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=106 name=(null) inode=25916 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=107 name=(null) inode=25918 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=108 name=(null) inode=25916 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=109 name=(null) inode=25919 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=110 name=(null) inode=25916 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=111 name=(null) inode=25920 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=112 name=(null) inode=25916 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=113 name=(null) inode=25921 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=114 name=(null) inode=25865 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=115 name=(null) inode=25922 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=116 name=(null) inode=25922 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=117 name=(null) inode=25923 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=118 name=(null) inode=25922 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=119 name=(null) inode=25924 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=120 name=(null) inode=25922 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=121 name=(null) inode=25925 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=122 name=(null) inode=25922 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=123 name=(null) inode=25926 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=124 name=(null) inode=25922 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=125 name=(null) inode=25927 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=126 name=(null) inode=25865 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=127 name=(null) inode=25928 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=128 name=(null) inode=25928 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=129 name=(null) inode=25929 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=130 name=(null) inode=25928 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=131 name=(null) inode=25930 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=132 name=(null) inode=25928 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=133 name=(null) inode=25931 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=134 name=(null) inode=25928 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=135 name=(null) inode=25932 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=136 name=(null) inode=25928 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=137 name=(null) inode=25933 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=138 name=(null) inode=25865 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=139 name=(null) inode=25934 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=140 name=(null) inode=25934 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=141 name=(null) inode=25935 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=142 name=(null) inode=25934 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=143 name=(null) inode=25936 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=144 name=(null) inode=25934 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=145 name=(null) inode=25937 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=146 name=(null) inode=25934 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=147 name=(null) inode=25938 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=148 name=(null) inode=25934 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=149 name=(null) inode=25939 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=150 name=(null) inode=25865 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=151 name=(null) inode=25940 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=152 name=(null) inode=25940 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=153 name=(null) inode=25941 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=154 name=(null) inode=25940 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=155 name=(null) inode=25942 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=156 name=(null) inode=25940 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=157 name=(null) inode=25943 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=158 name=(null) inode=25940 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=159 name=(null) inode=25944 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=160 name=(null) inode=25940 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=161 name=(null) inode=25945 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=162 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=163 name=(null) inode=25946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=164 name=(null) inode=25946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=165 name=(null) inode=25947 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=166 name=(null) inode=25946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=167 name=(null) inode=25948 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=168 name=(null) inode=25946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=169 name=(null) inode=25949 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=170 name=(null) inode=25949 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=171 name=(null) inode=25950 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=172 name=(null) inode=25949 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=173 name=(null) inode=25951 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=174 name=(null) inode=25949 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=175 name=(null) inode=25952 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=176 name=(null) inode=25949 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=177 name=(null) inode=25953 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=178 name=(null) inode=25949 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=179 name=(null) inode=25954 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=180 name=(null) inode=25946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=181 name=(null) inode=25955 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=182 name=(null) inode=25955 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=183 name=(null) inode=25956 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=184 name=(null) inode=25955 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=185 name=(null) inode=25957 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=186 name=(null) inode=25955 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=187 name=(null) inode=25958 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=188 name=(null) inode=25955 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=189 name=(null) inode=25959 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=190 name=(null) inode=25955 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=191 name=(null) inode=25960 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=192 name=(null) inode=25946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=193 name=(null) inode=25961 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=194 name=(null) inode=25961 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=195 name=(null) inode=25962 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=196 name=(null) inode=25961 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=197 name=(null) inode=25963 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=198 name=(null) inode=25961 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=199 name=(null) inode=25964 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=200 name=(null) inode=25961 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=201 name=(null) inode=25965 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=202 name=(null) inode=25961 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=203 name=(null) inode=25966 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=204 name=(null) inode=25946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=205 name=(null) inode=25967 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=206 name=(null) inode=25967 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=207 name=(null) inode=25968 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=208 name=(null) inode=25967 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=209 name=(null) inode=25969 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=210 name=(null) inode=25967 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=211 name=(null) inode=25970 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=212 name=(null) inode=25967 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=213 name=(null) inode=25971 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=214 name=(null) inode=25967 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=215 name=(null) inode=25972 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=216 name=(null) inode=25946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=217 name=(null) inode=25973 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=218 name=(null) inode=25973 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=219 name=(null) inode=25974 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=220 name=(null) inode=25973 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=221 name=(null) inode=25975 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=222 name=(null) inode=25973 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=223 name=(null) inode=25976 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=224 name=(null) inode=25973 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=225 name=(null) inode=25977 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=226 name=(null) inode=25973 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=227 name=(null) inode=25978 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=228 name=(null) inode=25946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=229 name=(null) inode=25979 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=230 name=(null) inode=25979 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=231 name=(null) inode=25980 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=232 name=(null) inode=25979 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=233 name=(null) inode=25981 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=234 name=(null) inode=25979 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=235 name=(null) inode=25982 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=236 name=(null) inode=25979 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=237 name=(null) inode=25983 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=238 name=(null) inode=25979 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=239 name=(null) inode=25984 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=240 name=(null) inode=25946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=241 name=(null) inode=25985 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=242 name=(null) inode=25985 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=243 name=(null) inode=25986 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=244 name=(null) inode=25985 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=245 name=(null) inode=25987 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=246 name=(null) inode=25985 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=247 name=(null) inode=25988 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=248 name=(null) inode=25985 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=249 name=(null) inode=25989 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=250 name=(null) inode=25985 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=251 name=(null) inode=25990 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=252 name=(null) inode=25946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=253 name=(null) inode=25991 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=254 name=(null) inode=25991 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=255 name=(null) inode=25992 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=256 name=(null) inode=25991 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=257 name=(null) inode=25993 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=258 name=(null) inode=25991 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=259 name=(null) inode=25994 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=260 name=(null) inode=25991 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=261 name=(null) inode=25995 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=262 name=(null) inode=25991 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=263 name=(null) inode=25996 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=264 name=(null) inode=25946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=265 name=(null) inode=25997 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=266 name=(null) inode=25997 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=267 name=(null) inode=25998 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=268 name=(null) inode=25997 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=269 name=(null) inode=25999 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=270 name=(null) inode=25997 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=271 name=(null) inode=26000 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=272 name=(null) inode=25997 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=273 name=(null) inode=26001 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=274 name=(null) inode=25997 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=275 name=(null) inode=26002 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=276 name=(null) inode=25946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=277 name=(null) inode=26003 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=278 name=(null) inode=26003 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=279 name=(null) inode=26004 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=280 name=(null) inode=26003 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=281 name=(null) inode=26005 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=282 name=(null) inode=26003 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=283 name=(null) inode=26006 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=284 name=(null) inode=26003 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=285 name=(null) inode=26007 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=286 name=(null) inode=26003 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=287 name=(null) inode=26008 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=288 name=(null) inode=25946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=289 name=(null) inode=26009 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=290 name=(null) inode=26009 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=291 name=(null) inode=26010 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=292 name=(null) inode=26009 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=293 name=(null) inode=26011 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=294 name=(null) inode=26009 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=295 name=(null) inode=26012 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=296 name=(null) inode=26009 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=297 name=(null) inode=26013 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=298 name=(null) inode=26009 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=299 name=(null) inode=26014 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=300 name=(null) inode=25946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=301 name=(null) inode=26015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=302 name=(null) inode=26015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=303 name=(null) inode=26016 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=304 name=(null) inode=26015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=305 name=(null) inode=26017 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=306 name=(null) inode=26015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=307 name=(null) inode=26018 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=308 name=(null) inode=26015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=309 name=(null) inode=26019 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=310 name=(null) inode=26015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PATH item=311 name=(null) inode=26020 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:50:34.674000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 15:50:34.791960 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Dec 13 15:50:34.829388 kernel: ipmi device interface Dec 13 15:50:34.829404 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Dec 13 15:50:34.829501 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Dec 13 15:50:34.836516 systemd[1]: Started systemd-userdbd.service. Dec 13 15:50:34.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:34.845491 kernel: ipmi_si: IPMI System Interface driver Dec 13 15:50:34.845526 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Dec 13 15:50:34.876375 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Dec 13 15:50:34.876464 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Dec 13 15:50:34.943003 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Dec 13 15:50:34.943020 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Dec 13 15:50:34.943031 kernel: iTCO_vendor_support: vendor-support=0 Dec 13 15:50:34.943041 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Dec 13 15:50:35.070691 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Dec 13 15:50:35.070774 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Dec 13 15:50:35.070851 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Dec 13 15:50:35.070913 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Dec 13 15:50:35.070974 kernel: ipmi_si: Adding ACPI-specified kcs state machine Dec 13 15:50:35.070988 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Dec 13 15:50:35.116325 systemd-networkd[1315]: bond0: netdev ready Dec 13 15:50:35.119004 systemd-networkd[1315]: lo: Link UP Dec 13 15:50:35.119008 systemd-networkd[1315]: lo: Gained carrier Dec 13 15:50:35.119618 systemd-networkd[1315]: Enumeration completed Dec 13 15:50:35.119694 systemd[1]: Started systemd-networkd.service. Dec 13 15:50:35.120128 systemd-networkd[1315]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Dec 13 15:50:35.124019 systemd-networkd[1315]: enp1s0f1np1: Configuring with /etc/systemd/network/10-1c:34:da:5c:29:69.network. Dec 13 15:50:35.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:35.153453 kernel: intel_rapl_common: Found RAPL domain package Dec 13 15:50:35.153484 kernel: intel_rapl_common: Found RAPL domain core Dec 13 15:50:35.153498 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Dec 13 15:50:35.153597 kernel: intel_rapl_common: Found RAPL domain dram Dec 13 15:50:35.204486 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20) Dec 13 15:50:35.303498 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Dec 13 15:50:35.322584 kernel: ipmi_ssif: IPMI SSIF Interface driver Dec 13 15:50:35.325771 systemd[1]: Finished systemd-udev-settle.service. Dec 13 15:50:35.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:35.334216 systemd[1]: Starting lvm2-activation-early.service... Dec 13 15:50:35.351262 lvm[1381]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 15:50:35.378921 systemd[1]: Finished lvm2-activation-early.service. Dec 13 15:50:35.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:35.387661 systemd[1]: Reached target cryptsetup.target. Dec 13 15:50:35.397115 systemd[1]: Starting lvm2-activation.service... Dec 13 15:50:35.399271 lvm[1382]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 15:50:35.426919 systemd[1]: Finished lvm2-activation.service. Dec 13 15:50:35.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:35.435624 systemd[1]: Reached target local-fs-pre.target. Dec 13 15:50:35.443570 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 15:50:35.443588 systemd[1]: Reached target local-fs.target. Dec 13 15:50:35.451579 systemd[1]: Reached target machines.target. Dec 13 15:50:35.460178 systemd[1]: Starting ldconfig.service... Dec 13 15:50:35.467999 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 15:50:35.468024 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:50:35.468553 systemd[1]: Starting systemd-boot-update.service... Dec 13 15:50:35.476981 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 15:50:35.488024 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 15:50:35.488652 systemd[1]: Starting systemd-sysext.service... Dec 13 15:50:35.488855 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1384 (bootctl) Dec 13 15:50:35.489547 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 15:50:35.502653 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 15:50:35.509948 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 15:50:35.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:35.514212 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 15:50:35.514294 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 15:50:35.545488 kernel: loop0: detected capacity change from 0 to 210664 Dec 13 15:50:35.638225 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 15:50:35.639811 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 15:50:35.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:35.683532 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Dec 13 15:50:35.683789 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 15:50:35.711458 systemd-fsck[1393]: fsck.fat 4.2 (2021-01-31) Dec 13 15:50:35.711458 systemd-fsck[1393]: /dev/sda1: 789 files, 119291/258078 clusters Dec 13 15:50:35.712827 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 15:50:35.724527 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link Dec 13 15:50:35.725613 systemd-networkd[1315]: enp1s0f0np0: Configuring with /etc/systemd/network/10-1c:34:da:5c:29:68.network. Dec 13 15:50:35.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:35.735453 systemd[1]: Mounting boot.mount... Dec 13 15:50:35.762490 kernel: loop1: detected capacity change from 0 to 210664 Dec 13 15:50:35.762528 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Dec 13 15:50:35.763987 systemd[1]: Mounted boot.mount. Dec 13 15:50:35.776384 (sd-sysext)[1398]: Using extensions 'kubernetes'. Dec 13 15:50:35.776573 (sd-sysext)[1398]: Merged extensions into '/usr'. Dec 13 15:50:35.799067 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:50:35.799770 systemd[1]: Mounting usr-share-oem.mount... Dec 13 15:50:35.806701 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 15:50:35.807323 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 15:50:35.814114 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 15:50:35.821089 systemd[1]: Starting modprobe@loop.service... Dec 13 15:50:35.827610 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 15:50:35.827674 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:50:35.827738 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:50:35.829367 systemd[1]: Finished systemd-boot-update.service. Dec 13 15:50:35.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:35.837749 systemd[1]: Mounted usr-share-oem.mount. Dec 13 15:50:35.844770 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 15:50:35.844840 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 15:50:35.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:35.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:35.857821 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 15:50:35.857911 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 15:50:35.869524 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Dec 13 15:50:35.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:35.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:35.884944 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 15:50:35.885097 systemd[1]: Finished modprobe@loop.service. Dec 13 15:50:35.894530 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link Dec 13 15:50:35.894584 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Dec 13 15:50:35.894607 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Dec 13 15:50:35.909308 ldconfig[1383]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 15:50:35.935222 systemd-networkd[1315]: bond0: Link UP Dec 13 15:50:35.935419 systemd-networkd[1315]: enp1s0f1np1: Link UP Dec 13 15:50:35.935555 systemd-networkd[1315]: enp1s0f1np1: Gained carrier Dec 13 15:50:35.936529 systemd-networkd[1315]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-1c:34:da:5c:29:68.network. Dec 13 15:50:35.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:35.941000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:35.941803 systemd[1]: Finished ldconfig.service. Dec 13 15:50:35.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:35.948838 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 15:50:35.948897 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 15:50:35.949414 systemd[1]: Finished systemd-sysext.service. Dec 13 15:50:35.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:35.965193 systemd[1]: Starting ensure-sysext.service... Dec 13 15:50:35.973490 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Dec 13 15:50:35.987080 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 15:50:35.994485 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Dec 13 15:50:35.999427 systemd-tmpfiles[1405]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 15:50:35.999941 systemd-tmpfiles[1405]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 15:50:36.002450 systemd-tmpfiles[1405]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 15:50:36.010705 systemd[1]: Reloading. Dec 13 15:50:36.016485 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Dec 13 15:50:36.031086 /usr/lib/systemd/system-generators/torcx-generator[1424]: time="2024-12-13T15:50:36Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 15:50:36.031109 /usr/lib/systemd/system-generators/torcx-generator[1424]: time="2024-12-13T15:50:36Z" level=info msg="torcx already run" Dec 13 15:50:36.036538 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Dec 13 15:50:36.056547 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Dec 13 15:50:36.075492 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Dec 13 15:50:36.094542 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Dec 13 15:50:36.097629 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 15:50:36.097637 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 15:50:36.108601 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 15:50:36.113531 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Dec 13 15:50:36.132517 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Dec 13 15:50:36.149000 audit: BPF prog-id=30 op=LOAD Dec 13 15:50:36.149000 audit: BPF prog-id=31 op=LOAD Dec 13 15:50:36.149000 audit: BPF prog-id=24 op=UNLOAD Dec 13 15:50:36.149000 audit: BPF prog-id=25 op=UNLOAD Dec 13 15:50:36.150486 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Dec 13 15:50:36.150000 audit: BPF prog-id=32 op=LOAD Dec 13 15:50:36.150000 audit: BPF prog-id=26 op=UNLOAD Dec 13 15:50:36.150000 audit: BPF prog-id=33 op=LOAD Dec 13 15:50:36.150000 audit: BPF prog-id=21 op=UNLOAD Dec 13 15:50:36.151000 audit: BPF prog-id=34 op=LOAD Dec 13 15:50:36.167000 audit: BPF prog-id=35 op=LOAD Dec 13 15:50:36.167000 audit: BPF prog-id=22 op=UNLOAD Dec 13 15:50:36.167000 audit: BPF prog-id=23 op=UNLOAD Dec 13 15:50:36.168515 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Dec 13 15:50:36.168000 audit: BPF prog-id=36 op=LOAD Dec 13 15:50:36.168000 audit: BPF prog-id=27 op=UNLOAD Dec 13 15:50:36.168000 audit: BPF prog-id=37 op=LOAD Dec 13 15:50:36.185000 audit: BPF prog-id=38 op=LOAD Dec 13 15:50:36.185000 audit: BPF prog-id=28 op=UNLOAD Dec 13 15:50:36.185000 audit: BPF prog-id=29 op=UNLOAD Dec 13 15:50:36.186520 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Dec 13 15:50:36.186690 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 15:50:36.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:36.203562 systemd[1]: Starting audit-rules.service... Dec 13 15:50:36.206555 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Dec 13 15:50:36.220137 systemd[1]: Starting clean-ca-certificates.service... Dec 13 15:50:36.219000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 15:50:36.219000 audit[1501]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd20f48fe0 a2=420 a3=0 items=0 ppid=1486 pid=1501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:50:36.219000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 15:50:36.220574 augenrules[1501]: No rules Dec 13 15:50:36.225516 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Dec 13 15:50:36.242203 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 15:50:36.243554 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Dec 13 15:50:36.262488 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Dec 13 15:50:36.262733 systemd[1]: Starting systemd-resolved.service... Dec 13 15:50:36.279487 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Dec 13 15:50:36.279948 systemd[1]: Starting systemd-timesyncd.service... Dec 13 15:50:36.280454 systemd-networkd[1315]: enp1s0f0np0: Link UP Dec 13 15:50:36.280634 systemd-networkd[1315]: bond0: Gained carrier Dec 13 15:50:36.280725 systemd-networkd[1315]: enp1s0f0np0: Gained carrier Dec 13 15:50:36.297623 systemd[1]: Starting systemd-update-utmp.service... Dec 13 15:50:36.312592 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Dec 13 15:50:36.312613 kernel: bond0: (slave enp1s0f1np1): link status definitely down, disabling slave Dec 13 15:50:36.312630 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Dec 13 15:50:36.344876 systemd[1]: Finished audit-rules.service. Dec 13 15:50:36.346485 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 10000 Mbps full duplex Dec 13 15:50:36.346506 kernel: bond0: active interface up! Dec 13 15:50:36.363785 systemd-networkd[1315]: enp1s0f1np1: Link DOWN Dec 13 15:50:36.363787 systemd-networkd[1315]: enp1s0f1np1: Lost carrier Dec 13 15:50:36.365705 systemd[1]: Finished clean-ca-certificates.service. Dec 13 15:50:36.373698 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 15:50:36.386698 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 15:50:36.387401 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 15:50:36.395159 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 15:50:36.402130 systemd[1]: Starting modprobe@loop.service... Dec 13 15:50:36.408582 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 15:50:36.408687 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:50:36.409437 systemd[1]: Starting systemd-update-done.service... Dec 13 15:50:36.414990 systemd-resolved[1508]: Positive Trust Anchors: Dec 13 15:50:36.414997 systemd-resolved[1508]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 15:50:36.415017 systemd-resolved[1508]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 15:50:36.416561 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 15:50:36.417356 systemd[1]: Started systemd-timesyncd.service. Dec 13 15:50:36.418855 systemd-resolved[1508]: Using system hostname 'ci-3510.3.6-a-a4f471fe95'. Dec 13 15:50:36.427112 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 15:50:36.427185 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 15:50:36.436829 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 15:50:36.436895 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 15:50:36.444818 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 15:50:36.444882 systemd[1]: Finished modprobe@loop.service. Dec 13 15:50:36.452825 systemd[1]: Finished systemd-update-done.service. Dec 13 15:50:36.461564 systemd[1]: Finished systemd-update-utmp.service. Dec 13 15:50:36.470104 systemd[1]: Reached target time-set.target. Dec 13 15:50:36.476644 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 15:50:36.477344 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 15:50:36.485161 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 15:50:36.492090 systemd[1]: Starting modprobe@loop.service... Dec 13 15:50:36.498588 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 15:50:36.498653 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:50:36.498711 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 15:50:36.499199 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 15:50:36.499263 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 15:50:36.507773 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 15:50:36.507834 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 15:50:36.521477 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 15:50:36.521540 systemd[1]: Finished modprobe@loop.service. Dec 13 15:50:36.529486 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Dec 13 15:50:36.531452 systemd-networkd[1315]: enp1s0f1np1: Link UP Dec 13 15:50:36.531616 systemd-timesyncd[1509]: Network configuration changed, trying to establish connection. Dec 13 15:50:36.533066 systemd-timesyncd[1509]: Network configuration changed, trying to establish connection. Dec 13 15:50:36.533088 systemd-networkd[1315]: enp1s0f1np1: Gained carrier Dec 13 15:50:36.533100 systemd-timesyncd[1509]: Network configuration changed, trying to establish connection. Dec 13 15:50:36.536756 systemd[1]: Started systemd-resolved.service. Dec 13 15:50:36.542725 systemd-timesyncd[1509]: Network configuration changed, trying to establish connection. Dec 13 15:50:36.545854 systemd[1]: Reached target network.target. Dec 13 15:50:36.559796 systemd[1]: Reached target nss-lookup.target. Dec 13 15:50:36.568486 kernel: bond0: (slave enp1s0f1np1): link status up, enabling it in 200 ms Dec 13 15:50:36.568553 kernel: bond0: (slave enp1s0f1np1): invalid new link 3 on slave Dec 13 15:50:36.591617 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:50:36.591775 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 15:50:36.592369 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 15:50:36.601083 systemd[1]: Starting modprobe@drm.service... Dec 13 15:50:36.609079 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 15:50:36.616077 systemd[1]: Starting modprobe@loop.service... Dec 13 15:50:36.622595 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 15:50:36.622661 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:50:36.623252 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 15:50:36.631581 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 15:50:36.631647 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 15:50:36.632328 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 15:50:36.632392 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 15:50:36.640769 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 15:50:36.640829 systemd[1]: Finished modprobe@drm.service. Dec 13 15:50:36.648754 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 15:50:36.648814 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 15:50:36.656753 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 15:50:36.656814 systemd[1]: Finished modprobe@loop.service. Dec 13 15:50:36.664821 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 15:50:36.664894 systemd[1]: Reached target sysinit.target. Dec 13 15:50:36.672576 systemd[1]: Started motdgen.path. Dec 13 15:50:36.679532 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 15:50:36.689590 systemd[1]: Started logrotate.timer. Dec 13 15:50:36.696553 systemd[1]: Started mdadm.timer. Dec 13 15:50:36.703518 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 15:50:36.711513 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 15:50:36.711526 systemd[1]: Reached target paths.target. Dec 13 15:50:36.718511 systemd[1]: Reached target timers.target. Dec 13 15:50:36.725636 systemd[1]: Listening on dbus.socket. Dec 13 15:50:36.733005 systemd[1]: Starting docker.socket... Dec 13 15:50:36.741036 systemd[1]: Listening on sshd.socket. Dec 13 15:50:36.747636 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:50:36.747666 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 15:50:36.747979 systemd[1]: Finished ensure-sysext.service. Dec 13 15:50:36.756666 systemd[1]: Listening on docker.socket. Dec 13 15:50:36.763990 systemd[1]: Reached target sockets.target. Dec 13 15:50:36.772565 systemd[1]: Reached target basic.target. Dec 13 15:50:36.786324 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 15:50:36.786339 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 15:50:36.786801 systemd[1]: Starting containerd.service... Dec 13 15:50:36.794486 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Dec 13 15:50:36.801979 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 15:50:36.811073 systemd[1]: Starting coreos-metadata.service... Dec 13 15:50:36.818130 systemd[1]: Starting dbus.service... Dec 13 15:50:36.824257 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 15:50:36.829757 jq[1534]: false Dec 13 15:50:36.831146 systemd[1]: Starting extend-filesystems.service... Dec 13 15:50:36.833449 coreos-metadata[1527]: Dec 13 15:50:36.833 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Dec 13 15:50:36.837597 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 15:50:36.838033 dbus-daemon[1533]: [system] SELinux support is enabled Dec 13 15:50:36.838411 systemd[1]: Starting motdgen.service... Dec 13 15:50:36.840124 extend-filesystems[1535]: Found loop1 Dec 13 15:50:36.860647 extend-filesystems[1535]: Found sda Dec 13 15:50:36.860647 extend-filesystems[1535]: Found sda1 Dec 13 15:50:36.860647 extend-filesystems[1535]: Found sda2 Dec 13 15:50:36.860647 extend-filesystems[1535]: Found sda3 Dec 13 15:50:36.860647 extend-filesystems[1535]: Found usr Dec 13 15:50:36.860647 extend-filesystems[1535]: Found sda4 Dec 13 15:50:36.860647 extend-filesystems[1535]: Found sda6 Dec 13 15:50:36.860647 extend-filesystems[1535]: Found sda7 Dec 13 15:50:36.860647 extend-filesystems[1535]: Found sda9 Dec 13 15:50:36.860647 extend-filesystems[1535]: Checking size of /dev/sda9 Dec 13 15:50:36.860647 extend-filesystems[1535]: Resized partition /dev/sda9 Dec 13 15:50:37.008577 kernel: EXT4-fs (sda9): resizing filesystem from 553472 to 116605649 blocks Dec 13 15:50:36.846319 systemd[1]: Starting prepare-helm.service... Dec 13 15:50:37.008711 coreos-metadata[1530]: Dec 13 15:50:36.843 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Dec 13 15:50:36.996259 dbus-daemon[1533]: [system] Successfully activated service 'org.freedesktop.systemd1' Dec 13 15:50:37.008920 extend-filesystems[1552]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 15:50:36.866263 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 15:50:36.884341 systemd[1]: Starting sshd-keygen.service... Dec 13 15:50:36.900901 systemd[1]: Starting systemd-logind.service... Dec 13 15:50:36.907624 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 15:50:36.908204 systemd[1]: Starting tcsd.service... Dec 13 15:50:37.025838 update_engine[1564]: I1213 15:50:36.971812 1564 main.cc:92] Flatcar Update Engine starting Dec 13 15:50:37.025838 update_engine[1564]: I1213 15:50:36.974781 1564 update_check_scheduler.cc:74] Next update check in 11m1s Dec 13 15:50:36.922493 systemd-logind[1562]: Watching system buttons on /dev/input/event3 (Power Button) Dec 13 15:50:37.026147 jq[1565]: true Dec 13 15:50:36.922505 systemd-logind[1562]: Watching system buttons on /dev/input/event2 (Sleep Button) Dec 13 15:50:36.922515 systemd-logind[1562]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Dec 13 15:50:37.026328 tar[1567]: linux-amd64/helm Dec 13 15:50:36.922679 systemd-logind[1562]: New seat seat0. Dec 13 15:50:37.026466 jq[1569]: true Dec 13 15:50:36.923893 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 15:50:37.027408 env[1570]: time="2024-12-13T15:50:37.004040260Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 15:50:37.027408 env[1570]: time="2024-12-13T15:50:37.012906251Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 15:50:37.027408 env[1570]: time="2024-12-13T15:50:37.016632551Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 15:50:37.027408 env[1570]: time="2024-12-13T15:50:37.017276548Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.1 Dec 13 15:50:37.027408 env[1570]: 73-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 15:50:37.027408 env[1570]: time="2024-12-13T15:50:37.017293246Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 15:50:37.027408 env[1570]: time="2024-12-13T15:50:37.017414791Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter Dec 13 15:50:37.027408 env[1570]: : skip plugin" type=io.containerd.snapshotter.v1 Dec 13 15:50:37.027408 env[1570]: time="2024-12-13T15:50:37.017424599Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 15:50:37.027408 env[1570]: time="2024-12-13T15:50:37.017431872Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 15:50:37.027408 env[1570]: time="2024-12-13T15:50:37.017437175Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 15:50:37.027408 env[1570]: time="2024-12-13T15:50:37.019218809Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 15:50:37.027408 env[1570]: time="2024-12-13T15:50:37.019348494Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 15:50:36.924269 systemd[1]: Starting update-engine.service... Dec 13 15:50:37.029750 env[1570]: time="2024-12-13T15:50:37.019420052Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 15:50:37.029750 env[1570]: time="2024-12-13T15:50:37.019429998Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 15:50:37.029750 env[1570]: time="2024-12-13T15:50:37.019455631Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 15:50:37.029750 env[1570]: time="2024-12-13T15:50:37.019463213Z" level=info msg="metadata content store policy set" policy=shared Dec 13 15:50:36.938098 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 15:50:37.029937 bash[1597]: Updated "/home/core/.ssh/authorized_keys" Dec 13 15:50:36.952894 systemd[1]: Started dbus.service. Dec 13 15:50:36.961328 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 15:50:36.961428 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 15:50:36.961594 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 15:50:36.961687 systemd[1]: Finished motdgen.service. Dec 13 15:50:36.978034 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 15:50:36.978131 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 15:50:37.001809 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Dec 13 15:50:37.001964 systemd[1]: Condition check resulted in tcsd.service being skipped. Dec 13 15:50:37.003056 systemd[1]: Started systemd-logind.service. Dec 13 15:50:37.021560 systemd[1]: Started update-engine.service. Dec 13 15:50:37.031824 env[1570]: time="2024-12-13T15:50:37.031810258Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 15:50:37.031866 env[1570]: time="2024-12-13T15:50:37.031826305Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 15:50:37.031866 env[1570]: time="2024-12-13T15:50:37.031834696Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 15:50:37.031866 env[1570]: time="2024-12-13T15:50:37.031852170Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 15:50:37.031866 env[1570]: time="2024-12-13T15:50:37.031860371Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 15:50:37.031971 env[1570]: time="2024-12-13T15:50:37.031867787Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 15:50:37.031971 env[1570]: time="2024-12-13T15:50:37.031874311Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 15:50:37.031971 env[1570]: time="2024-12-13T15:50:37.031882041Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 15:50:37.031971 env[1570]: time="2024-12-13T15:50:37.031892186Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 15:50:37.031971 env[1570]: time="2024-12-13T15:50:37.031899652Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 15:50:37.031971 env[1570]: time="2024-12-13T15:50:37.031906977Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 15:50:37.031971 env[1570]: time="2024-12-13T15:50:37.031913159Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 15:50:37.031971 env[1570]: time="2024-12-13T15:50:37.031959636Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 15:50:37.032151 env[1570]: time="2024-12-13T15:50:37.032003922Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 15:50:37.032151 env[1570]: time="2024-12-13T15:50:37.032135738Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 15:50:37.032151 env[1570]: time="2024-12-13T15:50:37.032149654Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 15:50:37.032222 env[1570]: time="2024-12-13T15:50:37.032156993Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 15:50:37.032222 env[1570]: time="2024-12-13T15:50:37.032180632Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 15:50:37.032222 env[1570]: time="2024-12-13T15:50:37.032188047Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 15:50:37.032222 env[1570]: time="2024-12-13T15:50:37.032194433Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 15:50:37.032222 env[1570]: time="2024-12-13T15:50:37.032200306Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 15:50:37.032222 env[1570]: time="2024-12-13T15:50:37.032206307Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 15:50:37.032222 env[1570]: time="2024-12-13T15:50:37.032213461Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 15:50:37.032222 env[1570]: time="2024-12-13T15:50:37.032219586Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 15:50:37.032411 env[1570]: time="2024-12-13T15:50:37.032225284Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 15:50:37.032411 env[1570]: time="2024-12-13T15:50:37.032232681Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 15:50:37.032411 env[1570]: time="2024-12-13T15:50:37.032291653Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 15:50:37.032411 env[1570]: time="2024-12-13T15:50:37.032300249Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 15:50:37.032411 env[1570]: time="2024-12-13T15:50:37.032307194Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 15:50:37.032411 env[1570]: time="2024-12-13T15:50:37.032312943Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 15:50:37.032411 env[1570]: time="2024-12-13T15:50:37.032320119Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 15:50:37.032411 env[1570]: time="2024-12-13T15:50:37.032325992Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 15:50:37.032411 env[1570]: time="2024-12-13T15:50:37.032335222Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 15:50:37.032411 env[1570]: time="2024-12-13T15:50:37.032356076Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 15:50:37.032744 env[1570]: time="2024-12-13T15:50:37.032681430Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 15:50:37.034836 env[1570]: time="2024-12-13T15:50:37.032783329Z" level=info msg="Connect containerd service" Dec 13 15:50:37.034836 env[1570]: time="2024-12-13T15:50:37.032874822Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 15:50:37.034836 env[1570]: time="2024-12-13T15:50:37.033235095Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 15:50:37.034836 env[1570]: time="2024-12-13T15:50:37.033325426Z" level=info msg="Start subscribing containerd event" Dec 13 15:50:37.034836 env[1570]: time="2024-12-13T15:50:37.033349414Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 15:50:37.034836 env[1570]: time="2024-12-13T15:50:37.033356844Z" level=info msg="Start recovering state" Dec 13 15:50:37.034836 env[1570]: time="2024-12-13T15:50:37.033372178Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 15:50:37.034836 env[1570]: time="2024-12-13T15:50:37.033387476Z" level=info msg="Start event monitor" Dec 13 15:50:37.034836 env[1570]: time="2024-12-13T15:50:37.033393769Z" level=info msg="containerd successfully booted in 0.030040s" Dec 13 15:50:37.034836 env[1570]: time="2024-12-13T15:50:37.033399870Z" level=info msg="Start snapshots syncer" Dec 13 15:50:37.034836 env[1570]: time="2024-12-13T15:50:37.033405399Z" level=info msg="Start cni network conf syncer for default" Dec 13 15:50:37.034836 env[1570]: time="2024-12-13T15:50:37.033410079Z" level=info msg="Start streaming server" Dec 13 15:50:37.032938 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 15:50:37.042606 systemd[1]: Started containerd.service. Dec 13 15:50:37.051340 systemd[1]: Started locksmithd.service. Dec 13 15:50:37.057597 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 15:50:37.057690 systemd[1]: Reached target system-config.target. Dec 13 15:50:37.065578 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 15:50:37.065647 systemd[1]: Reached target user-config.target. Dec 13 15:50:37.108723 locksmithd[1610]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 15:50:37.248939 tar[1567]: linux-amd64/LICENSE Dec 13 15:50:37.249031 tar[1567]: linux-amd64/README.md Dec 13 15:50:37.251729 systemd[1]: Finished prepare-helm.service. Dec 13 15:50:37.363515 kernel: EXT4-fs (sda9): resized filesystem to 116605649 Dec 13 15:50:37.392794 extend-filesystems[1552]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Dec 13 15:50:37.392794 extend-filesystems[1552]: old_desc_blocks = 1, new_desc_blocks = 56 Dec 13 15:50:37.392794 extend-filesystems[1552]: The filesystem on /dev/sda9 is now 116605649 (4k) blocks long. Dec 13 15:50:37.429524 extend-filesystems[1535]: Resized filesystem in /dev/sda9 Dec 13 15:50:37.429524 extend-filesystems[1535]: Found sdb Dec 13 15:50:37.393270 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 15:50:37.445597 sshd_keygen[1561]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 15:50:37.393350 systemd[1]: Finished extend-filesystems.service. Dec 13 15:50:37.448017 systemd[1]: Finished sshd-keygen.service. Dec 13 15:50:37.455375 systemd[1]: Starting issuegen.service... Dec 13 15:50:37.462754 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 15:50:37.462825 systemd[1]: Finished issuegen.service. Dec 13 15:50:37.470266 systemd[1]: Starting systemd-user-sessions.service... Dec 13 15:50:37.478793 systemd[1]: Finished systemd-user-sessions.service. Dec 13 15:50:37.487333 systemd[1]: Started getty@tty1.service. Dec 13 15:50:37.495150 systemd[1]: Started serial-getty@ttyS1.service. Dec 13 15:50:37.503680 systemd[1]: Reached target getty.target. Dec 13 15:50:37.593568 systemd-networkd[1315]: bond0: Gained IPv6LL Dec 13 15:50:37.593808 systemd-timesyncd[1509]: Network configuration changed, trying to establish connection. Dec 13 15:50:37.656791 systemd-timesyncd[1509]: Network configuration changed, trying to establish connection. Dec 13 15:50:37.656855 systemd-timesyncd[1509]: Network configuration changed, trying to establish connection. Dec 13 15:50:37.657760 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 15:50:37.667772 systemd[1]: Reached target network-online.target. Dec 13 15:50:37.676386 systemd[1]: Starting kubelet.service... Dec 13 15:50:38.300949 systemd[1]: Started kubelet.service. Dec 13 15:50:38.536558 kernel: mlx5_core 0000:01:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Dec 13 15:50:38.791432 kubelet[1637]: E1213 15:50:38.791345 1637 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 15:50:38.792655 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 15:50:38.792723 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 15:50:42.514789 login[1632]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 15:50:42.522973 login[1631]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 15:50:42.539204 systemd-logind[1562]: New session 1 of user core. Dec 13 15:50:42.539907 systemd[1]: Created slice user-500.slice. Dec 13 15:50:42.540437 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 15:50:42.542012 systemd-logind[1562]: New session 2 of user core. Dec 13 15:50:42.546633 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 15:50:42.547299 systemd[1]: Starting user@500.service... Dec 13 15:50:42.549472 (systemd)[1661]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:50:42.618178 systemd[1661]: Queued start job for default target default.target. Dec 13 15:50:42.618420 systemd[1661]: Reached target paths.target. Dec 13 15:50:42.618432 systemd[1661]: Reached target sockets.target. Dec 13 15:50:42.618440 systemd[1661]: Reached target timers.target. Dec 13 15:50:42.618448 systemd[1661]: Reached target basic.target. Dec 13 15:50:42.618469 systemd[1661]: Reached target default.target. Dec 13 15:50:42.618488 systemd[1661]: Startup finished in 65ms. Dec 13 15:50:42.618530 systemd[1]: Started user@500.service. Dec 13 15:50:42.619055 systemd[1]: Started session-1.scope. Dec 13 15:50:42.619410 systemd[1]: Started session-2.scope. Dec 13 15:50:42.969569 coreos-metadata[1527]: Dec 13 15:50:42.969 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Dec 13 15:50:42.970333 coreos-metadata[1530]: Dec 13 15:50:42.969 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Dec 13 15:50:43.969810 coreos-metadata[1530]: Dec 13 15:50:43.969 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Dec 13 15:50:43.970070 coreos-metadata[1527]: Dec 13 15:50:43.969 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Dec 13 15:50:44.086477 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:2 port 2:2 Dec 13 15:50:44.086634 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:2 Dec 13 15:50:45.025739 systemd[1]: Created slice system-sshd.slice. Dec 13 15:50:45.026371 systemd[1]: Started sshd@0-147.28.180.221:22-139.178.89.65:39364.service. Dec 13 15:50:45.076227 sshd[1682]: Accepted publickey for core from 139.178.89.65 port 39364 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:50:45.077842 sshd[1682]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:50:45.082772 systemd-logind[1562]: New session 3 of user core. Dec 13 15:50:45.083925 systemd[1]: Started session-3.scope. Dec 13 15:50:45.143437 systemd[1]: Started sshd@1-147.28.180.221:22-139.178.89.65:39372.service. Dec 13 15:50:45.180806 sshd[1687]: Accepted publickey for core from 139.178.89.65 port 39372 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:50:45.181523 sshd[1687]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:50:45.183890 systemd-logind[1562]: New session 4 of user core. Dec 13 15:50:45.184425 systemd[1]: Started session-4.scope. Dec 13 15:50:45.234643 sshd[1687]: pam_unix(sshd:session): session closed for user core Dec 13 15:50:45.236284 systemd[1]: sshd@1-147.28.180.221:22-139.178.89.65:39372.service: Deactivated successfully. Dec 13 15:50:45.236609 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 15:50:45.236965 systemd-logind[1562]: Session 4 logged out. Waiting for processes to exit. Dec 13 15:50:45.237456 systemd[1]: Started sshd@2-147.28.180.221:22-139.178.89.65:39378.service. Dec 13 15:50:45.237803 systemd-logind[1562]: Removed session 4. Dec 13 15:50:45.276078 sshd[1693]: Accepted publickey for core from 139.178.89.65 port 39378 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:50:45.277137 sshd[1693]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:50:45.280569 systemd-logind[1562]: New session 5 of user core. Dec 13 15:50:45.281457 systemd[1]: Started session-5.scope. Dec 13 15:50:45.349901 sshd[1693]: pam_unix(sshd:session): session closed for user core Dec 13 15:50:45.355645 systemd[1]: sshd@2-147.28.180.221:22-139.178.89.65:39378.service: Deactivated successfully. Dec 13 15:50:45.357388 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 15:50:45.359030 systemd-logind[1562]: Session 5 logged out. Waiting for processes to exit. Dec 13 15:50:45.361301 systemd-logind[1562]: Removed session 5. Dec 13 15:50:46.800579 coreos-metadata[1527]: Dec 13 15:50:46.800 INFO Fetch successful Dec 13 15:50:46.881125 unknown[1527]: wrote ssh authorized keys file for user: core Dec 13 15:50:46.882680 coreos-metadata[1530]: Dec 13 15:50:46.882 INFO Fetch successful Dec 13 15:50:46.892736 update-ssh-keys[1699]: Updated "/home/core/.ssh/authorized_keys" Dec 13 15:50:46.892986 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 15:50:46.912052 systemd[1]: Finished coreos-metadata.service. Dec 13 15:50:46.912841 systemd[1]: Started packet-phone-home.service. Dec 13 15:50:46.912951 systemd[1]: Reached target multi-user.target. Dec 13 15:50:46.913615 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 15:50:46.917787 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 15:50:46.917857 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 15:50:46.918030 systemd[1]: Startup finished in 1.862s (kernel) + 26.328s (initrd) + 16.746s (userspace) = 44.937s. Dec 13 15:50:46.918415 curl[1702]: % Total % Received % Xferd Average Speed Time Time Time Current Dec 13 15:50:46.918599 curl[1702]: Dload Upload Total Spent Left Speed Dec 13 15:50:47.234261 curl[1702]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Dec 13 15:50:47.236729 systemd[1]: packet-phone-home.service: Deactivated successfully. Dec 13 15:50:48.921376 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 15:50:48.921935 systemd[1]: Stopped kubelet.service. Dec 13 15:50:48.925299 systemd[1]: Starting kubelet.service... Dec 13 15:50:49.110014 systemd[1]: Started kubelet.service. Dec 13 15:50:49.182432 kubelet[1708]: E1213 15:50:49.182319 1708 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 15:50:49.185972 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 15:50:49.186091 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 15:50:55.358415 systemd[1]: Started sshd@3-147.28.180.221:22-139.178.89.65:44828.service. Dec 13 15:50:55.396961 sshd[1727]: Accepted publickey for core from 139.178.89.65 port 44828 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:50:55.398138 sshd[1727]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:50:55.401899 systemd-logind[1562]: New session 6 of user core. Dec 13 15:50:55.402801 systemd[1]: Started session-6.scope. Dec 13 15:50:55.459964 sshd[1727]: pam_unix(sshd:session): session closed for user core Dec 13 15:50:55.461593 systemd[1]: sshd@3-147.28.180.221:22-139.178.89.65:44828.service: Deactivated successfully. Dec 13 15:50:55.461905 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 15:50:55.462222 systemd-logind[1562]: Session 6 logged out. Waiting for processes to exit. Dec 13 15:50:55.462765 systemd[1]: Started sshd@4-147.28.180.221:22-139.178.89.65:44836.service. Dec 13 15:50:55.463165 systemd-logind[1562]: Removed session 6. Dec 13 15:50:55.501276 sshd[1733]: Accepted publickey for core from 139.178.89.65 port 44836 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:50:55.502290 sshd[1733]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:50:55.505431 systemd-logind[1562]: New session 7 of user core. Dec 13 15:50:55.506205 systemd[1]: Started session-7.scope. Dec 13 15:50:55.562244 sshd[1733]: pam_unix(sshd:session): session closed for user core Dec 13 15:50:55.568962 systemd[1]: sshd@4-147.28.180.221:22-139.178.89.65:44836.service: Deactivated successfully. Dec 13 15:50:55.569438 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 15:50:55.569824 systemd-logind[1562]: Session 7 logged out. Waiting for processes to exit. Dec 13 15:50:55.570297 systemd[1]: Started sshd@5-147.28.180.221:22-139.178.89.65:44846.service. Dec 13 15:50:55.570727 systemd-logind[1562]: Removed session 7. Dec 13 15:50:55.609661 sshd[1739]: Accepted publickey for core from 139.178.89.65 port 44846 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:50:55.612888 sshd[1739]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:50:55.623189 systemd-logind[1562]: New session 8 of user core. Dec 13 15:50:55.625646 systemd[1]: Started session-8.scope. Dec 13 15:50:55.706564 sshd[1739]: pam_unix(sshd:session): session closed for user core Dec 13 15:50:55.713380 systemd[1]: sshd@5-147.28.180.221:22-139.178.89.65:44846.service: Deactivated successfully. Dec 13 15:50:55.714951 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 15:50:55.716573 systemd-logind[1562]: Session 8 logged out. Waiting for processes to exit. Dec 13 15:50:55.719358 systemd[1]: Started sshd@6-147.28.180.221:22-139.178.89.65:44862.service. Dec 13 15:50:55.721935 systemd-logind[1562]: Removed session 8. Dec 13 15:50:55.783563 sshd[1745]: Accepted publickey for core from 139.178.89.65 port 44862 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:50:55.787267 sshd[1745]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:50:55.797677 systemd-logind[1562]: New session 9 of user core. Dec 13 15:50:55.800046 systemd[1]: Started session-9.scope. Dec 13 15:50:55.897426 sudo[1748]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 15:50:55.898124 sudo[1748]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 15:50:55.924079 dbus-daemon[1533]: \xd0}\xb6\u007f'V: received setenforce notice (enforcing=260586432) Dec 13 15:50:55.928394 sudo[1748]: pam_unix(sudo:session): session closed for user root Dec 13 15:50:55.930529 sshd[1745]: pam_unix(sshd:session): session closed for user core Dec 13 15:50:55.932135 systemd[1]: sshd@6-147.28.180.221:22-139.178.89.65:44862.service: Deactivated successfully. Dec 13 15:50:55.932452 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 15:50:55.932789 systemd-logind[1562]: Session 9 logged out. Waiting for processes to exit. Dec 13 15:50:55.933344 systemd[1]: Started sshd@7-147.28.180.221:22-139.178.89.65:44874.service. Dec 13 15:50:55.933762 systemd-logind[1562]: Removed session 9. Dec 13 15:50:55.973390 sshd[1752]: Accepted publickey for core from 139.178.89.65 port 44874 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:50:55.976851 sshd[1752]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:50:55.987034 systemd-logind[1562]: New session 10 of user core. Dec 13 15:50:55.989509 systemd[1]: Started session-10.scope. Dec 13 15:50:56.067931 sudo[1756]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 15:50:56.068629 sudo[1756]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 15:50:56.075666 sudo[1756]: pam_unix(sudo:session): session closed for user root Dec 13 15:50:56.088517 sudo[1755]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 15:50:56.089179 sudo[1755]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 15:50:56.113919 systemd[1]: Stopping audit-rules.service... Dec 13 15:50:56.116000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 15:50:56.117173 auditctl[1759]: No rules Dec 13 15:50:56.118051 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 15:50:56.118207 systemd[1]: Stopped audit-rules.service. Dec 13 15:50:56.118952 systemd[1]: Starting audit-rules.service... Dec 13 15:50:56.122447 kernel: kauditd_printk_skb: 415 callbacks suppressed Dec 13 15:50:56.122486 kernel: audit: type=1305 audit(1734105056.116:198): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 15:50:56.128406 augenrules[1776]: No rules Dec 13 15:50:56.128760 systemd[1]: Finished audit-rules.service. Dec 13 15:50:56.129140 sudo[1755]: pam_unix(sudo:session): session closed for user root Dec 13 15:50:56.129999 sshd[1752]: pam_unix(sshd:session): session closed for user core Dec 13 15:50:56.131466 systemd[1]: sshd@7-147.28.180.221:22-139.178.89.65:44874.service: Deactivated successfully. Dec 13 15:50:56.131844 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 15:50:56.132139 systemd-logind[1562]: Session 10 logged out. Waiting for processes to exit. Dec 13 15:50:56.132704 systemd[1]: Started sshd@8-147.28.180.221:22-139.178.89.65:44888.service. Dec 13 15:50:56.133117 systemd-logind[1562]: Removed session 10. Dec 13 15:50:56.116000 audit[1759]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff9f547840 a2=420 a3=0 items=0 ppid=1 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:50:56.169015 kernel: audit: type=1300 audit(1734105056.116:198): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff9f547840 a2=420 a3=0 items=0 ppid=1 pid=1759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:50:56.169091 kernel: audit: type=1327 audit(1734105056.116:198): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 15:50:56.116000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 15:50:56.178518 kernel: audit: type=1131 audit(1734105056.117:199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:56.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:56.201017 kernel: audit: type=1130 audit(1734105056.128:200): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:56.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:56.210826 sshd[1782]: Accepted publickey for core from 139.178.89.65 port 44888 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:50:56.212848 sshd[1782]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:50:56.214992 systemd-logind[1562]: New session 11 of user core. Dec 13 15:50:56.215435 systemd[1]: Started session-11.scope. Dec 13 15:50:56.223458 kernel: audit: type=1106 audit(1734105056.128:201): pid=1755 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:50:56.128000 audit[1755]: USER_END pid=1755 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:50:56.249567 kernel: audit: type=1104 audit(1734105056.128:202): pid=1755 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:50:56.128000 audit[1755]: CRED_DISP pid=1755 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:50:56.261999 sudo[1785]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 15:50:56.262119 sudo[1785]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 15:50:56.273151 kernel: audit: type=1106 audit(1734105056.129:203): pid=1752 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:50:56.129000 audit[1752]: USER_END pid=1752 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:50:56.274278 systemd[1]: Starting docker.service... Dec 13 15:50:56.291294 env[1800]: time="2024-12-13T15:50:56.291238760Z" level=info msg="Starting up" Dec 13 15:50:56.291909 env[1800]: time="2024-12-13T15:50:56.291870902Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 15:50:56.291909 env[1800]: time="2024-12-13T15:50:56.291879874Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 15:50:56.291909 env[1800]: time="2024-12-13T15:50:56.291891327Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 15:50:56.291909 env[1800]: time="2024-12-13T15:50:56.291897103Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 15:50:56.292743 env[1800]: time="2024-12-13T15:50:56.292695338Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 15:50:56.292743 env[1800]: time="2024-12-13T15:50:56.292704880Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 15:50:56.292743 env[1800]: time="2024-12-13T15:50:56.292712650Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 15:50:56.292743 env[1800]: time="2024-12-13T15:50:56.292717823Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 15:50:56.305282 kernel: audit: type=1104 audit(1734105056.130:204): pid=1752 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:50:56.130000 audit[1752]: CRED_DISP pid=1752 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:50:56.331195 kernel: audit: type=1131 audit(1734105056.131:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-147.28.180.221:22-139.178.89.65:44874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:56.131000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-147.28.180.221:22-139.178.89.65:44874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:56.355635 env[1800]: time="2024-12-13T15:50:56.355597974Z" level=info msg="Loading containers: start." Dec 13 15:50:56.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.28.180.221:22-139.178.89.65:44888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:56.210000 audit[1782]: USER_ACCT pid=1782 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:50:56.212000 audit[1782]: CRED_ACQ pid=1782 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:50:56.212000 audit[1782]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2d0e8260 a2=3 a3=0 items=0 ppid=1 pid=1782 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:50:56.212000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:50:56.217000 audit[1782]: USER_START pid=1782 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:50:56.217000 audit[1784]: CRED_ACQ pid=1784 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:50:56.261000 audit[1785]: USER_ACCT pid=1785 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:50:56.261000 audit[1785]: CRED_REFR pid=1785 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:50:56.262000 audit[1785]: USER_START pid=1785 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:50:56.393000 audit[1843]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1843 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:50:56.393000 audit[1843]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd4625c890 a2=0 a3=7ffd4625c87c items=0 ppid=1800 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:50:56.393000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 15:50:56.394000 audit[1845]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1845 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:50:56.394000 audit[1845]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff99169d30 a2=0 a3=7fff99169d1c items=0 ppid=1800 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:50:56.394000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 15:50:56.395000 audit[1847]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1847 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:50:56.395000 audit[1847]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc9505f5a0 a2=0 a3=7ffc9505f58c items=0 ppid=1800 pid=1847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:50:56.395000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 15:50:56.396000 audit[1849]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1849 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:50:56.396000 audit[1849]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffefdd72390 a2=0 a3=7ffefdd7237c items=0 ppid=1800 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:50:56.396000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 15:50:56.398000 audit[1851]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1851 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:50:56.398000 audit[1851]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc72380c40 a2=0 a3=7ffc72380c2c items=0 ppid=1800 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:50:56.398000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 15:50:56.439000 audit[1856]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1856 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:50:56.439000 audit[1856]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcae5eca90 a2=0 a3=7ffcae5eca7c items=0 ppid=1800 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:50:56.439000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 15:50:56.450000 audit[1858]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1858 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:50:56.450000 audit[1858]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffae8b6a10 a2=0 a3=7fffae8b69fc items=0 ppid=1800 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:50:56.450000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 15:50:56.455000 audit[1860]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1860 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:50:56.455000 audit[1860]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffc5b44dec0 a2=0 a3=7ffc5b44deac items=0 ppid=1800 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:50:56.455000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 15:50:56.461000 audit[1862]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1862 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:50:56.461000 audit[1862]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fff2b155b30 a2=0 a3=7fff2b155b1c items=0 ppid=1800 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:50:56.461000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 15:50:56.475000 audit[1866]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1866 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:50:56.475000 audit[1866]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe0cb06310 a2=0 a3=7ffe0cb062fc items=0 ppid=1800 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:50:56.475000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 15:50:56.486000 audit[1867]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1867 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:50:56.486000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffee50057b0 a2=0 a3=7ffee500579c items=0 ppid=1800 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:50:56.486000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 15:50:56.519510 kernel: Initializing XFRM netlink socket Dec 13 15:50:56.573942 env[1800]: time="2024-12-13T15:50:56.573860700Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 15:50:56.575858 systemd-timesyncd[1509]: Network configuration changed, trying to establish connection. Dec 13 15:50:56.607000 audit[1875]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1875 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:50:56.607000 audit[1875]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc502f61b0 a2=0 a3=7ffc502f619c items=0 ppid=1800 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:50:56.607000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 15:50:56.636000 audit[1878]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1878 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:50:56.636000 audit[1878]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffc011be910 a2=0 a3=7ffc011be8fc items=0 ppid=1800 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:50:56.636000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 15:50:56.638000 audit[1881]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1881 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:50:56.638000 audit[1881]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffed96181b0 a2=0 a3=7ffed961819c items=0 ppid=1800 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:50:56.638000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 15:50:56.640000 audit[1883]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1883 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:50:56.640000 audit[1883]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffca6495e90 a2=0 a3=7ffca6495e7c items=0 ppid=1800 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:50:56.640000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 15:50:56.642000 audit[1885]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1885 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:50:56.642000 audit[1885]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffeed41c260 a2=0 a3=7ffeed41c24c items=0 ppid=1800 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:50:56.642000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 15:50:56.644000 audit[1887]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1887 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:50:56.644000 audit[1887]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffdcb6e0f60 a2=0 a3=7ffdcb6e0f4c items=0 ppid=1800 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:50:56.644000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 15:50:56.646000 audit[1889]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1889 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:50:56.646000 audit[1889]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffed284b040 a2=0 a3=7ffed284b02c items=0 ppid=1800 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:50:56.646000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 15:50:56.655000 audit[1892]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1892 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:50:56.655000 audit[1892]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc634057b0 a2=0 a3=7ffc6340579c items=0 ppid=1800 pid=1892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:50:56.655000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 15:50:56.657000 audit[1894]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1894 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:50:56.657000 audit[1894]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffe30ec91f0 a2=0 a3=7ffe30ec91dc items=0 ppid=1800 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:50:56.657000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 15:50:56.659000 audit[1896]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1896 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:50:56.659000 audit[1896]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fff15023b60 a2=0 a3=7fff15023b4c items=0 ppid=1800 pid=1896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:50:56.659000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 15:50:56.661000 audit[1898]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1898 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:50:56.661000 audit[1898]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc40cf6130 a2=0 a3=7ffc40cf611c items=0 ppid=1800 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:50:56.661000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 15:50:56.662362 systemd-networkd[1315]: docker0: Link UP Dec 13 15:50:56.667000 audit[1902]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1902 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:50:56.667000 audit[1902]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe2e2d8b80 a2=0 a3=7ffe2e2d8b6c items=0 ppid=1800 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:50:56.667000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 15:50:56.686000 audit[1903]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1903 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:50:56.686000 audit[1903]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff59f89000 a2=0 a3=7fff59f88fec items=0 ppid=1800 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:50:56.686000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 15:50:56.687517 env[1800]: time="2024-12-13T15:50:56.687471536Z" level=info msg="Loading containers: done." Dec 13 15:50:56.705948 env[1800]: time="2024-12-13T15:50:56.705864692Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 15:50:56.706341 env[1800]: time="2024-12-13T15:50:56.706282943Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 15:50:56.706585 env[1800]: time="2024-12-13T15:50:56.706535557Z" level=info msg="Daemon has completed initialization" Dec 13 15:50:56.710555 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3312099990-merged.mount: Deactivated successfully. Dec 13 15:50:56.732234 systemd[1]: Started docker.service. Dec 13 15:50:56.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:56.749544 env[1800]: time="2024-12-13T15:50:56.749403313Z" level=info msg="API listen on /run/docker.sock" Dec 13 15:50:56.795910 systemd-timesyncd[1509]: Contacted time server [2605:6400:84e1::123]:123 (2.flatcar.pool.ntp.org). Dec 13 15:50:56.796049 systemd-timesyncd[1509]: Initial clock synchronization to Fri 2024-12-13 15:50:56.782486 UTC. Dec 13 15:50:58.166348 env[1570]: time="2024-12-13T15:50:58.166251046Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.8\"" Dec 13 15:50:58.814660 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1787140629.mount: Deactivated successfully. Dec 13 15:50:59.419950 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 15:50:59.420096 systemd[1]: Stopped kubelet.service. Dec 13 15:50:59.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:59.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:59.421118 systemd[1]: Starting kubelet.service... Dec 13 15:50:59.616648 systemd[1]: Started kubelet.service. Dec 13 15:50:59.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:50:59.647775 kubelet[1961]: E1213 15:50:59.647678 1961 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 15:50:59.648874 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 15:50:59.648960 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 15:50:59.648000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 15:51:00.056224 env[1570]: time="2024-12-13T15:51:00.056169515Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:00.056846 env[1570]: time="2024-12-13T15:51:00.056811585Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:772392d372035bf92e430e758ad0446146d82b7192358c8651252e4fb49c43dd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:00.057793 env[1570]: time="2024-12-13T15:51:00.057751982Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:00.058721 env[1570]: time="2024-12-13T15:51:00.058688383Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:f0e1b3de0c2e98e6c6abd73edf9d3b8e4d44460656cde0ebb92e2d9206961fcb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:00.059142 env[1570]: time="2024-12-13T15:51:00.059105719Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.8\" returns image reference \"sha256:772392d372035bf92e430e758ad0446146d82b7192358c8651252e4fb49c43dd\"" Dec 13 15:51:00.066870 env[1570]: time="2024-12-13T15:51:00.066813095Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.8\"" Dec 13 15:51:01.533092 env[1570]: time="2024-12-13T15:51:01.533043211Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:01.533719 env[1570]: time="2024-12-13T15:51:01.533672614Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:85333d41dd3ce32d8344280c6d533d4c8f66252e4c28e332a2322ba3837f7bd6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:01.535140 env[1570]: time="2024-12-13T15:51:01.535077235Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:01.535912 env[1570]: time="2024-12-13T15:51:01.535861705Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:124f66b7e877eb5a80a40503057299bb60e6a5f2130905f4e3293dabf194c397,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:01.536364 env[1570]: time="2024-12-13T15:51:01.536328404Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.8\" returns image reference \"sha256:85333d41dd3ce32d8344280c6d533d4c8f66252e4c28e332a2322ba3837f7bd6\"" Dec 13 15:51:01.542962 env[1570]: time="2024-12-13T15:51:01.542921052Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.8\"" Dec 13 15:51:02.550245 env[1570]: time="2024-12-13T15:51:02.550196378Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:02.550820 env[1570]: time="2024-12-13T15:51:02.550805537Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:eb53b988d5e03f329b5fdba21cbbbae48e1619b199689e7448095b31843b2c43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:02.552369 env[1570]: time="2024-12-13T15:51:02.552355831Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:02.553259 env[1570]: time="2024-12-13T15:51:02.553218990Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c8bdeac2590c99c1a77e33995423ddb6633ff90a82a2aa455442e0a8079ef8c7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:02.553736 env[1570]: time="2024-12-13T15:51:02.553693759Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.8\" returns image reference \"sha256:eb53b988d5e03f329b5fdba21cbbbae48e1619b199689e7448095b31843b2c43\"" Dec 13 15:51:02.559224 env[1570]: time="2024-12-13T15:51:02.559210853Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\"" Dec 13 15:51:03.468435 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount504250407.mount: Deactivated successfully. Dec 13 15:51:03.830195 env[1570]: time="2024-12-13T15:51:03.830108343Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:03.830841 env[1570]: time="2024-12-13T15:51:03.830828957Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:03.831391 env[1570]: time="2024-12-13T15:51:03.831365567Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:03.832048 env[1570]: time="2024-12-13T15:51:03.832038549Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6d6be9417e22af78905000ac4fd134896bacd2188ea63c7cac8edd7a5d7e9b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:03.832294 env[1570]: time="2024-12-13T15:51:03.832280306Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\" returns image reference \"sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2\"" Dec 13 15:51:03.838135 env[1570]: time="2024-12-13T15:51:03.838065738Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 15:51:04.444169 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4053666886.mount: Deactivated successfully. Dec 13 15:51:05.173150 env[1570]: time="2024-12-13T15:51:05.173094387Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:05.173762 env[1570]: time="2024-12-13T15:51:05.173707484Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:05.174773 env[1570]: time="2024-12-13T15:51:05.174724476Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:05.175738 env[1570]: time="2024-12-13T15:51:05.175683924Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:05.176217 env[1570]: time="2024-12-13T15:51:05.176165548Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 15:51:05.181578 env[1570]: time="2024-12-13T15:51:05.181550909Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Dec 13 15:51:05.738519 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3501224416.mount: Deactivated successfully. Dec 13 15:51:05.739524 env[1570]: time="2024-12-13T15:51:05.739507463Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:05.740114 env[1570]: time="2024-12-13T15:51:05.740102062Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:05.740737 env[1570]: time="2024-12-13T15:51:05.740697902Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:05.741756 env[1570]: time="2024-12-13T15:51:05.741716012Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:05.741928 env[1570]: time="2024-12-13T15:51:05.741886145Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Dec 13 15:51:05.746668 env[1570]: time="2024-12-13T15:51:05.746652631Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" Dec 13 15:51:06.304127 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount430355558.mount: Deactivated successfully. Dec 13 15:51:07.965617 env[1570]: time="2024-12-13T15:51:07.965567839Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:07.966809 env[1570]: time="2024-12-13T15:51:07.966766694Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:07.967951 env[1570]: time="2024-12-13T15:51:07.967916195Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:07.968990 env[1570]: time="2024-12-13T15:51:07.968944268Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:07.969938 env[1570]: time="2024-12-13T15:51:07.969895610Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899\"" Dec 13 15:51:09.669845 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 15:51:09.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:51:09.669973 systemd[1]: Stopped kubelet.service. Dec 13 15:51:09.670791 systemd[1]: Starting kubelet.service... Dec 13 15:51:09.675482 kernel: kauditd_printk_skb: 88 callbacks suppressed Dec 13 15:51:09.675597 kernel: audit: type=1130 audit(1734105069.669:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:51:09.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:51:09.752356 kernel: audit: type=1131 audit(1734105069.669:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:51:09.861719 systemd[1]: Started kubelet.service. Dec 13 15:51:09.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:51:09.883463 kubelet[2132]: E1213 15:51:09.883433 2132 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 15:51:09.884452 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 15:51:09.884566 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 15:51:09.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 15:51:09.929536 systemd[1]: Stopped kubelet.service. Dec 13 15:51:09.930798 systemd[1]: Starting kubelet.service... Dec 13 15:51:09.939702 systemd[1]: Reloading. Dec 13 15:51:09.972588 /usr/lib/systemd/system-generators/torcx-generator[2176]: time="2024-12-13T15:51:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 15:51:09.972604 /usr/lib/systemd/system-generators/torcx-generator[2176]: time="2024-12-13T15:51:09Z" level=info msg="torcx already run" Dec 13 15:51:09.974278 kernel: audit: type=1130 audit(1734105069.861:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:51:09.974318 kernel: audit: type=1131 audit(1734105069.884:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 15:51:09.974337 kernel: audit: type=1130 audit(1734105069.929:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:51:09.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:51:10.031869 kernel: audit: type=1131 audit(1734105069.929:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:51:09.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:51:10.111771 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 15:51:10.111778 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 15:51:10.122770 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 15:51:10.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.290498 kernel: audit: type=1400 audit(1734105070.168:250): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.290566 kernel: audit: type=1400 audit(1734105070.168:251): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.290614 kernel: audit: type=1400 audit(1734105070.168:252): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.353106 kernel: audit: type=1400 audit(1734105070.168:253): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.288000 audit: BPF prog-id=46 op=LOAD Dec 13 15:51:10.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.414000 audit: BPF prog-id=47 op=LOAD Dec 13 15:51:10.414000 audit: BPF prog-id=30 op=UNLOAD Dec 13 15:51:10.414000 audit: BPF prog-id=31 op=UNLOAD Dec 13 15:51:10.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.415000 audit: BPF prog-id=48 op=LOAD Dec 13 15:51:10.415000 audit: BPF prog-id=32 op=UNLOAD Dec 13 15:51:10.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.416000 audit: BPF prog-id=49 op=LOAD Dec 13 15:51:10.416000 audit: BPF prog-id=41 op=UNLOAD Dec 13 15:51:10.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.416000 audit: BPF prog-id=50 op=LOAD Dec 13 15:51:10.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.416000 audit: BPF prog-id=51 op=LOAD Dec 13 15:51:10.416000 audit: BPF prog-id=42 op=UNLOAD Dec 13 15:51:10.416000 audit: BPF prog-id=43 op=UNLOAD Dec 13 15:51:10.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.417000 audit: BPF prog-id=52 op=LOAD Dec 13 15:51:10.417000 audit: BPF prog-id=33 op=UNLOAD Dec 13 15:51:10.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.417000 audit: BPF prog-id=53 op=LOAD Dec 13 15:51:10.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.417000 audit: BPF prog-id=54 op=LOAD Dec 13 15:51:10.417000 audit: BPF prog-id=34 op=UNLOAD Dec 13 15:51:10.417000 audit: BPF prog-id=35 op=UNLOAD Dec 13 15:51:10.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.417000 audit: BPF prog-id=55 op=LOAD Dec 13 15:51:10.417000 audit: BPF prog-id=40 op=UNLOAD Dec 13 15:51:10.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.419000 audit: BPF prog-id=56 op=LOAD Dec 13 15:51:10.419000 audit: BPF prog-id=44 op=UNLOAD Dec 13 15:51:10.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.420000 audit: BPF prog-id=57 op=LOAD Dec 13 15:51:10.420000 audit: BPF prog-id=39 op=UNLOAD Dec 13 15:51:10.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.420000 audit: BPF prog-id=58 op=LOAD Dec 13 15:51:10.420000 audit: BPF prog-id=36 op=UNLOAD Dec 13 15:51:10.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.420000 audit: BPF prog-id=59 op=LOAD Dec 13 15:51:10.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.420000 audit: BPF prog-id=60 op=LOAD Dec 13 15:51:10.421000 audit: BPF prog-id=37 op=UNLOAD Dec 13 15:51:10.421000 audit: BPF prog-id=38 op=UNLOAD Dec 13 15:51:10.427259 systemd[1]: Started kubelet.service. Dec 13 15:51:10.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:51:10.429267 systemd[1]: Stopping kubelet.service... Dec 13 15:51:10.429458 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 15:51:10.429594 systemd[1]: Stopped kubelet.service. Dec 13 15:51:10.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:51:10.430386 systemd[1]: Starting kubelet.service... Dec 13 15:51:10.623195 systemd[1]: Started kubelet.service. Dec 13 15:51:10.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:51:10.646126 kubelet[2248]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 15:51:10.646126 kubelet[2248]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 15:51:10.646126 kubelet[2248]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 15:51:10.649131 kubelet[2248]: I1213 15:51:10.649073 2248 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 15:51:10.881985 kubelet[2248]: I1213 15:51:10.881905 2248 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 15:51:10.881985 kubelet[2248]: I1213 15:51:10.881929 2248 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 15:51:10.882055 kubelet[2248]: I1213 15:51:10.882046 2248 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 15:51:10.894105 kubelet[2248]: I1213 15:51:10.894092 2248 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 15:51:10.895027 kubelet[2248]: E1213 15:51:10.894986 2248 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://147.28.180.221:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 147.28.180.221:6443: connect: connection refused Dec 13 15:51:10.918597 kubelet[2248]: I1213 15:51:10.918560 2248 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 15:51:10.920442 kubelet[2248]: I1213 15:51:10.920397 2248 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 15:51:10.920554 kubelet[2248]: I1213 15:51:10.920413 2248 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.6-a-a4f471fe95","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 15:51:10.920949 kubelet[2248]: I1213 15:51:10.920910 2248 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 15:51:10.920949 kubelet[2248]: I1213 15:51:10.920919 2248 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 15:51:10.920999 kubelet[2248]: I1213 15:51:10.920974 2248 state_mem.go:36] "Initialized new in-memory state store" Dec 13 15:51:10.921739 kubelet[2248]: I1213 15:51:10.921703 2248 kubelet.go:400] "Attempting to sync node with API server" Dec 13 15:51:10.921739 kubelet[2248]: I1213 15:51:10.921711 2248 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 15:51:10.921739 kubelet[2248]: I1213 15:51:10.921722 2248 kubelet.go:312] "Adding apiserver pod source" Dec 13 15:51:10.921739 kubelet[2248]: I1213 15:51:10.921730 2248 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 15:51:10.926965 kubelet[2248]: W1213 15:51:10.926912 2248 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://147.28.180.221:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.28.180.221:6443: connect: connection refused Dec 13 15:51:10.927055 kubelet[2248]: E1213 15:51:10.927044 2248 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://147.28.180.221:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.28.180.221:6443: connect: connection refused Dec 13 15:51:10.927106 kubelet[2248]: W1213 15:51:10.926912 2248 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://147.28.180.221:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-a4f471fe95&limit=500&resourceVersion=0": dial tcp 147.28.180.221:6443: connect: connection refused Dec 13 15:51:10.927106 kubelet[2248]: E1213 15:51:10.927094 2248 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://147.28.180.221:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-a4f471fe95&limit=500&resourceVersion=0": dial tcp 147.28.180.221:6443: connect: connection refused Dec 13 15:51:10.927655 kubelet[2248]: I1213 15:51:10.927641 2248 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 15:51:10.930759 kubelet[2248]: I1213 15:51:10.930748 2248 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 15:51:10.930800 kubelet[2248]: W1213 15:51:10.930776 2248 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 15:51:10.931084 kubelet[2248]: I1213 15:51:10.931077 2248 server.go:1264] "Started kubelet" Dec 13 15:51:10.931155 kubelet[2248]: I1213 15:51:10.931137 2248 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 15:51:10.931192 kubelet[2248]: I1213 15:51:10.931159 2248 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 15:51:10.931327 kubelet[2248]: I1213 15:51:10.931318 2248 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 15:51:10.930000 audit[2248]: AVC avc: denied { mac_admin } for pid=2248 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.930000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:51:10.930000 audit[2248]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000471e30 a1=c001024708 a2=c000471e00 a3=25 items=0 ppid=1 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:10.930000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:51:10.930000 audit[2248]: AVC avc: denied { mac_admin } for pid=2248 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:10.930000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:51:10.930000 audit[2248]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c001286420 a1=c001024720 a2=c000471ec0 a3=25 items=0 ppid=1 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:10.930000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:51:10.932068 kubelet[2248]: I1213 15:51:10.931777 2248 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 15:51:10.932068 kubelet[2248]: I1213 15:51:10.931805 2248 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 15:51:10.932068 kubelet[2248]: I1213 15:51:10.931840 2248 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 15:51:10.932068 kubelet[2248]: I1213 15:51:10.931903 2248 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 15:51:10.932068 kubelet[2248]: I1213 15:51:10.931928 2248 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 15:51:10.932068 kubelet[2248]: I1213 15:51:10.931967 2248 reconciler.go:26] "Reconciler: start to sync state" Dec 13 15:51:10.932068 kubelet[2248]: I1213 15:51:10.931988 2248 server.go:455] "Adding debug handlers to kubelet server" Dec 13 15:51:10.932207 kubelet[2248]: E1213 15:51:10.932090 2248 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://147.28.180.221:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-a4f471fe95?timeout=10s\": dial tcp 147.28.180.221:6443: connect: connection refused" interval="200ms" Dec 13 15:51:10.932207 kubelet[2248]: W1213 15:51:10.932150 2248 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://147.28.180.221:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.28.180.221:6443: connect: connection refused Dec 13 15:51:10.932207 kubelet[2248]: E1213 15:51:10.932179 2248 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://147.28.180.221:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.28.180.221:6443: connect: connection refused Dec 13 15:51:10.932000 audit[2272]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2272 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:51:10.932000 audit[2272]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffd5828130 a2=0 a3=7fffd582811c items=0 ppid=2248 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:10.932000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 15:51:10.932000 audit[2273]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2273 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:51:10.932000 audit[2273]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffef86733c0 a2=0 a3=7ffef86733ac items=0 ppid=2248 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:10.932000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 15:51:10.933000 audit[2275]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:51:10.933000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd031e1130 a2=0 a3=7ffd031e111c items=0 ppid=2248 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:10.933000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 15:51:10.936370 kubelet[2248]: I1213 15:51:10.936360 2248 factory.go:221] Registration of the systemd container factory successfully Dec 13 15:51:10.936423 kubelet[2248]: I1213 15:51:10.936414 2248 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 15:51:10.935000 audit[2277]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2277 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:51:10.935000 audit[2277]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff1af7fc30 a2=0 a3=7fff1af7fc1c items=0 ppid=2248 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:10.935000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 15:51:10.936965 kubelet[2248]: I1213 15:51:10.936956 2248 factory.go:221] Registration of the containerd container factory successfully Dec 13 15:51:10.946000 audit[2281]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2281 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:51:10.946000 audit[2281]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe600c6e00 a2=0 a3=7ffe600c6dec items=0 ppid=2248 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:10.946000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 15:51:10.948629 kubelet[2248]: I1213 15:51:10.948566 2248 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 15:51:10.947000 audit[2284]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2284 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:51:10.947000 audit[2284]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc4800ce90 a2=0 a3=7ffc4800ce7c items=0 ppid=2248 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:10.947000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 15:51:10.949446 kubelet[2248]: I1213 15:51:10.949348 2248 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 15:51:10.949446 kubelet[2248]: I1213 15:51:10.949373 2248 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 15:51:10.949446 kubelet[2248]: I1213 15:51:10.949400 2248 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 15:51:10.949598 kubelet[2248]: E1213 15:51:10.949449 2248 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 15:51:10.949883 kubelet[2248]: W1213 15:51:10.949712 2248 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://147.28.180.221:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 147.28.180.221:6443: connect: connection refused Dec 13 15:51:10.949942 kubelet[2248]: E1213 15:51:10.949891 2248 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://147.28.180.221:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 147.28.180.221:6443: connect: connection refused Dec 13 15:51:10.952000 audit[2286]: NETFILTER_CFG table=mangle:32 family=10 entries=1 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:51:10.952000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffd9878a20 a2=0 a3=7fffd9878a0c items=0 ppid=2248 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:10.952000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 15:51:10.952000 audit[2287]: NETFILTER_CFG table=mangle:33 family=2 entries=1 op=nft_register_chain pid=2287 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:51:10.952000 audit[2287]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd379d26d0 a2=0 a3=7ffd379d26bc items=0 ppid=2248 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:10.952000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 15:51:10.952000 audit[2288]: NETFILTER_CFG table=nat:34 family=10 entries=2 op=nft_register_chain pid=2288 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:51:10.952000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe880a9690 a2=0 a3=7ffe880a967c items=0 ppid=2248 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:10.952000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 15:51:10.952000 audit[2289]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=2289 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:51:10.952000 audit[2289]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc657f2e80 a2=0 a3=7ffc657f2e6c items=0 ppid=2248 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:10.952000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 15:51:10.953000 audit[2290]: NETFILTER_CFG table=filter:36 family=10 entries=2 op=nft_register_chain pid=2290 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:51:10.953000 audit[2290]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff60496640 a2=0 a3=7fff6049662c items=0 ppid=2248 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:10.953000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 15:51:10.953000 audit[2291]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=2291 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:51:10.953000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe2972ef20 a2=0 a3=7ffe2972ef0c items=0 ppid=2248 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:10.953000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 15:51:10.956511 kubelet[2248]: E1213 15:51:10.956399 2248 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://147.28.180.221:6443/api/v1/namespaces/default/events\": dial tcp 147.28.180.221:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.6-a-a4f471fe95.1810c75fd40cb51c default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.6-a-a4f471fe95,UID:ci-3510.3.6-a-a4f471fe95,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.6-a-a4f471fe95,},FirstTimestamp:2024-12-13 15:51:10.931064092 +0000 UTC m=+0.304341495,LastTimestamp:2024-12-13 15:51:10.931064092 +0000 UTC m=+0.304341495,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.6-a-a4f471fe95,}" Dec 13 15:51:10.969267 kubelet[2248]: I1213 15:51:10.969248 2248 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 15:51:10.969267 kubelet[2248]: I1213 15:51:10.969263 2248 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 15:51:10.969421 kubelet[2248]: I1213 15:51:10.969284 2248 state_mem.go:36] "Initialized new in-memory state store" Dec 13 15:51:10.970521 kubelet[2248]: I1213 15:51:10.970503 2248 policy_none.go:49] "None policy: Start" Dec 13 15:51:10.971031 kubelet[2248]: I1213 15:51:10.970988 2248 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 15:51:10.971031 kubelet[2248]: I1213 15:51:10.971012 2248 state_mem.go:35] "Initializing new in-memory state store" Dec 13 15:51:10.975120 systemd[1]: Created slice kubepods.slice. Dec 13 15:51:10.979966 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 15:51:11.006112 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 15:51:11.008965 kubelet[2248]: I1213 15:51:11.008883 2248 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 15:51:11.007000 audit[2248]: AVC avc: denied { mac_admin } for pid=2248 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.007000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:51:11.007000 audit[2248]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d0b3e0 a1=c0005c2d08 a2=c000d0b3b0 a3=25 items=0 ppid=1 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:11.007000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:51:11.009782 kubelet[2248]: I1213 15:51:11.009007 2248 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 15:51:11.009782 kubelet[2248]: I1213 15:51:11.009260 2248 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 15:51:11.009782 kubelet[2248]: I1213 15:51:11.009525 2248 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 15:51:11.011665 kubelet[2248]: E1213 15:51:11.011591 2248 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.6-a-a4f471fe95\" not found" Dec 13 15:51:11.035953 kubelet[2248]: I1213 15:51:11.035842 2248 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:11.036689 kubelet[2248]: E1213 15:51:11.036588 2248 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://147.28.180.221:6443/api/v1/nodes\": dial tcp 147.28.180.221:6443: connect: connection refused" node="ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:11.050059 kubelet[2248]: I1213 15:51:11.049934 2248 topology_manager.go:215] "Topology Admit Handler" podUID="e15b7fb2f4d6138583feabfde07ecce6" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:11.053319 kubelet[2248]: I1213 15:51:11.053218 2248 topology_manager.go:215] "Topology Admit Handler" podUID="0b31ceab45e57b4fcfbb5842ea8a628f" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:11.056831 kubelet[2248]: I1213 15:51:11.056782 2248 topology_manager.go:215] "Topology Admit Handler" podUID="1a744b5b53b5911c360ae97d04763c62" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:11.068763 systemd[1]: Created slice kubepods-burstable-pode15b7fb2f4d6138583feabfde07ecce6.slice. Dec 13 15:51:11.095876 systemd[1]: Created slice kubepods-burstable-pod0b31ceab45e57b4fcfbb5842ea8a628f.slice. Dec 13 15:51:11.117721 systemd[1]: Created slice kubepods-burstable-pod1a744b5b53b5911c360ae97d04763c62.slice. Dec 13 15:51:11.133426 kubelet[2248]: E1213 15:51:11.133256 2248 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://147.28.180.221:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-a4f471fe95?timeout=10s\": dial tcp 147.28.180.221:6443: connect: connection refused" interval="400ms" Dec 13 15:51:11.233111 kubelet[2248]: I1213 15:51:11.233024 2248 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e15b7fb2f4d6138583feabfde07ecce6-ca-certs\") pod \"kube-apiserver-ci-3510.3.6-a-a4f471fe95\" (UID: \"e15b7fb2f4d6138583feabfde07ecce6\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:11.233448 kubelet[2248]: I1213 15:51:11.233148 2248 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/0b31ceab45e57b4fcfbb5842ea8a628f-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.6-a-a4f471fe95\" (UID: \"0b31ceab45e57b4fcfbb5842ea8a628f\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:11.233448 kubelet[2248]: I1213 15:51:11.233253 2248 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0b31ceab45e57b4fcfbb5842ea8a628f-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.6-a-a4f471fe95\" (UID: \"0b31ceab45e57b4fcfbb5842ea8a628f\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:11.233448 kubelet[2248]: I1213 15:51:11.233354 2248 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0b31ceab45e57b4fcfbb5842ea8a628f-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.6-a-a4f471fe95\" (UID: \"0b31ceab45e57b4fcfbb5842ea8a628f\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:11.234034 kubelet[2248]: I1213 15:51:11.233443 2248 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/1a744b5b53b5911c360ae97d04763c62-kubeconfig\") pod \"kube-scheduler-ci-3510.3.6-a-a4f471fe95\" (UID: \"1a744b5b53b5911c360ae97d04763c62\") " pod="kube-system/kube-scheduler-ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:11.234034 kubelet[2248]: I1213 15:51:11.233565 2248 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e15b7fb2f4d6138583feabfde07ecce6-k8s-certs\") pod \"kube-apiserver-ci-3510.3.6-a-a4f471fe95\" (UID: \"e15b7fb2f4d6138583feabfde07ecce6\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:11.234034 kubelet[2248]: I1213 15:51:11.233671 2248 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e15b7fb2f4d6138583feabfde07ecce6-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.6-a-a4f471fe95\" (UID: \"e15b7fb2f4d6138583feabfde07ecce6\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:11.234034 kubelet[2248]: I1213 15:51:11.233761 2248 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0b31ceab45e57b4fcfbb5842ea8a628f-ca-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-a4f471fe95\" (UID: \"0b31ceab45e57b4fcfbb5842ea8a628f\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:11.234034 kubelet[2248]: I1213 15:51:11.233856 2248 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0b31ceab45e57b4fcfbb5842ea8a628f-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-a4f471fe95\" (UID: \"0b31ceab45e57b4fcfbb5842ea8a628f\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:11.241399 kubelet[2248]: I1213 15:51:11.241341 2248 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:11.242207 kubelet[2248]: E1213 15:51:11.242111 2248 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://147.28.180.221:6443/api/v1/nodes\": dial tcp 147.28.180.221:6443: connect: connection refused" node="ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:11.394039 env[1570]: time="2024-12-13T15:51:11.393813454Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.6-a-a4f471fe95,Uid:e15b7fb2f4d6138583feabfde07ecce6,Namespace:kube-system,Attempt:0,}" Dec 13 15:51:11.413326 env[1570]: time="2024-12-13T15:51:11.413194596Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.6-a-a4f471fe95,Uid:0b31ceab45e57b4fcfbb5842ea8a628f,Namespace:kube-system,Attempt:0,}" Dec 13 15:51:11.423377 env[1570]: time="2024-12-13T15:51:11.423302329Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.6-a-a4f471fe95,Uid:1a744b5b53b5911c360ae97d04763c62,Namespace:kube-system,Attempt:0,}" Dec 13 15:51:11.534932 kubelet[2248]: E1213 15:51:11.534834 2248 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://147.28.180.221:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-a4f471fe95?timeout=10s\": dial tcp 147.28.180.221:6443: connect: connection refused" interval="800ms" Dec 13 15:51:11.646684 kubelet[2248]: I1213 15:51:11.646518 2248 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:11.647418 kubelet[2248]: E1213 15:51:11.647153 2248 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://147.28.180.221:6443/api/v1/nodes\": dial tcp 147.28.180.221:6443: connect: connection refused" node="ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:11.910886 kubelet[2248]: W1213 15:51:11.910620 2248 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://147.28.180.221:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.28.180.221:6443: connect: connection refused Dec 13 15:51:11.910886 kubelet[2248]: E1213 15:51:11.910761 2248 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://147.28.180.221:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.28.180.221:6443: connect: connection refused Dec 13 15:51:11.952555 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1620148148.mount: Deactivated successfully. Dec 13 15:51:11.954220 env[1570]: time="2024-12-13T15:51:11.954182457Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:11.955780 env[1570]: time="2024-12-13T15:51:11.955718558Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:11.956457 env[1570]: time="2024-12-13T15:51:11.956445658Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:11.957285 env[1570]: time="2024-12-13T15:51:11.957273421Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:11.957671 env[1570]: time="2024-12-13T15:51:11.957661365Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:11.958020 env[1570]: time="2024-12-13T15:51:11.958008088Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:11.959664 env[1570]: time="2024-12-13T15:51:11.959641148Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:11.960039 env[1570]: time="2024-12-13T15:51:11.960000211Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:11.961307 env[1570]: time="2024-12-13T15:51:11.961293671Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:11.962151 env[1570]: time="2024-12-13T15:51:11.962135711Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:11.962978 env[1570]: time="2024-12-13T15:51:11.962967931Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:11.963363 env[1570]: time="2024-12-13T15:51:11.963352618Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:11.967344 env[1570]: time="2024-12-13T15:51:11.967309868Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:51:11.967344 env[1570]: time="2024-12-13T15:51:11.967330664Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:51:11.967344 env[1570]: time="2024-12-13T15:51:11.967337482Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:51:11.967493 env[1570]: time="2024-12-13T15:51:11.967406163Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/14fa9fa172d51fed122b6584bc3bf01b334a68313985a61c0bec3531c63e461b pid=2300 runtime=io.containerd.runc.v2 Dec 13 15:51:11.968888 env[1570]: time="2024-12-13T15:51:11.968854593Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:51:11.968888 env[1570]: time="2024-12-13T15:51:11.968878313Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:51:11.968888 env[1570]: time="2024-12-13T15:51:11.968885468Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:51:11.969013 env[1570]: time="2024-12-13T15:51:11.968956951Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3f61040119183895e7cb06ca593dd1f85ec037c6ae551898854fd3cb9574b5c5 pid=2316 runtime=io.containerd.runc.v2 Dec 13 15:51:11.970305 env[1570]: time="2024-12-13T15:51:11.970271220Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:51:11.970305 env[1570]: time="2024-12-13T15:51:11.970294551Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:51:11.970382 env[1570]: time="2024-12-13T15:51:11.970305283Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:51:11.970382 env[1570]: time="2024-12-13T15:51:11.970366922Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/be87ec26073526ea9e22ec8acebe0b74d2e1251ff30a5f56eab32cb8196d4058 pid=2338 runtime=io.containerd.runc.v2 Dec 13 15:51:11.973669 systemd[1]: Started cri-containerd-14fa9fa172d51fed122b6584bc3bf01b334a68313985a61c0bec3531c63e461b.scope. Dec 13 15:51:11.975247 systemd[1]: Started cri-containerd-3f61040119183895e7cb06ca593dd1f85ec037c6ae551898854fd3cb9574b5c5.scope. Dec 13 15:51:11.976759 systemd[1]: Started cri-containerd-be87ec26073526ea9e22ec8acebe0b74d2e1251ff30a5f56eab32cb8196d4058.scope. Dec 13 15:51:11.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit: BPF prog-id=61 op=LOAD Dec 13 15:51:11.979000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[2317]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2300 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:11.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134666139666131373264353166656431323262363538346263336266 Dec 13 15:51:11.979000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[2317]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2300 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:11.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134666139666131373264353166656431323262363538346263336266 Dec 13 15:51:11.979000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit: BPF prog-id=62 op=LOAD Dec 13 15:51:11.979000 audit[2317]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000025a70 items=0 ppid=2300 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:11.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134666139666131373264353166656431323262363538346263336266 Dec 13 15:51:11.979000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit: BPF prog-id=63 op=LOAD Dec 13 15:51:11.979000 audit[2317]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000025ab8 items=0 ppid=2300 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:11.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134666139666131373264353166656431323262363538346263336266 Dec 13 15:51:11.979000 audit: BPF prog-id=63 op=UNLOAD Dec 13 15:51:11.979000 audit: BPF prog-id=62 op=UNLOAD Dec 13 15:51:11.979000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.979000 audit: BPF prog-id=64 op=LOAD Dec 13 15:51:11.979000 audit[2317]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000025ec8 items=0 ppid=2300 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:11.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134666139666131373264353166656431323262363538346263336266 Dec 13 15:51:11.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit: BPF prog-id=65 op=LOAD Dec 13 15:51:11.980000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[2339]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2316 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:11.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366363130343031313931383338393565376362303663613539336464 Dec 13 15:51:11.980000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[2339]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2316 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:11.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366363130343031313931383338393565376362303663613539336464 Dec 13 15:51:11.980000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit: BPF prog-id=66 op=LOAD Dec 13 15:51:11.980000 audit[2339]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000390470 items=0 ppid=2316 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:11.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366363130343031313931383338393565376362303663613539336464 Dec 13 15:51:11.980000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit: BPF prog-id=67 op=LOAD Dec 13 15:51:11.980000 audit[2339]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003904b8 items=0 ppid=2316 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:11.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366363130343031313931383338393565376362303663613539336464 Dec 13 15:51:11.980000 audit: BPF prog-id=67 op=UNLOAD Dec 13 15:51:11.980000 audit: BPF prog-id=66 op=UNLOAD Dec 13 15:51:11.980000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[2339]: AVC avc: denied { perfmon } for pid=2339 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit[2339]: AVC avc: denied { bpf } for pid=2339 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.980000 audit: BPF prog-id=68 op=LOAD Dec 13 15:51:11.980000 audit[2339]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003908c8 items=0 ppid=2316 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:11.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366363130343031313931383338393565376362303663613539336464 Dec 13 15:51:11.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.981000 audit: BPF prog-id=69 op=LOAD Dec 13 15:51:11.982000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.982000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2338 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:11.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265383765633236303733353236656139653232656338616365626530 Dec 13 15:51:11.982000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.982000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2338 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:11.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265383765633236303733353236656139653232656338616365626530 Dec 13 15:51:11.982000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.982000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.982000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.982000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.982000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.982000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.982000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.982000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.982000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.982000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.982000 audit: BPF prog-id=70 op=LOAD Dec 13 15:51:11.982000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00009aeb0 items=0 ppid=2338 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:11.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265383765633236303733353236656139653232656338616365626530 Dec 13 15:51:11.982000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.982000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.982000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.982000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.982000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.982000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.982000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.982000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.982000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.982000 audit: BPF prog-id=71 op=LOAD Dec 13 15:51:11.982000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00009aef8 items=0 ppid=2338 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:11.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265383765633236303733353236656139653232656338616365626530 Dec 13 15:51:11.982000 audit: BPF prog-id=71 op=UNLOAD Dec 13 15:51:11.982000 audit: BPF prog-id=70 op=UNLOAD Dec 13 15:51:11.982000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.982000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.982000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.982000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.982000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.982000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.982000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.982000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.982000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.982000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:11.982000 audit: BPF prog-id=72 op=LOAD Dec 13 15:51:11.982000 audit[2354]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00009b308 items=0 ppid=2338 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:11.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265383765633236303733353236656139653232656338616365626530 Dec 13 15:51:11.996300 env[1570]: time="2024-12-13T15:51:11.996256850Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.6-a-a4f471fe95,Uid:0b31ceab45e57b4fcfbb5842ea8a628f,Namespace:kube-system,Attempt:0,} returns sandbox id \"14fa9fa172d51fed122b6584bc3bf01b334a68313985a61c0bec3531c63e461b\"" Dec 13 15:51:11.997056 env[1570]: time="2024-12-13T15:51:11.997036291Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.6-a-a4f471fe95,Uid:e15b7fb2f4d6138583feabfde07ecce6,Namespace:kube-system,Attempt:0,} returns sandbox id \"3f61040119183895e7cb06ca593dd1f85ec037c6ae551898854fd3cb9574b5c5\"" Dec 13 15:51:11.998775 env[1570]: time="2024-12-13T15:51:11.998752834Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.6-a-a4f471fe95,Uid:1a744b5b53b5911c360ae97d04763c62,Namespace:kube-system,Attempt:0,} returns sandbox id \"be87ec26073526ea9e22ec8acebe0b74d2e1251ff30a5f56eab32cb8196d4058\"" Dec 13 15:51:11.998849 env[1570]: time="2024-12-13T15:51:11.998795733Z" level=info msg="CreateContainer within sandbox \"14fa9fa172d51fed122b6584bc3bf01b334a68313985a61c0bec3531c63e461b\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 15:51:11.998849 env[1570]: time="2024-12-13T15:51:11.998828680Z" level=info msg="CreateContainer within sandbox \"3f61040119183895e7cb06ca593dd1f85ec037c6ae551898854fd3cb9574b5c5\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 15:51:11.999731 env[1570]: time="2024-12-13T15:51:11.999693418Z" level=info msg="CreateContainer within sandbox \"be87ec26073526ea9e22ec8acebe0b74d2e1251ff30a5f56eab32cb8196d4058\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 15:51:12.008625 env[1570]: time="2024-12-13T15:51:12.008580822Z" level=info msg="CreateContainer within sandbox \"3f61040119183895e7cb06ca593dd1f85ec037c6ae551898854fd3cb9574b5c5\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"3f8ff000c603edda6713540e4b08eef964ffa7754aed88c73c567910380caa81\"" Dec 13 15:51:12.008871 env[1570]: time="2024-12-13T15:51:12.008823304Z" level=info msg="StartContainer for \"3f8ff000c603edda6713540e4b08eef964ffa7754aed88c73c567910380caa81\"" Dec 13 15:51:12.009122 env[1570]: time="2024-12-13T15:51:12.009073873Z" level=info msg="CreateContainer within sandbox \"14fa9fa172d51fed122b6584bc3bf01b334a68313985a61c0bec3531c63e461b\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"0e62feeae1323cb5f6bea8c7ce6dcd8748ccd544b68893e2e1cfcae16aa9fdd6\"" Dec 13 15:51:12.009301 env[1570]: time="2024-12-13T15:51:12.009261056Z" level=info msg="StartContainer for \"0e62feeae1323cb5f6bea8c7ce6dcd8748ccd544b68893e2e1cfcae16aa9fdd6\"" Dec 13 15:51:12.009953 env[1570]: time="2024-12-13T15:51:12.009934883Z" level=info msg="CreateContainer within sandbox \"be87ec26073526ea9e22ec8acebe0b74d2e1251ff30a5f56eab32cb8196d4058\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"c08d1545fc80842116bc57bc5a5395042147589fcb958aedddb1fab7e089a118\"" Dec 13 15:51:12.010115 env[1570]: time="2024-12-13T15:51:12.010099263Z" level=info msg="StartContainer for \"c08d1545fc80842116bc57bc5a5395042147589fcb958aedddb1fab7e089a118\"" Dec 13 15:51:12.017216 systemd[1]: Started cri-containerd-0e62feeae1323cb5f6bea8c7ce6dcd8748ccd544b68893e2e1cfcae16aa9fdd6.scope. Dec 13 15:51:12.017901 systemd[1]: Started cri-containerd-3f8ff000c603edda6713540e4b08eef964ffa7754aed88c73c567910380caa81.scope. Dec 13 15:51:12.019216 systemd[1]: Started cri-containerd-c08d1545fc80842116bc57bc5a5395042147589fcb958aedddb1fab7e089a118.scope. Dec 13 15:51:12.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.023000 audit: BPF prog-id=73 op=LOAD Dec 13 15:51:12.024000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2431]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2316 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:12.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366386666303030633630336564646136373133353430653462303865 Dec 13 15:51:12.024000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2431]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2316 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:12.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366386666303030633630336564646136373133353430653462303865 Dec 13 15:51:12.024000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit: BPF prog-id=74 op=LOAD Dec 13 15:51:12.024000 audit[2431]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003f68a0 items=0 ppid=2316 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:12.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366386666303030633630336564646136373133353430653462303865 Dec 13 15:51:12.024000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit: BPF prog-id=75 op=LOAD Dec 13 15:51:12.024000 audit[2431]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003f68e8 items=0 ppid=2316 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:12.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366386666303030633630336564646136373133353430653462303865 Dec 13 15:51:12.024000 audit: BPF prog-id=75 op=UNLOAD Dec 13 15:51:12.024000 audit: BPF prog-id=74 op=UNLOAD Dec 13 15:51:12.024000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2431]: AVC avc: denied { perfmon } for pid=2431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2431]: AVC avc: denied { bpf } for pid=2431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit: BPF prog-id=76 op=LOAD Dec 13 15:51:12.024000 audit[2431]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003f6cf8 items=0 ppid=2316 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:12.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366386666303030633630336564646136373133353430653462303865 Dec 13 15:51:12.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit: BPF prog-id=77 op=LOAD Dec 13 15:51:12.024000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2432]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2300 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:12.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065363266656561653133323363623566366265613863376365366463 Dec 13 15:51:12.024000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2432]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2300 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:12.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065363266656561653133323363623566366265613863376365366463 Dec 13 15:51:12.024000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit: BPF prog-id=78 op=LOAD Dec 13 15:51:12.024000 audit[2432]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000280f10 items=0 ppid=2300 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:12.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065363266656561653133323363623566366265613863376365366463 Dec 13 15:51:12.024000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit: BPF prog-id=79 op=LOAD Dec 13 15:51:12.024000 audit[2432]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000280f58 items=0 ppid=2300 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:12.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065363266656561653133323363623566366265613863376365366463 Dec 13 15:51:12.024000 audit: BPF prog-id=79 op=UNLOAD Dec 13 15:51:12.024000 audit: BPF prog-id=78 op=UNLOAD Dec 13 15:51:12.024000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2432]: AVC avc: denied { perfmon } for pid=2432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit[2432]: AVC avc: denied { bpf } for pid=2432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.024000 audit: BPF prog-id=80 op=LOAD Dec 13 15:51:12.024000 audit[2432]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000281368 items=0 ppid=2300 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:12.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065363266656561653133323363623566366265613863376365366463 Dec 13 15:51:12.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit: BPF prog-id=81 op=LOAD Dec 13 15:51:12.025000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[2440]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000195c48 a2=10 a3=1c items=0 ppid=2338 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:12.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330386431353435666338303834323131366263353762633561353339 Dec 13 15:51:12.025000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[2440]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001956b0 a2=3c a3=8 items=0 ppid=2338 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:12.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330386431353435666338303834323131366263353762633561353339 Dec 13 15:51:12.025000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit: BPF prog-id=82 op=LOAD Dec 13 15:51:12.025000 audit[2440]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001959d8 a2=78 a3=c000383dc0 items=0 ppid=2338 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:12.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330386431353435666338303834323131366263353762633561353339 Dec 13 15:51:12.025000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit: BPF prog-id=83 op=LOAD Dec 13 15:51:12.025000 audit[2440]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000195770 a2=78 a3=c000383e08 items=0 ppid=2338 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:12.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330386431353435666338303834323131366263353762633561353339 Dec 13 15:51:12.025000 audit: BPF prog-id=83 op=UNLOAD Dec 13 15:51:12.025000 audit: BPF prog-id=82 op=UNLOAD Dec 13 15:51:12.025000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:12.025000 audit: BPF prog-id=84 op=LOAD Dec 13 15:51:12.025000 audit[2440]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000195c30 a2=78 a3=c0003fe218 items=0 ppid=2338 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:12.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330386431353435666338303834323131366263353762633561353339 Dec 13 15:51:12.041736 env[1570]: time="2024-12-13T15:51:12.041713802Z" level=info msg="StartContainer for \"3f8ff000c603edda6713540e4b08eef964ffa7754aed88c73c567910380caa81\" returns successfully" Dec 13 15:51:12.041981 env[1570]: time="2024-12-13T15:51:12.041954784Z" level=info msg="StartContainer for \"0e62feeae1323cb5f6bea8c7ce6dcd8748ccd544b68893e2e1cfcae16aa9fdd6\" returns successfully" Dec 13 15:51:12.042122 env[1570]: time="2024-12-13T15:51:12.042100291Z" level=info msg="StartContainer for \"c08d1545fc80842116bc57bc5a5395042147589fcb958aedddb1fab7e089a118\" returns successfully" Dec 13 15:51:12.058406 kubelet[2248]: W1213 15:51:12.058368 2248 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://147.28.180.221:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.28.180.221:6443: connect: connection refused Dec 13 15:51:12.058406 kubelet[2248]: E1213 15:51:12.058410 2248 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://147.28.180.221:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.28.180.221:6443: connect: connection refused Dec 13 15:51:12.058540 kubelet[2248]: W1213 15:51:12.058368 2248 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://147.28.180.221:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-a4f471fe95&limit=500&resourceVersion=0": dial tcp 147.28.180.221:6443: connect: connection refused Dec 13 15:51:12.058540 kubelet[2248]: E1213 15:51:12.058425 2248 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://147.28.180.221:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-a4f471fe95&limit=500&resourceVersion=0": dial tcp 147.28.180.221:6443: connect: connection refused Dec 13 15:51:12.448576 kubelet[2248]: I1213 15:51:12.448535 2248 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:12.565000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:51:12.565000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000320d50 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:51:12.565000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:51:12.565000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:51:12.565000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001304020 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:51:12.565000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:51:12.573000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:51:12.573000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:51:12.573000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c0047d7380 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:51:12.573000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:51:12.574000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:51:12.574000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c0045721b0 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:51:12.574000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:51:12.573000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0075d6030 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:51:12.573000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:51:12.574000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:51:12.574000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=48 a1=c004766180 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:51:12.574000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:51:12.574000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:51:12.574000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=48 a1=c0075d6390 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:51:12.574000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:51:12.575000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:51:12.575000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=57 a1=c0041b9320 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:51:12.575000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:51:12.588545 kubelet[2248]: E1213 15:51:12.588522 2248 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.6-a-a4f471fe95\" not found" node="ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:12.692099 kubelet[2248]: I1213 15:51:12.692081 2248 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:12.696390 kubelet[2248]: E1213 15:51:12.696378 2248 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-a4f471fe95\" not found" Dec 13 15:51:12.796853 kubelet[2248]: E1213 15:51:12.796803 2248 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-a4f471fe95\" not found" Dec 13 15:51:12.897973 kubelet[2248]: E1213 15:51:12.897900 2248 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-a4f471fe95\" not found" Dec 13 15:51:12.998803 kubelet[2248]: E1213 15:51:12.998710 2248 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-a4f471fe95\" not found" Dec 13 15:51:13.099561 kubelet[2248]: E1213 15:51:13.099339 2248 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-a4f471fe95\" not found" Dec 13 15:51:13.200682 kubelet[2248]: E1213 15:51:13.200612 2248 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-a4f471fe95\" not found" Dec 13 15:51:13.300963 kubelet[2248]: E1213 15:51:13.300866 2248 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-a4f471fe95\" not found" Dec 13 15:51:13.402177 kubelet[2248]: E1213 15:51:13.401955 2248 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-a4f471fe95\" not found" Dec 13 15:51:13.502831 kubelet[2248]: E1213 15:51:13.502710 2248 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-a4f471fe95\" not found" Dec 13 15:51:13.603418 kubelet[2248]: E1213 15:51:13.603346 2248 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-a4f471fe95\" not found" Dec 13 15:51:13.704039 kubelet[2248]: E1213 15:51:13.703983 2248 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-a4f471fe95\" not found" Dec 13 15:51:13.804986 kubelet[2248]: E1213 15:51:13.804897 2248 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-a4f471fe95\" not found" Dec 13 15:51:13.905920 kubelet[2248]: E1213 15:51:13.905836 2248 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-a4f471fe95\" not found" Dec 13 15:51:14.006961 kubelet[2248]: E1213 15:51:14.006787 2248 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-a4f471fe95\" not found" Dec 13 15:51:14.107346 kubelet[2248]: E1213 15:51:14.107236 2248 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-a4f471fe95\" not found" Dec 13 15:51:14.208266 kubelet[2248]: E1213 15:51:14.208184 2248 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-a4f471fe95\" not found" Dec 13 15:51:14.309383 kubelet[2248]: E1213 15:51:14.309181 2248 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-a4f471fe95\" not found" Dec 13 15:51:14.410366 kubelet[2248]: E1213 15:51:14.410281 2248 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-a4f471fe95\" not found" Dec 13 15:51:14.493139 kubelet[2248]: W1213 15:51:14.493086 2248 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 15:51:14.924761 kubelet[2248]: I1213 15:51:14.924648 2248 apiserver.go:52] "Watching apiserver" Dec 13 15:51:14.932245 kubelet[2248]: I1213 15:51:14.932149 2248 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 15:51:15.083693 systemd[1]: Reloading. Dec 13 15:51:15.115621 /usr/lib/systemd/system-generators/torcx-generator[2580]: time="2024-12-13T15:51:15Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 15:51:15.115638 /usr/lib/systemd/system-generators/torcx-generator[2580]: time="2024-12-13T15:51:15Z" level=info msg="torcx already run" Dec 13 15:51:15.175588 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 15:51:15.175597 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 15:51:15.189738 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 15:51:15.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.269129 kernel: kauditd_printk_skb: 585 callbacks suppressed Dec 13 15:51:15.269198 kernel: audit: type=1400 audit(1734105075.241:556): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.394918 kernel: audit: type=1400 audit(1734105075.241:557): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.394981 kernel: audit: type=1400 audit(1734105075.241:558): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.521703 kernel: audit: type=1400 audit(1734105075.241:559): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.521738 kernel: audit: type=1400 audit(1734105075.241:560): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.585337 kernel: audit: type=1400 audit(1734105075.241:561): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.648813 kernel: audit: type=1400 audit(1734105075.241:562): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.712342 kernel: audit: type=1400 audit(1734105075.241:563): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.775883 kernel: audit: type=1400 audit(1734105075.241:564): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.781604 kubelet[2248]: W1213 15:51:15.781590 2248 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 15:51:15.838994 kernel: audit: type=1400 audit(1734105075.331:565): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.331000 audit: BPF prog-id=85 op=LOAD Dec 13 15:51:15.331000 audit: BPF prog-id=77 op=UNLOAD Dec 13 15:51:15.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.457000 audit: BPF prog-id=86 op=LOAD Dec 13 15:51:15.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.457000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.584000 audit: BPF prog-id=87 op=LOAD Dec 13 15:51:15.584000 audit: BPF prog-id=46 op=UNLOAD Dec 13 15:51:15.584000 audit: BPF prog-id=47 op=UNLOAD Dec 13 15:51:15.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.775000 audit: BPF prog-id=88 op=LOAD Dec 13 15:51:15.775000 audit: BPF prog-id=48 op=UNLOAD Dec 13 15:51:15.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.901000 audit: BPF prog-id=89 op=LOAD Dec 13 15:51:15.901000 audit: BPF prog-id=49 op=UNLOAD Dec 13 15:51:15.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.901000 audit: BPF prog-id=90 op=LOAD Dec 13 15:51:15.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.901000 audit: BPF prog-id=91 op=LOAD Dec 13 15:51:15.901000 audit: BPF prog-id=50 op=UNLOAD Dec 13 15:51:15.901000 audit: BPF prog-id=51 op=UNLOAD Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit: BPF prog-id=92 op=LOAD Dec 13 15:51:15.902000 audit: BPF prog-id=52 op=UNLOAD Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit: BPF prog-id=93 op=LOAD Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit: BPF prog-id=94 op=LOAD Dec 13 15:51:15.902000 audit: BPF prog-id=53 op=UNLOAD Dec 13 15:51:15.902000 audit: BPF prog-id=54 op=UNLOAD Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.902000 audit: BPF prog-id=95 op=LOAD Dec 13 15:51:15.902000 audit: BPF prog-id=55 op=UNLOAD Dec 13 15:51:15.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.903000 audit: BPF prog-id=96 op=LOAD Dec 13 15:51:15.903000 audit: BPF prog-id=69 op=UNLOAD Dec 13 15:51:15.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.904000 audit: BPF prog-id=97 op=LOAD Dec 13 15:51:15.904000 audit: BPF prog-id=65 op=UNLOAD Dec 13 15:51:15.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.905000 audit: BPF prog-id=98 op=LOAD Dec 13 15:51:15.905000 audit: BPF prog-id=56 op=UNLOAD Dec 13 15:51:15.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.905000 audit: BPF prog-id=99 op=LOAD Dec 13 15:51:15.905000 audit: BPF prog-id=81 op=UNLOAD Dec 13 15:51:15.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.906000 audit: BPF prog-id=100 op=LOAD Dec 13 15:51:15.906000 audit: BPF prog-id=61 op=UNLOAD Dec 13 15:51:15.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.906000 audit: BPF prog-id=101 op=LOAD Dec 13 15:51:15.906000 audit: BPF prog-id=57 op=UNLOAD Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit: BPF prog-id=102 op=LOAD Dec 13 15:51:15.907000 audit: BPF prog-id=73 op=UNLOAD Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit: BPF prog-id=103 op=LOAD Dec 13 15:51:15.907000 audit: BPF prog-id=58 op=UNLOAD Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit: BPF prog-id=104 op=LOAD Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:15.907000 audit: BPF prog-id=105 op=LOAD Dec 13 15:51:15.907000 audit: BPF prog-id=59 op=UNLOAD Dec 13 15:51:15.907000 audit: BPF prog-id=60 op=UNLOAD Dec 13 15:51:15.914116 kubelet[2248]: I1213 15:51:15.914099 2248 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 15:51:15.914130 systemd[1]: Stopping kubelet.service... Dec 13 15:51:15.936180 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 15:51:15.936638 systemd[1]: Stopped kubelet.service. Dec 13 15:51:15.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:51:15.940401 systemd[1]: Starting kubelet.service... Dec 13 15:51:15.960000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:51:15.960000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00008efc0 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:51:15.960000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:51:15.960000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:51:15.960000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001234820 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:51:15.960000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:51:15.961000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:51:15.961000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b86020 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:51:15.961000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:51:15.961000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:51:15.961000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000580bc0 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:51:15.961000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:51:16.106350 systemd[1]: Started kubelet.service. Dec 13 15:51:16.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:51:16.137074 kubelet[2644]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 15:51:16.137074 kubelet[2644]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 15:51:16.137074 kubelet[2644]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 15:51:16.137294 kubelet[2644]: I1213 15:51:16.137094 2644 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 15:51:16.139647 kubelet[2644]: I1213 15:51:16.139612 2644 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 15:51:16.139647 kubelet[2644]: I1213 15:51:16.139621 2644 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 15:51:16.139712 kubelet[2644]: I1213 15:51:16.139707 2644 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 15:51:16.140396 kubelet[2644]: I1213 15:51:16.140372 2644 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 15:51:16.140971 kubelet[2644]: I1213 15:51:16.140962 2644 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 15:51:16.175500 kubelet[2644]: I1213 15:51:16.175430 2644 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 15:51:16.176035 kubelet[2644]: I1213 15:51:16.175926 2644 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 15:51:16.176414 kubelet[2644]: I1213 15:51:16.176000 2644 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.6-a-a4f471fe95","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 15:51:16.176686 kubelet[2644]: I1213 15:51:16.176452 2644 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 15:51:16.176686 kubelet[2644]: I1213 15:51:16.176495 2644 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 15:51:16.176686 kubelet[2644]: I1213 15:51:16.176604 2644 state_mem.go:36] "Initialized new in-memory state store" Dec 13 15:51:16.176965 kubelet[2644]: I1213 15:51:16.176805 2644 kubelet.go:400] "Attempting to sync node with API server" Dec 13 15:51:16.176965 kubelet[2644]: I1213 15:51:16.176835 2644 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 15:51:16.176965 kubelet[2644]: I1213 15:51:16.176883 2644 kubelet.go:312] "Adding apiserver pod source" Dec 13 15:51:16.176965 kubelet[2644]: I1213 15:51:16.176912 2644 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 15:51:16.178160 kubelet[2644]: I1213 15:51:16.178091 2644 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 15:51:16.178735 kubelet[2644]: I1213 15:51:16.178656 2644 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 15:51:16.179988 kubelet[2644]: I1213 15:51:16.179946 2644 server.go:1264] "Started kubelet" Dec 13 15:51:16.180255 kubelet[2644]: I1213 15:51:16.180147 2644 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 15:51:16.180458 kubelet[2644]: I1213 15:51:16.180163 2644 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 15:51:16.180748 kubelet[2644]: I1213 15:51:16.180701 2644 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 15:51:16.184000 audit[2644]: AVC avc: denied { mac_admin } for pid=2644 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:16.184000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:51:16.184000 audit[2644]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0013083f0 a1=c00130a3f0 a2=c0013083c0 a3=25 items=0 ppid=1 pid=2644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:16.184000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:51:16.184000 audit[2644]: AVC avc: denied { mac_admin } for pid=2644 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:16.184000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:51:16.184000 audit[2644]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00130c180 a1=c00130a408 a2=c001308480 a3=25 items=0 ppid=1 pid=2644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:16.184000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:51:16.188003 kubelet[2644]: I1213 15:51:16.185345 2644 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 15:51:16.188003 kubelet[2644]: I1213 15:51:16.185656 2644 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 15:51:16.188003 kubelet[2644]: I1213 15:51:16.185763 2644 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 15:51:16.188003 kubelet[2644]: I1213 15:51:16.186463 2644 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 15:51:16.188003 kubelet[2644]: I1213 15:51:16.186668 2644 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 15:51:16.188003 kubelet[2644]: I1213 15:51:16.187199 2644 reconciler.go:26] "Reconciler: start to sync state" Dec 13 15:51:16.188603 kubelet[2644]: I1213 15:51:16.188080 2644 server.go:455] "Adding debug handlers to kubelet server" Dec 13 15:51:16.188936 kubelet[2644]: E1213 15:51:16.188809 2644 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 15:51:16.192644 kubelet[2644]: I1213 15:51:16.192610 2644 factory.go:221] Registration of the containerd container factory successfully Dec 13 15:51:16.192644 kubelet[2644]: I1213 15:51:16.192646 2644 factory.go:221] Registration of the systemd container factory successfully Dec 13 15:51:16.192832 kubelet[2644]: I1213 15:51:16.192771 2644 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 15:51:16.201604 kubelet[2644]: I1213 15:51:16.201460 2644 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 15:51:16.202539 kubelet[2644]: I1213 15:51:16.202517 2644 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 15:51:16.202638 kubelet[2644]: I1213 15:51:16.202553 2644 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 15:51:16.202638 kubelet[2644]: I1213 15:51:16.202569 2644 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 15:51:16.202638 kubelet[2644]: E1213 15:51:16.202605 2644 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 15:51:16.217788 kubelet[2644]: I1213 15:51:16.217771 2644 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 15:51:16.217788 kubelet[2644]: I1213 15:51:16.217782 2644 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 15:51:16.217788 kubelet[2644]: I1213 15:51:16.217794 2644 state_mem.go:36] "Initialized new in-memory state store" Dec 13 15:51:16.217930 kubelet[2644]: I1213 15:51:16.217895 2644 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 15:51:16.217930 kubelet[2644]: I1213 15:51:16.217903 2644 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 15:51:16.217930 kubelet[2644]: I1213 15:51:16.217917 2644 policy_none.go:49] "None policy: Start" Dec 13 15:51:16.218273 kubelet[2644]: I1213 15:51:16.218261 2644 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 15:51:16.218314 kubelet[2644]: I1213 15:51:16.218280 2644 state_mem.go:35] "Initializing new in-memory state store" Dec 13 15:51:16.218450 kubelet[2644]: I1213 15:51:16.218443 2644 state_mem.go:75] "Updated machine memory state" Dec 13 15:51:16.220919 kubelet[2644]: I1213 15:51:16.220879 2644 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 15:51:16.220919 kubelet[2644]: I1213 15:51:16.220912 2644 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 15:51:16.220000 audit[2644]: AVC avc: denied { mac_admin } for pid=2644 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:16.220000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 15:51:16.220000 audit[2644]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c12720 a1=c000e59758 a2=c000c126f0 a3=25 items=0 ppid=1 pid=2644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:16.220000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 15:51:16.221154 kubelet[2644]: I1213 15:51:16.220996 2644 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 15:51:16.221154 kubelet[2644]: I1213 15:51:16.221064 2644 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 15:51:16.288136 kubelet[2644]: I1213 15:51:16.288092 2644 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:16.295160 kubelet[2644]: I1213 15:51:16.295128 2644 kubelet_node_status.go:112] "Node was previously registered" node="ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:16.295218 kubelet[2644]: I1213 15:51:16.295165 2644 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:16.302720 kubelet[2644]: I1213 15:51:16.302701 2644 topology_manager.go:215] "Topology Admit Handler" podUID="0b31ceab45e57b4fcfbb5842ea8a628f" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:16.302791 kubelet[2644]: I1213 15:51:16.302743 2644 topology_manager.go:215] "Topology Admit Handler" podUID="1a744b5b53b5911c360ae97d04763c62" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:16.302791 kubelet[2644]: I1213 15:51:16.302774 2644 topology_manager.go:215] "Topology Admit Handler" podUID="e15b7fb2f4d6138583feabfde07ecce6" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:16.307557 kubelet[2644]: W1213 15:51:16.307545 2644 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 15:51:16.307607 kubelet[2644]: W1213 15:51:16.307570 2644 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 15:51:16.307629 kubelet[2644]: E1213 15:51:16.307610 2644 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.6-a-a4f471fe95\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:16.307655 kubelet[2644]: W1213 15:51:16.307649 2644 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 15:51:16.307683 kubelet[2644]: E1213 15:51:16.307670 2644 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.6-a-a4f471fe95\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:16.388048 kubelet[2644]: I1213 15:51:16.387950 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0b31ceab45e57b4fcfbb5842ea8a628f-ca-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-a4f471fe95\" (UID: \"0b31ceab45e57b4fcfbb5842ea8a628f\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:16.388048 kubelet[2644]: I1213 15:51:16.387981 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/0b31ceab45e57b4fcfbb5842ea8a628f-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.6-a-a4f471fe95\" (UID: \"0b31ceab45e57b4fcfbb5842ea8a628f\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:16.388048 kubelet[2644]: I1213 15:51:16.388006 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0b31ceab45e57b4fcfbb5842ea8a628f-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-a4f471fe95\" (UID: \"0b31ceab45e57b4fcfbb5842ea8a628f\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:16.388174 kubelet[2644]: I1213 15:51:16.388045 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0b31ceab45e57b4fcfbb5842ea8a628f-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.6-a-a4f471fe95\" (UID: \"0b31ceab45e57b4fcfbb5842ea8a628f\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:16.388174 kubelet[2644]: I1213 15:51:16.388068 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e15b7fb2f4d6138583feabfde07ecce6-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.6-a-a4f471fe95\" (UID: \"e15b7fb2f4d6138583feabfde07ecce6\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:16.388174 kubelet[2644]: I1213 15:51:16.388081 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0b31ceab45e57b4fcfbb5842ea8a628f-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.6-a-a4f471fe95\" (UID: \"0b31ceab45e57b4fcfbb5842ea8a628f\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:16.388174 kubelet[2644]: I1213 15:51:16.388094 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/1a744b5b53b5911c360ae97d04763c62-kubeconfig\") pod \"kube-scheduler-ci-3510.3.6-a-a4f471fe95\" (UID: \"1a744b5b53b5911c360ae97d04763c62\") " pod="kube-system/kube-scheduler-ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:16.388174 kubelet[2644]: I1213 15:51:16.388107 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e15b7fb2f4d6138583feabfde07ecce6-ca-certs\") pod \"kube-apiserver-ci-3510.3.6-a-a4f471fe95\" (UID: \"e15b7fb2f4d6138583feabfde07ecce6\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:16.388286 kubelet[2644]: I1213 15:51:16.388118 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e15b7fb2f4d6138583feabfde07ecce6-k8s-certs\") pod \"kube-apiserver-ci-3510.3.6-a-a4f471fe95\" (UID: \"e15b7fb2f4d6138583feabfde07ecce6\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:16.862000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=8281 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 15:51:16.862000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e38d00 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:51:16.862000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:51:17.178102 kubelet[2644]: I1213 15:51:17.178038 2644 apiserver.go:52] "Watching apiserver" Dec 13 15:51:17.187081 kubelet[2644]: I1213 15:51:17.187038 2644 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 15:51:17.212866 kubelet[2644]: W1213 15:51:17.212839 2644 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 15:51:17.212981 kubelet[2644]: E1213 15:51:17.212912 2644 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.6-a-a4f471fe95\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:17.225114 kubelet[2644]: I1213 15:51:17.225059 2644 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.6-a-a4f471fe95" podStartSLOduration=1.225042571 podStartE2EDuration="1.225042571s" podCreationTimestamp="2024-12-13 15:51:16 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 15:51:17.224925778 +0000 UTC m=+1.115716817" watchObservedRunningTime="2024-12-13 15:51:17.225042571 +0000 UTC m=+1.115833619" Dec 13 15:51:17.236745 kubelet[2644]: I1213 15:51:17.236710 2644 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.6-a-a4f471fe95" podStartSLOduration=3.236693992 podStartE2EDuration="3.236693992s" podCreationTimestamp="2024-12-13 15:51:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 15:51:17.236681634 +0000 UTC m=+1.127472674" watchObservedRunningTime="2024-12-13 15:51:17.236693992 +0000 UTC m=+1.127485021" Dec 13 15:51:17.242032 kubelet[2644]: I1213 15:51:17.242000 2644 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.6-a-a4f471fe95" podStartSLOduration=2.241990315 podStartE2EDuration="2.241990315s" podCreationTimestamp="2024-12-13 15:51:15 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 15:51:17.241923564 +0000 UTC m=+1.132714601" watchObservedRunningTime="2024-12-13 15:51:17.241990315 +0000 UTC m=+1.132781343" Dec 13 15:51:20.277368 sudo[1785]: pam_unix(sudo:session): session closed for user root Dec 13 15:51:20.276000 audit[1785]: USER_END pid=1785 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:51:20.278245 sshd[1782]: pam_unix(sshd:session): session closed for user core Dec 13 15:51:20.279708 systemd[1]: sshd@8-147.28.180.221:22-139.178.89.65:44888.service: Deactivated successfully. Dec 13 15:51:20.280154 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 15:51:20.280248 systemd[1]: session-11.scope: Consumed 3.575s CPU time. Dec 13 15:51:20.280495 systemd-logind[1562]: Session 11 logged out. Waiting for processes to exit. Dec 13 15:51:20.280913 systemd-logind[1562]: Removed session 11. Dec 13 15:51:20.304570 kernel: kauditd_printk_skb: 263 callbacks suppressed Dec 13 15:51:20.304602 kernel: audit: type=1106 audit(1734105080.276:810): pid=1785 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:51:20.276000 audit[1785]: CRED_DISP pid=1785 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:51:20.480981 kernel: audit: type=1104 audit(1734105080.276:811): pid=1785 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 15:51:20.481006 kernel: audit: type=1106 audit(1734105080.278:812): pid=1782 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:51:20.278000 audit[1782]: USER_END pid=1782 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:51:20.577464 kernel: audit: type=1104 audit(1734105080.278:813): pid=1782 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:51:20.278000 audit[1782]: CRED_DISP pid=1782 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:51:20.667694 kernel: audit: type=1131 audit(1734105080.279:814): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.28.180.221:22-139.178.89.65:44888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:51:20.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.28.180.221:22-139.178.89.65:44888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:51:21.982837 update_engine[1564]: I1213 15:51:21.982728 1564 update_attempter.cc:509] Updating boot flags... Dec 13 15:51:29.388971 kubelet[2644]: I1213 15:51:29.388913 2644 topology_manager.go:215] "Topology Admit Handler" podUID="0d8fa09b-317b-497e-9e91-c40b905b78d7" podNamespace="kube-system" podName="kube-proxy-glxj2" Dec 13 15:51:29.395771 kubelet[2644]: I1213 15:51:29.395733 2644 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 15:51:29.396268 env[1570]: time="2024-12-13T15:51:29.396216521Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 15:51:29.396809 kubelet[2644]: I1213 15:51:29.396466 2644 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 15:51:29.397147 systemd[1]: Created slice kubepods-besteffort-pod0d8fa09b_317b_497e_9e91_c40b905b78d7.slice. Dec 13 15:51:29.518276 kubelet[2644]: I1213 15:51:29.518237 2644 topology_manager.go:215] "Topology Admit Handler" podUID="99990486-dec8-45e1-a9f4-23e8711e3122" podNamespace="tigera-operator" podName="tigera-operator-7bc55997bb-wfqlh" Dec 13 15:51:29.525651 systemd[1]: Created slice kubepods-besteffort-pod99990486_dec8_45e1_a9f4_23e8711e3122.slice. Dec 13 15:51:29.569123 kubelet[2644]: I1213 15:51:29.569078 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8zdtd\" (UniqueName: \"kubernetes.io/projected/0d8fa09b-317b-497e-9e91-c40b905b78d7-kube-api-access-8zdtd\") pod \"kube-proxy-glxj2\" (UID: \"0d8fa09b-317b-497e-9e91-c40b905b78d7\") " pod="kube-system/kube-proxy-glxj2" Dec 13 15:51:29.569123 kubelet[2644]: I1213 15:51:29.569128 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/99990486-dec8-45e1-a9f4-23e8711e3122-var-lib-calico\") pod \"tigera-operator-7bc55997bb-wfqlh\" (UID: \"99990486-dec8-45e1-a9f4-23e8711e3122\") " pod="tigera-operator/tigera-operator-7bc55997bb-wfqlh" Dec 13 15:51:29.569375 kubelet[2644]: I1213 15:51:29.569233 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/0d8fa09b-317b-497e-9e91-c40b905b78d7-xtables-lock\") pod \"kube-proxy-glxj2\" (UID: \"0d8fa09b-317b-497e-9e91-c40b905b78d7\") " pod="kube-system/kube-proxy-glxj2" Dec 13 15:51:29.569375 kubelet[2644]: I1213 15:51:29.569305 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kskzw\" (UniqueName: \"kubernetes.io/projected/99990486-dec8-45e1-a9f4-23e8711e3122-kube-api-access-kskzw\") pod \"tigera-operator-7bc55997bb-wfqlh\" (UID: \"99990486-dec8-45e1-a9f4-23e8711e3122\") " pod="tigera-operator/tigera-operator-7bc55997bb-wfqlh" Dec 13 15:51:29.569375 kubelet[2644]: I1213 15:51:29.569366 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/0d8fa09b-317b-497e-9e91-c40b905b78d7-kube-proxy\") pod \"kube-proxy-glxj2\" (UID: \"0d8fa09b-317b-497e-9e91-c40b905b78d7\") " pod="kube-system/kube-proxy-glxj2" Dec 13 15:51:29.569586 kubelet[2644]: I1213 15:51:29.569410 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/0d8fa09b-317b-497e-9e91-c40b905b78d7-lib-modules\") pod \"kube-proxy-glxj2\" (UID: \"0d8fa09b-317b-497e-9e91-c40b905b78d7\") " pod="kube-system/kube-proxy-glxj2" Dec 13 15:51:29.684159 kubelet[2644]: E1213 15:51:29.684064 2644 projected.go:294] Couldn't get configMap tigera-operator/kube-root-ca.crt: configmap "kube-root-ca.crt" not found Dec 13 15:51:29.684159 kubelet[2644]: E1213 15:51:29.684069 2644 projected.go:294] Couldn't get configMap kube-system/kube-root-ca.crt: configmap "kube-root-ca.crt" not found Dec 13 15:51:29.684159 kubelet[2644]: E1213 15:51:29.684126 2644 projected.go:200] Error preparing data for projected volume kube-api-access-kskzw for pod tigera-operator/tigera-operator-7bc55997bb-wfqlh: configmap "kube-root-ca.crt" not found Dec 13 15:51:29.684159 kubelet[2644]: E1213 15:51:29.684152 2644 projected.go:200] Error preparing data for projected volume kube-api-access-8zdtd for pod kube-system/kube-proxy-glxj2: configmap "kube-root-ca.crt" not found Dec 13 15:51:29.684799 kubelet[2644]: E1213 15:51:29.684257 2644 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/99990486-dec8-45e1-a9f4-23e8711e3122-kube-api-access-kskzw podName:99990486-dec8-45e1-a9f4-23e8711e3122 nodeName:}" failed. No retries permitted until 2024-12-13 15:51:30.184209034 +0000 UTC m=+14.075000126 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-kskzw" (UniqueName: "kubernetes.io/projected/99990486-dec8-45e1-a9f4-23e8711e3122-kube-api-access-kskzw") pod "tigera-operator-7bc55997bb-wfqlh" (UID: "99990486-dec8-45e1-a9f4-23e8711e3122") : configmap "kube-root-ca.crt" not found Dec 13 15:51:29.684799 kubelet[2644]: E1213 15:51:29.684303 2644 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/0d8fa09b-317b-497e-9e91-c40b905b78d7-kube-api-access-8zdtd podName:0d8fa09b-317b-497e-9e91-c40b905b78d7 nodeName:}" failed. No retries permitted until 2024-12-13 15:51:30.184277922 +0000 UTC m=+14.075069005 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-8zdtd" (UniqueName: "kubernetes.io/projected/0d8fa09b-317b-497e-9e91-c40b905b78d7-kube-api-access-8zdtd") pod "kube-proxy-glxj2" (UID: "0d8fa09b-317b-497e-9e91-c40b905b78d7") : configmap "kube-root-ca.crt" not found Dec 13 15:51:30.310113 env[1570]: time="2024-12-13T15:51:30.310050500Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-glxj2,Uid:0d8fa09b-317b-497e-9e91-c40b905b78d7,Namespace:kube-system,Attempt:0,}" Dec 13 15:51:30.318547 env[1570]: time="2024-12-13T15:51:30.318466070Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:51:30.318547 env[1570]: time="2024-12-13T15:51:30.318506538Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:51:30.318547 env[1570]: time="2024-12-13T15:51:30.318518531Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:51:30.318710 env[1570]: time="2024-12-13T15:51:30.318643631Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6ff300347d114550981c59f51d8cd378d7a2d1d377d027f0ec35e080c78a1b56 pid=2829 runtime=io.containerd.runc.v2 Dec 13 15:51:30.332395 systemd[1]: Started cri-containerd-6ff300347d114550981c59f51d8cd378d7a2d1d377d027f0ec35e080c78a1b56.scope. Dec 13 15:51:30.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.427932 env[1570]: time="2024-12-13T15:51:30.427899744Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7bc55997bb-wfqlh,Uid:99990486-dec8-45e1-a9f4-23e8711e3122,Namespace:tigera-operator,Attempt:0,}" Dec 13 15:51:30.436747 env[1570]: time="2024-12-13T15:51:30.436687084Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:51:30.436747 env[1570]: time="2024-12-13T15:51:30.436709414Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:51:30.436747 env[1570]: time="2024-12-13T15:51:30.436716195Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:51:30.436845 env[1570]: time="2024-12-13T15:51:30.436777984Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d89f47b0e211b2b8d717b5bbc374c08580816cbffdf9024375aef622107e6a76 pid=2862 runtime=io.containerd.runc.v2 Dec 13 15:51:30.468595 kernel: audit: type=1400 audit(1734105090.340:815): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.468654 kernel: audit: type=1400 audit(1734105090.340:816): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.468674 kernel: audit: type=1400 audit(1734105090.340:817): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.532356 kernel: audit: type=1400 audit(1734105090.340:818): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.533596 systemd[1]: Started cri-containerd-d89f47b0e211b2b8d717b5bbc374c08580816cbffdf9024375aef622107e6a76.scope. Dec 13 15:51:30.596493 kernel: audit: type=1400 audit(1734105090.340:819): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.660619 kernel: audit: type=1400 audit(1734105090.340:820): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.724969 kernel: audit: type=1400 audit(1734105090.340:821): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.789429 kernel: audit: type=1400 audit(1734105090.340:822): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.853880 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 15:51:30.853917 kernel: audit: type=1400 audit(1734105090.340:823): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.530000 audit: BPF prog-id=106 op=LOAD Dec 13 15:51:30.531000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.531000 audit[2840]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2829 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:30.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666663330303334376431313435353039383163353966353164386364 Dec 13 15:51:30.531000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.531000 audit[2840]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2829 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:30.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666663330303334376431313435353039383163353966353164386364 Dec 13 15:51:30.531000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.531000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.531000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.531000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.531000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.531000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.531000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.531000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.531000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.531000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.531000 audit: BPF prog-id=107 op=LOAD Dec 13 15:51:30.531000 audit[2840]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003ca000 items=0 ppid=2829 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:30.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666663330303334376431313435353039383163353966353164386364 Dec 13 15:51:30.659000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.659000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.659000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.659000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.659000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.659000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.659000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.659000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.723000 audit: BPF prog-id=108 op=LOAD Dec 13 15:51:30.723000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.723000 audit[2872]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2862 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:30.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438396634376230653231316232623864373137623562626333373463 Dec 13 15:51:30.723000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.723000 audit[2872]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2862 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:30.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438396634376230653231316232623864373137623562626333373463 Dec 13 15:51:30.723000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.723000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.723000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.723000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.723000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.723000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.723000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.723000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.723000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.659000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.659000 audit: BPF prog-id=109 op=LOAD Dec 13 15:51:30.659000 audit[2840]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003ca048 items=0 ppid=2829 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:30.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666663330303334376431313435353039383163353966353164386364 Dec 13 15:51:30.723000 audit[2872]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000325fd0 items=0 ppid=2862 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:30.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438396634376230653231316232623864373137623562626333373463 Dec 13 15:51:30.943000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.943000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.943000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.943000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.943000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.943000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.943000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.943000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.943000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.943000 audit: BPF prog-id=112 op=LOAD Dec 13 15:51:30.943000 audit[2872]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000392018 items=0 ppid=2862 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:30.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438396634376230653231316232623864373137623562626333373463 Dec 13 15:51:30.943000 audit: BPF prog-id=112 op=UNLOAD Dec 13 15:51:30.943000 audit: BPF prog-id=110 op=UNLOAD Dec 13 15:51:30.943000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.943000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.943000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.943000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.943000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.943000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.943000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.943000 audit[2872]: AVC avc: denied { perfmon } for pid=2872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.943000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.943000 audit[2872]: AVC avc: denied { bpf } for pid=2872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.943000 audit: BPF prog-id=113 op=LOAD Dec 13 15:51:30.943000 audit[2872]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000392428 items=0 ppid=2862 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:30.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438396634376230653231316232623864373137623562626333373463 Dec 13 15:51:30.949248 env[1570]: time="2024-12-13T15:51:30.949228284Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-glxj2,Uid:0d8fa09b-317b-497e-9e91-c40b905b78d7,Namespace:kube-system,Attempt:0,} returns sandbox id \"6ff300347d114550981c59f51d8cd378d7a2d1d377d027f0ec35e080c78a1b56\"" Dec 13 15:51:30.950595 env[1570]: time="2024-12-13T15:51:30.950577625Z" level=info msg="CreateContainer within sandbox \"6ff300347d114550981c59f51d8cd378d7a2d1d377d027f0ec35e080c78a1b56\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 15:51:30.955689 env[1570]: time="2024-12-13T15:51:30.955643659Z" level=info msg="CreateContainer within sandbox \"6ff300347d114550981c59f51d8cd378d7a2d1d377d027f0ec35e080c78a1b56\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"3b8d143e80d7147ddd325fa772c20e3d64d11a06a11bafd1871290195a618947\"" Dec 13 15:51:30.955892 env[1570]: time="2024-12-13T15:51:30.955844217Z" level=info msg="StartContainer for \"3b8d143e80d7147ddd325fa772c20e3d64d11a06a11bafd1871290195a618947\"" Dec 13 15:51:30.961845 env[1570]: time="2024-12-13T15:51:30.961819390Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7bc55997bb-wfqlh,Uid:99990486-dec8-45e1-a9f4-23e8711e3122,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"d89f47b0e211b2b8d717b5bbc374c08580816cbffdf9024375aef622107e6a76\"" Dec 13 15:51:30.962570 env[1570]: time="2024-12-13T15:51:30.962553292Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 15:51:30.964166 systemd[1]: Started cri-containerd-3b8d143e80d7147ddd325fa772c20e3d64d11a06a11bafd1871290195a618947.scope. Dec 13 15:51:30.970000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.970000 audit[2902]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f94856aad58 items=0 ppid=2829 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:30.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362386431343365383064373134376464643332356661373732633230 Dec 13 15:51:30.970000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.970000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.970000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.970000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.970000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.970000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.970000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.970000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.970000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.970000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.970000 audit: BPF prog-id=114 op=LOAD Dec 13 15:51:30.970000 audit[2902]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002f3c58 items=0 ppid=2829 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:30.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362386431343365383064373134376464643332356661373732633230 Dec 13 15:51:30.970000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.970000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.970000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.970000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.970000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.970000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.970000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.970000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.970000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.970000 audit: BPF prog-id=115 op=LOAD Dec 13 15:51:30.970000 audit[2902]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002f3ca8 items=0 ppid=2829 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:30.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362386431343365383064373134376464643332356661373732633230 Dec 13 15:51:30.970000 audit: BPF prog-id=115 op=UNLOAD Dec 13 15:51:30.970000 audit: BPF prog-id=114 op=UNLOAD Dec 13 15:51:30.970000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.970000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.970000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.970000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.970000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.970000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.970000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.970000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.970000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.970000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:30.970000 audit: BPF prog-id=116 op=LOAD Dec 13 15:51:30.970000 audit[2902]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002f3d38 items=0 ppid=2829 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:30.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362386431343365383064373134376464643332356661373732633230 Dec 13 15:51:30.977813 env[1570]: time="2024-12-13T15:51:30.977761608Z" level=info msg="StartContainer for \"3b8d143e80d7147ddd325fa772c20e3d64d11a06a11bafd1871290195a618947\" returns successfully" Dec 13 15:51:31.006000 audit[2973]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2973 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:51:31.006000 audit[2973]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe30bbdf30 a2=0 a3=7ffe30bbdf1c items=0 ppid=2919 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.006000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 15:51:31.006000 audit[2972]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2972 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:51:31.006000 audit[2972]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe72469c70 a2=0 a3=5064f19c126a633 items=0 ppid=2919 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.006000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 15:51:31.007000 audit[2974]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2974 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:51:31.007000 audit[2974]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe83f6ef00 a2=0 a3=7ffe83f6eeec items=0 ppid=2919 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.007000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 15:51:31.007000 audit[2975]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2975 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:51:31.007000 audit[2975]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda3f03f90 a2=0 a3=7ffda3f03f7c items=0 ppid=2919 pid=2975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.007000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 15:51:31.007000 audit[2976]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2976 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:51:31.007000 audit[2976]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd4ac280e0 a2=0 a3=7ffd4ac280cc items=0 ppid=2919 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.007000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 15:51:31.007000 audit[2977]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2977 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:51:31.007000 audit[2977]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd43af1260 a2=0 a3=7ffd43af124c items=0 ppid=2919 pid=2977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.007000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 15:51:31.110000 audit[2978]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2978 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:51:31.110000 audit[2978]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc6c9c68f0 a2=0 a3=7ffc6c9c68dc items=0 ppid=2919 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.110000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 15:51:31.117000 audit[2980]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2980 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:51:31.117000 audit[2980]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd14c7f490 a2=0 a3=7ffd14c7f47c items=0 ppid=2919 pid=2980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.117000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 15:51:31.127000 audit[2983]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2983 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:51:31.127000 audit[2983]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff0477eca0 a2=0 a3=7fff0477ec8c items=0 ppid=2919 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.127000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 15:51:31.129000 audit[2984]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2984 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:51:31.129000 audit[2984]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4b27dcf0 a2=0 a3=7fff4b27dcdc items=0 ppid=2919 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.129000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 15:51:31.136000 audit[2986]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2986 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:51:31.136000 audit[2986]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd278b21f0 a2=0 a3=7ffd278b21dc items=0 ppid=2919 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.136000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 15:51:31.139000 audit[2987]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2987 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:51:31.139000 audit[2987]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcefde0d90 a2=0 a3=7ffcefde0d7c items=0 ppid=2919 pid=2987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.139000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 15:51:31.146000 audit[2989]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2989 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:51:31.146000 audit[2989]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe31414c60 a2=0 a3=7ffe31414c4c items=0 ppid=2919 pid=2989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.146000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 15:51:31.156000 audit[2992]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2992 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:51:31.156000 audit[2992]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc02c5df80 a2=0 a3=7ffc02c5df6c items=0 ppid=2919 pid=2992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.156000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 15:51:31.159000 audit[2993]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2993 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:51:31.159000 audit[2993]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff695f9920 a2=0 a3=7fff695f990c items=0 ppid=2919 pid=2993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.159000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 15:51:31.166000 audit[2995]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2995 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:51:31.166000 audit[2995]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeea02d250 a2=0 a3=7ffeea02d23c items=0 ppid=2919 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.166000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 15:51:31.169000 audit[2996]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2996 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:51:31.169000 audit[2996]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd6f58be90 a2=0 a3=7ffd6f58be7c items=0 ppid=2919 pid=2996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.169000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 15:51:31.176000 audit[2998]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2998 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:51:31.176000 audit[2998]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffbdce3e20 a2=0 a3=7fffbdce3e0c items=0 ppid=2919 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.176000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 15:51:31.186000 audit[3001]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=3001 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:51:31.186000 audit[3001]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc8f9d1d50 a2=0 a3=7ffc8f9d1d3c items=0 ppid=2919 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.186000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 15:51:31.196000 audit[3004]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=3004 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:51:31.196000 audit[3004]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc7d1f38c0 a2=0 a3=7ffc7d1f38ac items=0 ppid=2919 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.196000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 15:51:31.199000 audit[3005]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=3005 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:51:31.199000 audit[3005]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd1c726f10 a2=0 a3=7ffd1c726efc items=0 ppid=2919 pid=3005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.199000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 15:51:31.205000 audit[3007]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=3007 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:51:31.205000 audit[3007]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffe09deb370 a2=0 a3=7ffe09deb35c items=0 ppid=2919 pid=3007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.205000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 15:51:31.215000 audit[3010]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=3010 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:51:31.215000 audit[3010]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdd861b400 a2=0 a3=7ffdd861b3ec items=0 ppid=2919 pid=3010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.215000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 15:51:31.218000 audit[3011]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=3011 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:51:31.218000 audit[3011]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe98b29890 a2=0 a3=7ffe98b2987c items=0 ppid=2919 pid=3011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.218000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 15:51:31.224000 audit[3013]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=3013 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 15:51:31.224000 audit[3013]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fff29418a00 a2=0 a3=7fff294189ec items=0 ppid=2919 pid=3013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.224000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 15:51:31.287000 audit[3019]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=3019 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:51:31.287000 audit[3019]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffc03698170 a2=0 a3=7ffc0369815c items=0 ppid=2919 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.287000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:51:31.313000 audit[3019]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=3019 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:51:31.313000 audit[3019]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffc03698170 a2=0 a3=7ffc0369815c items=0 ppid=2919 pid=3019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.313000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:51:31.314000 audit[3024]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=3024 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:51:31.314000 audit[3024]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffff3444480 a2=0 a3=7ffff344446c items=0 ppid=2919 pid=3024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.314000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 15:51:31.318000 audit[3026]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=3026 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:51:31.318000 audit[3026]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe4946ad30 a2=0 a3=7ffe4946ad1c items=0 ppid=2919 pid=3026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.318000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 15:51:31.323000 audit[3029]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=3029 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:51:31.323000 audit[3029]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff81089f70 a2=0 a3=7fff81089f5c items=0 ppid=2919 pid=3029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.323000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 15:51:31.325000 audit[3030]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=3030 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:51:31.325000 audit[3030]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe19c3570 a2=0 a3=7fffe19c355c items=0 ppid=2919 pid=3030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.325000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 15:51:31.328000 audit[3032]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=3032 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:51:31.328000 audit[3032]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd38256780 a2=0 a3=7ffd3825676c items=0 ppid=2919 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.328000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 15:51:31.330000 audit[3033]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=3033 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:51:31.330000 audit[3033]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcfa2e5960 a2=0 a3=7ffcfa2e594c items=0 ppid=2919 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.330000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 15:51:31.334000 audit[3035]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=3035 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:51:31.334000 audit[3035]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff2a6bddc0 a2=0 a3=7fff2a6bddac items=0 ppid=2919 pid=3035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.334000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 15:51:31.339000 audit[3038]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=3038 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:51:31.339000 audit[3038]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffefd8f9440 a2=0 a3=7ffefd8f942c items=0 ppid=2919 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.339000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 15:51:31.340000 audit[3039]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=3039 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:51:31.340000 audit[3039]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff66076c60 a2=0 a3=7fff66076c4c items=0 ppid=2919 pid=3039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.340000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 15:51:31.344000 audit[3041]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=3041 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:51:31.344000 audit[3041]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffefa96f300 a2=0 a3=7ffefa96f2ec items=0 ppid=2919 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.344000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 15:51:31.345000 audit[3042]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=3042 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:51:31.345000 audit[3042]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd4d692160 a2=0 a3=7ffd4d69214c items=0 ppid=2919 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.345000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 15:51:31.349000 audit[3044]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=3044 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:51:31.349000 audit[3044]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd4bd7b590 a2=0 a3=7ffd4bd7b57c items=0 ppid=2919 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.349000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 15:51:31.354000 audit[3047]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=3047 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:51:31.354000 audit[3047]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe0a6aa930 a2=0 a3=7ffe0a6aa91c items=0 ppid=2919 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.354000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 15:51:31.359000 audit[3050]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=3050 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:51:31.359000 audit[3050]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe75363d20 a2=0 a3=7ffe75363d0c items=0 ppid=2919 pid=3050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.359000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 15:51:31.360000 audit[3051]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=3051 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:51:31.360000 audit[3051]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcfe62ba60 a2=0 a3=7ffcfe62ba4c items=0 ppid=2919 pid=3051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.360000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 15:51:31.363000 audit[3053]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=3053 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:51:31.363000 audit[3053]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe8346ef90 a2=0 a3=7ffe8346ef7c items=0 ppid=2919 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.363000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 15:51:31.368000 audit[3056]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=3056 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:51:31.368000 audit[3056]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffdab8f8d60 a2=0 a3=7ffdab8f8d4c items=0 ppid=2919 pid=3056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.368000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 15:51:31.370000 audit[3057]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=3057 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:51:31.370000 audit[3057]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdcd28fa70 a2=0 a3=7ffdcd28fa5c items=0 ppid=2919 pid=3057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.370000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 15:51:31.373000 audit[3059]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=3059 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:51:31.373000 audit[3059]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffcbbaf5ca0 a2=0 a3=7ffcbbaf5c8c items=0 ppid=2919 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.373000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 15:51:31.375000 audit[3060]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3060 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:51:31.375000 audit[3060]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee8389070 a2=0 a3=7ffee838905c items=0 ppid=2919 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.375000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 15:51:31.378000 audit[3062]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=3062 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:51:31.378000 audit[3062]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff839bc030 a2=0 a3=7fff839bc01c items=0 ppid=2919 pid=3062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.378000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 15:51:31.383000 audit[3065]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=3065 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 15:51:31.383000 audit[3065]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe3bacf3b0 a2=0 a3=7ffe3bacf39c items=0 ppid=2919 pid=3065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.383000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 15:51:31.387000 audit[3067]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3067 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 15:51:31.387000 audit[3067]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffc146175c0 a2=0 a3=7ffc146175ac items=0 ppid=2919 pid=3067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.387000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:51:31.388000 audit[3067]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3067 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 15:51:31.388000 audit[3067]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc146175c0 a2=0 a3=7ffc146175ac items=0 ppid=2919 pid=3067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:31.388000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:51:32.665771 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3643737950.mount: Deactivated successfully. Dec 13 15:51:33.313781 env[1570]: time="2024-12-13T15:51:33.313728695Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:33.314322 env[1570]: time="2024-12-13T15:51:33.314282243Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:33.314938 env[1570]: time="2024-12-13T15:51:33.314896885Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:33.315591 env[1570]: time="2024-12-13T15:51:33.315531249Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:33.316171 env[1570]: time="2024-12-13T15:51:33.316129229Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 15:51:33.317693 env[1570]: time="2024-12-13T15:51:33.317632545Z" level=info msg="CreateContainer within sandbox \"d89f47b0e211b2b8d717b5bbc374c08580816cbffdf9024375aef622107e6a76\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 15:51:33.322012 env[1570]: time="2024-12-13T15:51:33.321993815Z" level=info msg="CreateContainer within sandbox \"d89f47b0e211b2b8d717b5bbc374c08580816cbffdf9024375aef622107e6a76\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"fd0b82eeca6eaf527cbfb045698327d5a3d684ef318396e5b63826b06850a9c5\"" Dec 13 15:51:33.322280 env[1570]: time="2024-12-13T15:51:33.322266925Z" level=info msg="StartContainer for \"fd0b82eeca6eaf527cbfb045698327d5a3d684ef318396e5b63826b06850a9c5\"" Dec 13 15:51:33.330337 systemd[1]: Started cri-containerd-fd0b82eeca6eaf527cbfb045698327d5a3d684ef318396e5b63826b06850a9c5.scope. Dec 13 15:51:33.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.335000 audit: BPF prog-id=117 op=LOAD Dec 13 15:51:33.335000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.335000 audit[3075]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2862 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:33.335000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664306238326565636136656166353237636266623034353639383332 Dec 13 15:51:33.336000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.336000 audit[3075]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2862 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:33.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664306238326565636136656166353237636266623034353639383332 Dec 13 15:51:33.336000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.336000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.336000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.336000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.336000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.336000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.336000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.336000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.336000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.336000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.336000 audit: BPF prog-id=118 op=LOAD Dec 13 15:51:33.336000 audit[3075]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002a0c60 items=0 ppid=2862 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:33.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664306238326565636136656166353237636266623034353639383332 Dec 13 15:51:33.336000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.336000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.336000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.336000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.336000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.336000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.336000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.336000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.336000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.336000 audit: BPF prog-id=119 op=LOAD Dec 13 15:51:33.336000 audit[3075]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002a0ca8 items=0 ppid=2862 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:33.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664306238326565636136656166353237636266623034353639383332 Dec 13 15:51:33.336000 audit: BPF prog-id=119 op=UNLOAD Dec 13 15:51:33.336000 audit: BPF prog-id=118 op=UNLOAD Dec 13 15:51:33.336000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.336000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.336000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.336000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.336000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.336000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.336000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.336000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.336000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.336000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:33.336000 audit: BPF prog-id=120 op=LOAD Dec 13 15:51:33.336000 audit[3075]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002a10b8 items=0 ppid=2862 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:33.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664306238326565636136656166353237636266623034353639383332 Dec 13 15:51:33.343206 env[1570]: time="2024-12-13T15:51:33.343148736Z" level=info msg="StartContainer for \"fd0b82eeca6eaf527cbfb045698327d5a3d684ef318396e5b63826b06850a9c5\" returns successfully" Dec 13 15:51:34.268927 kubelet[2644]: I1213 15:51:34.268897 2644 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-glxj2" podStartSLOduration=5.268887116 podStartE2EDuration="5.268887116s" podCreationTimestamp="2024-12-13 15:51:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 15:51:31.265098094 +0000 UTC m=+15.155889226" watchObservedRunningTime="2024-12-13 15:51:34.268887116 +0000 UTC m=+18.159678142" Dec 13 15:51:34.269155 kubelet[2644]: I1213 15:51:34.268965 2644 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7bc55997bb-wfqlh" podStartSLOduration=2.914548755 podStartE2EDuration="5.268960698s" podCreationTimestamp="2024-12-13 15:51:29 +0000 UTC" firstStartedPulling="2024-12-13 15:51:30.962288815 +0000 UTC m=+14.853079849" lastFinishedPulling="2024-12-13 15:51:33.316700762 +0000 UTC m=+17.207491792" observedRunningTime="2024-12-13 15:51:34.268835854 +0000 UTC m=+18.159626883" watchObservedRunningTime="2024-12-13 15:51:34.268960698 +0000 UTC m=+18.159751724" Dec 13 15:51:36.002000 audit[3119]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3119 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:51:36.030469 kernel: kauditd_printk_skb: 385 callbacks suppressed Dec 13 15:51:36.030522 kernel: audit: type=1325 audit(1734105096.002:923): table=filter:89 family=2 entries=15 op=nft_register_rule pid=3119 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:51:36.002000 audit[3119]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc296094c0 a2=0 a3=7ffc296094ac items=0 ppid=2919 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:36.131035 kubelet[2644]: I1213 15:51:36.131013 2644 topology_manager.go:215] "Topology Admit Handler" podUID="eec2db24-2994-40e9-b7b3-d6ed305f780e" podNamespace="calico-system" podName="calico-typha-769797d5d5-rvcng" Dec 13 15:51:36.133933 systemd[1]: Created slice kubepods-besteffort-podeec2db24_2994_40e9_b7b3_d6ed305f780e.slice. Dec 13 15:51:36.187321 kernel: audit: type=1300 audit(1734105096.002:923): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc296094c0 a2=0 a3=7ffc296094ac items=0 ppid=2919 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:36.187386 kernel: audit: type=1327 audit(1734105096.002:923): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:51:36.002000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:51:36.252000 audit[3119]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3119 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:51:36.252000 audit[3119]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc296094c0 a2=0 a3=0 items=0 ppid=2919 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:36.314658 kubelet[2644]: I1213 15:51:36.314634 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/eec2db24-2994-40e9-b7b3-d6ed305f780e-tigera-ca-bundle\") pod \"calico-typha-769797d5d5-rvcng\" (UID: \"eec2db24-2994-40e9-b7b3-d6ed305f780e\") " pod="calico-system/calico-typha-769797d5d5-rvcng" Dec 13 15:51:36.314733 kubelet[2644]: I1213 15:51:36.314670 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pl4wm\" (UniqueName: \"kubernetes.io/projected/eec2db24-2994-40e9-b7b3-d6ed305f780e-kube-api-access-pl4wm\") pod \"calico-typha-769797d5d5-rvcng\" (UID: \"eec2db24-2994-40e9-b7b3-d6ed305f780e\") " pod="calico-system/calico-typha-769797d5d5-rvcng" Dec 13 15:51:36.314733 kubelet[2644]: I1213 15:51:36.314689 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/eec2db24-2994-40e9-b7b3-d6ed305f780e-typha-certs\") pod \"calico-typha-769797d5d5-rvcng\" (UID: \"eec2db24-2994-40e9-b7b3-d6ed305f780e\") " pod="calico-system/calico-typha-769797d5d5-rvcng" Dec 13 15:51:36.328846 kubelet[2644]: I1213 15:51:36.328800 2644 topology_manager.go:215] "Topology Admit Handler" podUID="43c21e19-1f4f-4840-979c-661550618950" podNamespace="calico-system" podName="calico-node-blbsh" Dec 13 15:51:36.331646 systemd[1]: Created slice kubepods-besteffort-pod43c21e19_1f4f_4840_979c_661550618950.slice. Dec 13 15:51:36.409761 kernel: audit: type=1325 audit(1734105096.252:924): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3119 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:51:36.409831 kernel: audit: type=1300 audit(1734105096.252:924): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc296094c0 a2=0 a3=0 items=0 ppid=2919 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:36.409846 kernel: audit: type=1327 audit(1734105096.252:924): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:51:36.252000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:51:36.417973 kubelet[2644]: I1213 15:51:36.417955 2644 topology_manager.go:215] "Topology Admit Handler" podUID="11d81f55-fe60-46f8-9d77-159b021295c1" podNamespace="calico-system" podName="csi-node-driver-jxftf" Dec 13 15:51:36.418134 kubelet[2644]: E1213 15:51:36.418122 2644 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jxftf" podUID="11d81f55-fe60-46f8-9d77-159b021295c1" Dec 13 15:51:36.471000 audit[3125]: NETFILTER_CFG table=filter:91 family=2 entries=17 op=nft_register_rule pid=3125 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:51:36.515616 kubelet[2644]: I1213 15:51:36.515564 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/43c21e19-1f4f-4840-979c-661550618950-lib-modules\") pod \"calico-node-blbsh\" (UID: \"43c21e19-1f4f-4840-979c-661550618950\") " pod="calico-system/calico-node-blbsh" Dec 13 15:51:36.515616 kubelet[2644]: I1213 15:51:36.515601 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/43c21e19-1f4f-4840-979c-661550618950-var-run-calico\") pod \"calico-node-blbsh\" (UID: \"43c21e19-1f4f-4840-979c-661550618950\") " pod="calico-system/calico-node-blbsh" Dec 13 15:51:36.515616 kubelet[2644]: I1213 15:51:36.515614 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/43c21e19-1f4f-4840-979c-661550618950-cni-net-dir\") pod \"calico-node-blbsh\" (UID: \"43c21e19-1f4f-4840-979c-661550618950\") " pod="calico-system/calico-node-blbsh" Dec 13 15:51:36.515616 kubelet[2644]: I1213 15:51:36.515623 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/43c21e19-1f4f-4840-979c-661550618950-policysync\") pod \"calico-node-blbsh\" (UID: \"43c21e19-1f4f-4840-979c-661550618950\") " pod="calico-system/calico-node-blbsh" Dec 13 15:51:36.515768 kubelet[2644]: I1213 15:51:36.515631 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/43c21e19-1f4f-4840-979c-661550618950-node-certs\") pod \"calico-node-blbsh\" (UID: \"43c21e19-1f4f-4840-979c-661550618950\") " pod="calico-system/calico-node-blbsh" Dec 13 15:51:36.515768 kubelet[2644]: I1213 15:51:36.515641 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/43c21e19-1f4f-4840-979c-661550618950-tigera-ca-bundle\") pod \"calico-node-blbsh\" (UID: \"43c21e19-1f4f-4840-979c-661550618950\") " pod="calico-system/calico-node-blbsh" Dec 13 15:51:36.515768 kubelet[2644]: I1213 15:51:36.515649 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/43c21e19-1f4f-4840-979c-661550618950-flexvol-driver-host\") pod \"calico-node-blbsh\" (UID: \"43c21e19-1f4f-4840-979c-661550618950\") " pod="calico-system/calico-node-blbsh" Dec 13 15:51:36.515768 kubelet[2644]: I1213 15:51:36.515662 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hrbmv\" (UniqueName: \"kubernetes.io/projected/43c21e19-1f4f-4840-979c-661550618950-kube-api-access-hrbmv\") pod \"calico-node-blbsh\" (UID: \"43c21e19-1f4f-4840-979c-661550618950\") " pod="calico-system/calico-node-blbsh" Dec 13 15:51:36.515768 kubelet[2644]: I1213 15:51:36.515678 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/43c21e19-1f4f-4840-979c-661550618950-cni-log-dir\") pod \"calico-node-blbsh\" (UID: \"43c21e19-1f4f-4840-979c-661550618950\") " pod="calico-system/calico-node-blbsh" Dec 13 15:51:36.515862 kubelet[2644]: I1213 15:51:36.515696 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/43c21e19-1f4f-4840-979c-661550618950-xtables-lock\") pod \"calico-node-blbsh\" (UID: \"43c21e19-1f4f-4840-979c-661550618950\") " pod="calico-system/calico-node-blbsh" Dec 13 15:51:36.515862 kubelet[2644]: I1213 15:51:36.515706 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/43c21e19-1f4f-4840-979c-661550618950-var-lib-calico\") pod \"calico-node-blbsh\" (UID: \"43c21e19-1f4f-4840-979c-661550618950\") " pod="calico-system/calico-node-blbsh" Dec 13 15:51:36.515862 kubelet[2644]: I1213 15:51:36.515714 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/43c21e19-1f4f-4840-979c-661550618950-cni-bin-dir\") pod \"calico-node-blbsh\" (UID: \"43c21e19-1f4f-4840-979c-661550618950\") " pod="calico-system/calico-node-blbsh" Dec 13 15:51:36.471000 audit[3125]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffdd4477b60 a2=0 a3=7ffdd4477b4c items=0 ppid=2919 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:36.616703 kubelet[2644]: I1213 15:51:36.616648 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/11d81f55-fe60-46f8-9d77-159b021295c1-registration-dir\") pod \"csi-node-driver-jxftf\" (UID: \"11d81f55-fe60-46f8-9d77-159b021295c1\") " pod="calico-system/csi-node-driver-jxftf" Dec 13 15:51:36.616703 kubelet[2644]: I1213 15:51:36.616686 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/11d81f55-fe60-46f8-9d77-159b021295c1-kubelet-dir\") pod \"csi-node-driver-jxftf\" (UID: \"11d81f55-fe60-46f8-9d77-159b021295c1\") " pod="calico-system/csi-node-driver-jxftf" Dec 13 15:51:36.616795 kubelet[2644]: I1213 15:51:36.616716 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r59b6\" (UniqueName: \"kubernetes.io/projected/11d81f55-fe60-46f8-9d77-159b021295c1-kube-api-access-r59b6\") pod \"csi-node-driver-jxftf\" (UID: \"11d81f55-fe60-46f8-9d77-159b021295c1\") " pod="calico-system/csi-node-driver-jxftf" Dec 13 15:51:36.616795 kubelet[2644]: I1213 15:51:36.616783 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/11d81f55-fe60-46f8-9d77-159b021295c1-varrun\") pod \"csi-node-driver-jxftf\" (UID: \"11d81f55-fe60-46f8-9d77-159b021295c1\") " pod="calico-system/csi-node-driver-jxftf" Dec 13 15:51:36.616923 kubelet[2644]: I1213 15:51:36.616909 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/11d81f55-fe60-46f8-9d77-159b021295c1-socket-dir\") pod \"csi-node-driver-jxftf\" (UID: \"11d81f55-fe60-46f8-9d77-159b021295c1\") " pod="calico-system/csi-node-driver-jxftf" Dec 13 15:51:36.617667 kubelet[2644]: E1213 15:51:36.617655 2644 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:51:36.617667 kubelet[2644]: W1213 15:51:36.617664 2644 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:51:36.617744 kubelet[2644]: E1213 15:51:36.617672 2644 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:51:36.618724 kubelet[2644]: E1213 15:51:36.618715 2644 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:51:36.618724 kubelet[2644]: W1213 15:51:36.618722 2644 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:51:36.618787 kubelet[2644]: E1213 15:51:36.618728 2644 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:51:36.621979 kubelet[2644]: E1213 15:51:36.621970 2644 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:51:36.621979 kubelet[2644]: W1213 15:51:36.621977 2644 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:51:36.622039 kubelet[2644]: E1213 15:51:36.621983 2644 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:51:36.630953 kernel: audit: type=1325 audit(1734105096.471:925): table=filter:91 family=2 entries=17 op=nft_register_rule pid=3125 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:51:36.630990 kernel: audit: type=1300 audit(1734105096.471:925): arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffdd4477b60 a2=0 a3=7ffdd4477b4c items=0 ppid=2919 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:36.631010 kernel: audit: type=1327 audit(1734105096.471:925): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:51:36.471000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:51:36.633512 env[1570]: time="2024-12-13T15:51:36.633459143Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-blbsh,Uid:43c21e19-1f4f-4840-979c-661550618950,Namespace:calico-system,Attempt:0,}" Dec 13 15:51:36.639405 env[1570]: time="2024-12-13T15:51:36.639372889Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:51:36.639405 env[1570]: time="2024-12-13T15:51:36.639393101Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:51:36.639405 env[1570]: time="2024-12-13T15:51:36.639399859Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:51:36.639517 env[1570]: time="2024-12-13T15:51:36.639459826Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1506c4aaeec43f85aca5d96fd056fd971887b7170bd4c0eedad8a4216f955a60 pid=3138 runtime=io.containerd.runc.v2 Dec 13 15:51:36.644650 systemd[1]: Started cri-containerd-1506c4aaeec43f85aca5d96fd056fd971887b7170bd4c0eedad8a4216f955a60.scope. Dec 13 15:51:36.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.717777 kubelet[2644]: E1213 15:51:36.717761 2644 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:51:36.717777 kubelet[2644]: W1213 15:51:36.717775 2644 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:51:36.717887 kubelet[2644]: E1213 15:51:36.717790 2644 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:51:36.717951 kubelet[2644]: E1213 15:51:36.717943 2644 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:51:36.717951 kubelet[2644]: W1213 15:51:36.717950 2644 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:51:36.718015 kubelet[2644]: E1213 15:51:36.717959 2644 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:51:36.718110 kubelet[2644]: E1213 15:51:36.718101 2644 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:51:36.718110 kubelet[2644]: W1213 15:51:36.718108 2644 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:51:36.718171 kubelet[2644]: E1213 15:51:36.718118 2644 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:51:36.718245 kubelet[2644]: E1213 15:51:36.718239 2644 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:51:36.718245 kubelet[2644]: W1213 15:51:36.718245 2644 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:51:36.718288 kubelet[2644]: E1213 15:51:36.718253 2644 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:51:36.718341 kubelet[2644]: E1213 15:51:36.718334 2644 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:51:36.718341 kubelet[2644]: W1213 15:51:36.718340 2644 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:51:36.718389 kubelet[2644]: E1213 15:51:36.718346 2644 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:51:36.718453 kubelet[2644]: E1213 15:51:36.718447 2644 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:51:36.718474 kubelet[2644]: W1213 15:51:36.718453 2644 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:51:36.718474 kubelet[2644]: E1213 15:51:36.718461 2644 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:51:36.718546 kubelet[2644]: E1213 15:51:36.718541 2644 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:51:36.718546 kubelet[2644]: W1213 15:51:36.718545 2644 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:51:36.718585 kubelet[2644]: E1213 15:51:36.718551 2644 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:51:36.718655 kubelet[2644]: E1213 15:51:36.718650 2644 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:51:36.718655 kubelet[2644]: W1213 15:51:36.718654 2644 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:51:36.718693 kubelet[2644]: E1213 15:51:36.718660 2644 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:51:36.718761 kubelet[2644]: E1213 15:51:36.718756 2644 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:51:36.718761 kubelet[2644]: W1213 15:51:36.718760 2644 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:51:36.718798 kubelet[2644]: E1213 15:51:36.718766 2644 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:51:36.718857 kubelet[2644]: E1213 15:51:36.718851 2644 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:51:36.718877 kubelet[2644]: W1213 15:51:36.718857 2644 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:51:36.718877 kubelet[2644]: E1213 15:51:36.718866 2644 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:51:36.718958 kubelet[2644]: E1213 15:51:36.718952 2644 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:51:36.718977 kubelet[2644]: W1213 15:51:36.718959 2644 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:51:36.718977 kubelet[2644]: E1213 15:51:36.718966 2644 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:51:36.719038 kubelet[2644]: E1213 15:51:36.719033 2644 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:51:36.719038 kubelet[2644]: W1213 15:51:36.719037 2644 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:51:36.719093 kubelet[2644]: E1213 15:51:36.719043 2644 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:51:36.719138 kubelet[2644]: E1213 15:51:36.719133 2644 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:51:36.719138 kubelet[2644]: W1213 15:51:36.719138 2644 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:51:36.719178 kubelet[2644]: E1213 15:51:36.719149 2644 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:51:36.719237 kubelet[2644]: E1213 15:51:36.719232 2644 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:51:36.719237 kubelet[2644]: W1213 15:51:36.719236 2644 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:51:36.719279 kubelet[2644]: E1213 15:51:36.719246 2644 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:51:36.719303 kubelet[2644]: E1213 15:51:36.719298 2644 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:51:36.719303 kubelet[2644]: W1213 15:51:36.719302 2644 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:51:36.719342 kubelet[2644]: E1213 15:51:36.719312 2644 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:51:36.719367 kubelet[2644]: E1213 15:51:36.719362 2644 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:51:36.719367 kubelet[2644]: W1213 15:51:36.719366 2644 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:51:36.719404 kubelet[2644]: E1213 15:51:36.719371 2644 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:51:36.719440 kubelet[2644]: E1213 15:51:36.719436 2644 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:51:36.719461 kubelet[2644]: W1213 15:51:36.719440 2644 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:51:36.719461 kubelet[2644]: E1213 15:51:36.719446 2644 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:51:36.719514 kubelet[2644]: E1213 15:51:36.719509 2644 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:51:36.719535 kubelet[2644]: W1213 15:51:36.719514 2644 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:51:36.719535 kubelet[2644]: E1213 15:51:36.719521 2644 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:51:36.719611 kubelet[2644]: E1213 15:51:36.719607 2644 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:51:36.719630 kubelet[2644]: W1213 15:51:36.719611 2644 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:51:36.719630 kubelet[2644]: E1213 15:51:36.719617 2644 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:51:36.719762 kubelet[2644]: E1213 15:51:36.719756 2644 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:51:36.719762 kubelet[2644]: W1213 15:51:36.719761 2644 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:51:36.719810 kubelet[2644]: E1213 15:51:36.719768 2644 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:51:36.719838 kubelet[2644]: E1213 15:51:36.719833 2644 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:51:36.719838 kubelet[2644]: W1213 15:51:36.719837 2644 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:51:36.719882 kubelet[2644]: E1213 15:51:36.719843 2644 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:51:36.719928 kubelet[2644]: E1213 15:51:36.719922 2644 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:51:36.719950 kubelet[2644]: W1213 15:51:36.719929 2644 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:51:36.719950 kubelet[2644]: E1213 15:51:36.719939 2644 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:51:36.720034 kubelet[2644]: E1213 15:51:36.720028 2644 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:51:36.720053 kubelet[2644]: W1213 15:51:36.720035 2644 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:51:36.720053 kubelet[2644]: E1213 15:51:36.720044 2644 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:51:36.720151 kubelet[2644]: E1213 15:51:36.720146 2644 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:51:36.720173 kubelet[2644]: W1213 15:51:36.720151 2644 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:51:36.720173 kubelet[2644]: E1213 15:51:36.720157 2644 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:51:36.720245 kubelet[2644]: E1213 15:51:36.720240 2644 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:51:36.720265 kubelet[2644]: W1213 15:51:36.720245 2644 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:51:36.720265 kubelet[2644]: E1213 15:51:36.720249 2644 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:51:36.725699 kubelet[2644]: E1213 15:51:36.725640 2644 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 15:51:36.725699 kubelet[2644]: W1213 15:51:36.725649 2644 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 15:51:36.725699 kubelet[2644]: E1213 15:51:36.725657 2644 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 15:51:36.735948 env[1570]: time="2024-12-13T15:51:36.735920511Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-769797d5d5-rvcng,Uid:eec2db24-2994-40e9-b7b3-d6ed305f780e,Namespace:calico-system,Attempt:0,}" Dec 13 15:51:36.745494 env[1570]: time="2024-12-13T15:51:36.745460184Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:51:36.745494 env[1570]: time="2024-12-13T15:51:36.745481226Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:51:36.745494 env[1570]: time="2024-12-13T15:51:36.745493940Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:51:36.745615 env[1570]: time="2024-12-13T15:51:36.745597298Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d632593bbd29bcbb5cd9a5ede01fb7dd036d8984294b7989668be6b3a27cc0a8 pid=3196 runtime=io.containerd.runc.v2 Dec 13 15:51:36.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.696000 audit[3125]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3125 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:51:36.696000 audit[3125]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdd4477b60 a2=0 a3=0 items=0 ppid=2919 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:36.696000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:51:36.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.759000 audit: BPF prog-id=121 op=LOAD Dec 13 15:51:36.759000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.759000 audit[3147]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3138 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:36.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135303663346161656563343366383561636135643936666430353666 Dec 13 15:51:36.759000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.759000 audit[3147]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3138 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:36.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135303663346161656563343366383561636135643936666430353666 Dec 13 15:51:36.759000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.759000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.759000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.761496 kernel: audit: type=1400 audit(1734105096.696:926): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.759000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.759000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.759000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.759000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.759000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.759000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.759000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.759000 audit: BPF prog-id=122 op=LOAD Dec 13 15:51:36.759000 audit[3147]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000b69e0 items=0 ppid=3138 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:36.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135303663346161656563343366383561636135643936666430353666 Dec 13 15:51:36.759000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.759000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.759000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.759000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.759000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.759000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.759000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.759000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.759000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.759000 audit: BPF prog-id=123 op=LOAD Dec 13 15:51:36.759000 audit[3147]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000b6a28 items=0 ppid=3138 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:36.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135303663346161656563343366383561636135643936666430353666 Dec 13 15:51:36.759000 audit: BPF prog-id=123 op=UNLOAD Dec 13 15:51:36.759000 audit: BPF prog-id=122 op=UNLOAD Dec 13 15:51:36.759000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.759000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.759000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.759000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.759000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.759000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.759000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.759000 audit[3147]: AVC avc: denied { perfmon } for pid=3147 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.759000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.759000 audit[3147]: AVC avc: denied { bpf } for pid=3147 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.759000 audit: BPF prog-id=124 op=LOAD Dec 13 15:51:36.759000 audit[3147]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000b6e38 items=0 ppid=3138 pid=3147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:36.759000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135303663346161656563343366383561636135643936666430353666 Dec 13 15:51:36.762247 systemd[1]: Started cri-containerd-d632593bbd29bcbb5cd9a5ede01fb7dd036d8984294b7989668be6b3a27cc0a8.scope. Dec 13 15:51:36.766331 env[1570]: time="2024-12-13T15:51:36.766302605Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-blbsh,Uid:43c21e19-1f4f-4840-979c-661550618950,Namespace:calico-system,Attempt:0,} returns sandbox id \"1506c4aaeec43f85aca5d96fd056fd971887b7170bd4c0eedad8a4216f955a60\"" Dec 13 15:51:36.767067 env[1570]: time="2024-12-13T15:51:36.767054293Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 15:51:36.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit: BPF prog-id=125 op=LOAD Dec 13 15:51:36.767000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[3207]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3196 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:36.767000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436333235393362626432396263626235636439613565646530316662 Dec 13 15:51:36.767000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[3207]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3196 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:36.767000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436333235393362626432396263626235636439613565646530316662 Dec 13 15:51:36.767000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit: BPF prog-id=126 op=LOAD Dec 13 15:51:36.767000 audit[3207]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003e01c0 items=0 ppid=3196 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:36.767000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436333235393362626432396263626235636439613565646530316662 Dec 13 15:51:36.767000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit: BPF prog-id=127 op=LOAD Dec 13 15:51:36.767000 audit[3207]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003e0208 items=0 ppid=3196 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:36.767000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436333235393362626432396263626235636439613565646530316662 Dec 13 15:51:36.767000 audit: BPF prog-id=127 op=UNLOAD Dec 13 15:51:36.767000 audit: BPF prog-id=126 op=UNLOAD Dec 13 15:51:36.767000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[3207]: AVC avc: denied { perfmon } for pid=3207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit[3207]: AVC avc: denied { bpf } for pid=3207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:36.767000 audit: BPF prog-id=128 op=LOAD Dec 13 15:51:36.767000 audit[3207]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003e0618 items=0 ppid=3196 pid=3207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:36.767000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436333235393362626432396263626235636439613565646530316662 Dec 13 15:51:36.785512 env[1570]: time="2024-12-13T15:51:36.785475963Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-769797d5d5-rvcng,Uid:eec2db24-2994-40e9-b7b3-d6ed305f780e,Namespace:calico-system,Attempt:0,} returns sandbox id \"d632593bbd29bcbb5cd9a5ede01fb7dd036d8984294b7989668be6b3a27cc0a8\"" Dec 13 15:51:38.203687 kubelet[2644]: E1213 15:51:38.203596 2644 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jxftf" podUID="11d81f55-fe60-46f8-9d77-159b021295c1" Dec 13 15:51:38.379394 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2919641791.mount: Deactivated successfully. Dec 13 15:51:38.460872 env[1570]: time="2024-12-13T15:51:38.460789966Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:38.461345 env[1570]: time="2024-12-13T15:51:38.461304880Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:38.462585 env[1570]: time="2024-12-13T15:51:38.462543418Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:38.463430 env[1570]: time="2024-12-13T15:51:38.463390165Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:38.463584 env[1570]: time="2024-12-13T15:51:38.463541313Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 15:51:38.464052 env[1570]: time="2024-12-13T15:51:38.464037196Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 15:51:38.464647 env[1570]: time="2024-12-13T15:51:38.464632944Z" level=info msg="CreateContainer within sandbox \"1506c4aaeec43f85aca5d96fd056fd971887b7170bd4c0eedad8a4216f955a60\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 15:51:38.469418 env[1570]: time="2024-12-13T15:51:38.469398756Z" level=info msg="CreateContainer within sandbox \"1506c4aaeec43f85aca5d96fd056fd971887b7170bd4c0eedad8a4216f955a60\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"d0c0fa2e879fa7d4c76a3685d97f9e1bdafc3dafc9d770f53c2e4c60fab85d10\"" Dec 13 15:51:38.469583 env[1570]: time="2024-12-13T15:51:38.469542497Z" level=info msg="StartContainer for \"d0c0fa2e879fa7d4c76a3685d97f9e1bdafc3dafc9d770f53c2e4c60fab85d10\"" Dec 13 15:51:38.480452 systemd[1]: Started cri-containerd-d0c0fa2e879fa7d4c76a3685d97f9e1bdafc3dafc9d770f53c2e4c60fab85d10.scope. Dec 13 15:51:38.486000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:38.486000 audit[3243]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f09e42019f8 items=0 ppid=3138 pid=3243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:38.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430633066613265383739666137643463373661333638356439376639 Dec 13 15:51:38.486000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:38.486000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:38.486000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:38.486000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:38.486000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:38.486000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:38.486000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:38.486000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:38.486000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:38.486000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:38.486000 audit: BPF prog-id=129 op=LOAD Dec 13 15:51:38.486000 audit[3243]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002c0828 items=0 ppid=3138 pid=3243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:38.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430633066613265383739666137643463373661333638356439376639 Dec 13 15:51:38.486000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:38.486000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:38.486000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:38.486000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:38.486000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:38.486000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:38.486000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:38.486000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:38.486000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:38.486000 audit: BPF prog-id=130 op=LOAD Dec 13 15:51:38.486000 audit[3243]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002c0878 items=0 ppid=3138 pid=3243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:38.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430633066613265383739666137643463373661333638356439376639 Dec 13 15:51:38.486000 audit: BPF prog-id=130 op=UNLOAD Dec 13 15:51:38.486000 audit: BPF prog-id=129 op=UNLOAD Dec 13 15:51:38.486000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:38.486000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:38.486000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:38.486000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:38.486000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:38.486000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:38.486000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:38.486000 audit[3243]: AVC avc: denied { perfmon } for pid=3243 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:38.486000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:38.486000 audit[3243]: AVC avc: denied { bpf } for pid=3243 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:38.486000 audit: BPF prog-id=131 op=LOAD Dec 13 15:51:38.486000 audit[3243]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002c0908 items=0 ppid=3138 pid=3243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:38.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430633066613265383739666137643463373661333638356439376639 Dec 13 15:51:38.492486 env[1570]: time="2024-12-13T15:51:38.492427450Z" level=info msg="StartContainer for \"d0c0fa2e879fa7d4c76a3685d97f9e1bdafc3dafc9d770f53c2e4c60fab85d10\" returns successfully" Dec 13 15:51:38.497830 systemd[1]: cri-containerd-d0c0fa2e879fa7d4c76a3685d97f9e1bdafc3dafc9d770f53c2e4c60fab85d10.scope: Deactivated successfully. Dec 13 15:51:38.509000 audit: BPF prog-id=131 op=UNLOAD Dec 13 15:51:38.744147 env[1570]: time="2024-12-13T15:51:38.743880147Z" level=info msg="shim disconnected" id=d0c0fa2e879fa7d4c76a3685d97f9e1bdafc3dafc9d770f53c2e4c60fab85d10 Dec 13 15:51:38.744147 env[1570]: time="2024-12-13T15:51:38.743997823Z" level=warning msg="cleaning up after shim disconnected" id=d0c0fa2e879fa7d4c76a3685d97f9e1bdafc3dafc9d770f53c2e4c60fab85d10 namespace=k8s.io Dec 13 15:51:38.744147 env[1570]: time="2024-12-13T15:51:38.744048795Z" level=info msg="cleaning up dead shim" Dec 13 15:51:38.760652 env[1570]: time="2024-12-13T15:51:38.760571074Z" level=warning msg="cleanup warnings time=\"2024-12-13T15:51:38Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3282 runtime=io.containerd.runc.v2\n" Dec 13 15:51:39.473595 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d0c0fa2e879fa7d4c76a3685d97f9e1bdafc3dafc9d770f53c2e4c60fab85d10-rootfs.mount: Deactivated successfully. Dec 13 15:51:40.204254 kubelet[2644]: E1213 15:51:40.204128 2644 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jxftf" podUID="11d81f55-fe60-46f8-9d77-159b021295c1" Dec 13 15:51:40.803388 env[1570]: time="2024-12-13T15:51:40.803337199Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:40.803946 env[1570]: time="2024-12-13T15:51:40.803905172Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:40.804538 env[1570]: time="2024-12-13T15:51:40.804492156Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:40.805189 env[1570]: time="2024-12-13T15:51:40.805143953Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:40.805496 env[1570]: time="2024-12-13T15:51:40.805457261Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 15:51:40.806050 env[1570]: time="2024-12-13T15:51:40.806007417Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 15:51:40.809358 env[1570]: time="2024-12-13T15:51:40.809340585Z" level=info msg="CreateContainer within sandbox \"d632593bbd29bcbb5cd9a5ede01fb7dd036d8984294b7989668be6b3a27cc0a8\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 15:51:40.813358 env[1570]: time="2024-12-13T15:51:40.813315593Z" level=info msg="CreateContainer within sandbox \"d632593bbd29bcbb5cd9a5ede01fb7dd036d8984294b7989668be6b3a27cc0a8\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"7264e18c65b113f94f1e301eed70d148ad265628f57886fe18c4d67c460f26c9\"" Dec 13 15:51:40.813509 env[1570]: time="2024-12-13T15:51:40.813496759Z" level=info msg="StartContainer for \"7264e18c65b113f94f1e301eed70d148ad265628f57886fe18c4d67c460f26c9\"" Dec 13 15:51:40.822456 systemd[1]: Started cri-containerd-7264e18c65b113f94f1e301eed70d148ad265628f57886fe18c4d67c460f26c9.scope. Dec 13 15:51:40.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit: BPF prog-id=132 op=LOAD Dec 13 15:51:40.827000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[3308]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3196 pid=3308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:40.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732363465313863363562313133663934663165333031656564373064 Dec 13 15:51:40.827000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[3308]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3196 pid=3308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:40.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732363465313863363562313133663934663165333031656564373064 Dec 13 15:51:40.827000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit: BPF prog-id=133 op=LOAD Dec 13 15:51:40.827000 audit[3308]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00009a7f0 items=0 ppid=3196 pid=3308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:40.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732363465313863363562313133663934663165333031656564373064 Dec 13 15:51:40.827000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit: BPF prog-id=134 op=LOAD Dec 13 15:51:40.827000 audit[3308]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00009a838 items=0 ppid=3196 pid=3308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:40.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732363465313863363562313133663934663165333031656564373064 Dec 13 15:51:40.827000 audit: BPF prog-id=134 op=UNLOAD Dec 13 15:51:40.827000 audit: BPF prog-id=133 op=UNLOAD Dec 13 15:51:40.827000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[3308]: AVC avc: denied { perfmon } for pid=3308 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit[3308]: AVC avc: denied { bpf } for pid=3308 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:40.827000 audit: BPF prog-id=135 op=LOAD Dec 13 15:51:40.827000 audit[3308]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00009ac48 items=0 ppid=3196 pid=3308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:40.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732363465313863363562313133663934663165333031656564373064 Dec 13 15:51:40.844225 env[1570]: time="2024-12-13T15:51:40.844197911Z" level=info msg="StartContainer for \"7264e18c65b113f94f1e301eed70d148ad265628f57886fe18c4d67c460f26c9\" returns successfully" Dec 13 15:51:41.295896 kubelet[2644]: I1213 15:51:41.295841 2644 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-769797d5d5-rvcng" podStartSLOduration=1.27585435 podStartE2EDuration="5.295829178s" podCreationTimestamp="2024-12-13 15:51:36 +0000 UTC" firstStartedPulling="2024-12-13 15:51:36.785980458 +0000 UTC m=+20.676771489" lastFinishedPulling="2024-12-13 15:51:40.805955286 +0000 UTC m=+24.696746317" observedRunningTime="2024-12-13 15:51:41.295682393 +0000 UTC m=+25.186473424" watchObservedRunningTime="2024-12-13 15:51:41.295829178 +0000 UTC m=+25.186620204" Dec 13 15:51:42.204201 kubelet[2644]: E1213 15:51:42.204094 2644 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jxftf" podUID="11d81f55-fe60-46f8-9d77-159b021295c1" Dec 13 15:51:42.283380 kubelet[2644]: I1213 15:51:42.283269 2644 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 15:51:44.203789 kubelet[2644]: E1213 15:51:44.203736 2644 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jxftf" podUID="11d81f55-fe60-46f8-9d77-159b021295c1" Dec 13 15:51:45.150988 env[1570]: time="2024-12-13T15:51:45.150934929Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:45.151550 env[1570]: time="2024-12-13T15:51:45.151521660Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:45.152161 env[1570]: time="2024-12-13T15:51:45.152119809Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:45.152808 env[1570]: time="2024-12-13T15:51:45.152768878Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:45.153117 env[1570]: time="2024-12-13T15:51:45.153077081Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 15:51:45.154763 env[1570]: time="2024-12-13T15:51:45.154725391Z" level=info msg="CreateContainer within sandbox \"1506c4aaeec43f85aca5d96fd056fd971887b7170bd4c0eedad8a4216f955a60\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 15:51:45.159769 env[1570]: time="2024-12-13T15:51:45.159726268Z" level=info msg="CreateContainer within sandbox \"1506c4aaeec43f85aca5d96fd056fd971887b7170bd4c0eedad8a4216f955a60\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"d35e739b933001cd29052108c028179d36356b4c462b53045e28a19bd8f93c1d\"" Dec 13 15:51:45.160037 env[1570]: time="2024-12-13T15:51:45.159996149Z" level=info msg="StartContainer for \"d35e739b933001cd29052108c028179d36356b4c462b53045e28a19bd8f93c1d\"" Dec 13 15:51:45.170926 systemd[1]: Started cri-containerd-d35e739b933001cd29052108c028179d36356b4c462b53045e28a19bd8f93c1d.scope. Dec 13 15:51:45.177000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.205661 kernel: kauditd_printk_skb: 217 callbacks suppressed Dec 13 15:51:45.205700 kernel: audit: type=1400 audit(1734105105.177:988): avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.177000 audit[3359]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f13602c86f8 items=0 ppid=3138 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:45.366688 kernel: audit: type=1300 audit(1734105105.177:988): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f13602c86f8 items=0 ppid=3138 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:45.366719 kernel: audit: type=1327 audit(1734105105.177:988): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433356537333962393333303031636432393035323130386330323831 Dec 13 15:51:45.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433356537333962393333303031636432393035323130386330323831 Dec 13 15:51:45.459935 kernel: audit: type=1400 audit(1734105105.177:989): avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.177000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.177000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.586991 kernel: audit: type=1400 audit(1734105105.177:989): avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.587039 kernel: audit: type=1400 audit(1734105105.177:989): avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.177000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.177000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.714354 kernel: audit: type=1400 audit(1734105105.177:989): avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.714409 kernel: audit: type=1400 audit(1734105105.177:989): avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.177000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.728882 env[1570]: time="2024-12-13T15:51:45.728855552Z" level=info msg="StartContainer for \"d35e739b933001cd29052108c028179d36356b4c462b53045e28a19bd8f93c1d\" returns successfully" Dec 13 15:51:45.177000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.842282 kernel: audit: type=1400 audit(1734105105.177:989): avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.842314 kernel: audit: type=1400 audit(1734105105.177:989): avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.177000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.177000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.177000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.177000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.177000 audit: BPF prog-id=136 op=LOAD Dec 13 15:51:45.177000 audit[3359]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003c8128 items=0 ppid=3138 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:45.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433356537333962393333303031636432393035323130386330323831 Dec 13 15:51:45.366000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.366000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.366000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.366000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.366000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.366000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.366000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.366000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.366000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.366000 audit: BPF prog-id=137 op=LOAD Dec 13 15:51:45.366000 audit[3359]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003c8178 items=0 ppid=3138 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:45.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433356537333962393333303031636432393035323130386330323831 Dec 13 15:51:45.522000 audit: BPF prog-id=137 op=UNLOAD Dec 13 15:51:45.522000 audit: BPF prog-id=136 op=UNLOAD Dec 13 15:51:45.522000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.522000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.522000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.522000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.522000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.522000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.522000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.522000 audit[3359]: AVC avc: denied { perfmon } for pid=3359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.522000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.522000 audit[3359]: AVC avc: denied { bpf } for pid=3359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:45.522000 audit: BPF prog-id=138 op=LOAD Dec 13 15:51:45.522000 audit[3359]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003c8208 items=0 ppid=3138 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:45.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433356537333962393333303031636432393035323130386330323831 Dec 13 15:51:46.204615 kubelet[2644]: E1213 15:51:46.204516 2644 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-jxftf" podUID="11d81f55-fe60-46f8-9d77-159b021295c1" Dec 13 15:51:46.414439 env[1570]: time="2024-12-13T15:51:46.414274193Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 15:51:46.418561 systemd[1]: cri-containerd-d35e739b933001cd29052108c028179d36356b4c462b53045e28a19bd8f93c1d.scope: Deactivated successfully. Dec 13 15:51:46.432000 audit: BPF prog-id=138 op=UNLOAD Dec 13 15:51:46.465133 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d35e739b933001cd29052108c028179d36356b4c462b53045e28a19bd8f93c1d-rootfs.mount: Deactivated successfully. Dec 13 15:51:46.511780 kubelet[2644]: I1213 15:51:46.511727 2644 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 15:51:46.547346 kubelet[2644]: I1213 15:51:46.547233 2644 topology_manager.go:215] "Topology Admit Handler" podUID="80f5e21a-43ec-4c77-ad94-1aa18626856c" podNamespace="kube-system" podName="coredns-7db6d8ff4d-7c7rz" Dec 13 15:51:46.552344 kubelet[2644]: I1213 15:51:46.549719 2644 topology_manager.go:215] "Topology Admit Handler" podUID="bdd6c047-a986-425d-afa8-7e18fd8918ce" podNamespace="kube-system" podName="coredns-7db6d8ff4d-9rnvx" Dec 13 15:51:46.553212 kubelet[2644]: I1213 15:51:46.553124 2644 topology_manager.go:215] "Topology Admit Handler" podUID="6317dcc4-4669-49e0-96da-846071dd95cb" podNamespace="calico-apiserver" podName="calico-apiserver-5fc856f8c8-xbz48" Dec 13 15:51:46.554233 kubelet[2644]: I1213 15:51:46.554160 2644 topology_manager.go:215] "Topology Admit Handler" podUID="b97ba304-f837-40f1-b3de-a9b43217ec78" podNamespace="calico-system" podName="calico-kube-controllers-656bc8f995-2lkj6" Dec 13 15:51:46.555155 kubelet[2644]: I1213 15:51:46.555080 2644 topology_manager.go:215] "Topology Admit Handler" podUID="f8f4d6d7-9983-47ab-aeca-6edc82b7ad2b" podNamespace="calico-apiserver" podName="calico-apiserver-5fc856f8c8-lxqwx" Dec 13 15:51:46.565376 systemd[1]: Created slice kubepods-burstable-pod80f5e21a_43ec_4c77_ad94_1aa18626856c.slice. Dec 13 15:51:46.572595 systemd[1]: Created slice kubepods-burstable-podbdd6c047_a986_425d_afa8_7e18fd8918ce.slice. Dec 13 15:51:46.578376 systemd[1]: Created slice kubepods-besteffort-pod6317dcc4_4669_49e0_96da_846071dd95cb.slice. Dec 13 15:51:46.582228 systemd[1]: Created slice kubepods-besteffort-podb97ba304_f837_40f1_b3de_a9b43217ec78.slice. Dec 13 15:51:46.585909 systemd[1]: Created slice kubepods-besteffort-podf8f4d6d7_9983_47ab_aeca_6edc82b7ad2b.slice. Dec 13 15:51:46.587898 kubelet[2644]: I1213 15:51:46.587848 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2m54v\" (UniqueName: \"kubernetes.io/projected/bdd6c047-a986-425d-afa8-7e18fd8918ce-kube-api-access-2m54v\") pod \"coredns-7db6d8ff4d-9rnvx\" (UID: \"bdd6c047-a986-425d-afa8-7e18fd8918ce\") " pod="kube-system/coredns-7db6d8ff4d-9rnvx" Dec 13 15:51:46.587898 kubelet[2644]: I1213 15:51:46.587877 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b97ba304-f837-40f1-b3de-a9b43217ec78-tigera-ca-bundle\") pod \"calico-kube-controllers-656bc8f995-2lkj6\" (UID: \"b97ba304-f837-40f1-b3de-a9b43217ec78\") " pod="calico-system/calico-kube-controllers-656bc8f995-2lkj6" Dec 13 15:51:46.587898 kubelet[2644]: I1213 15:51:46.587894 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/f8f4d6d7-9983-47ab-aeca-6edc82b7ad2b-calico-apiserver-certs\") pod \"calico-apiserver-5fc856f8c8-lxqwx\" (UID: \"f8f4d6d7-9983-47ab-aeca-6edc82b7ad2b\") " pod="calico-apiserver/calico-apiserver-5fc856f8c8-lxqwx" Dec 13 15:51:46.588045 kubelet[2644]: I1213 15:51:46.587911 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/6317dcc4-4669-49e0-96da-846071dd95cb-calico-apiserver-certs\") pod \"calico-apiserver-5fc856f8c8-xbz48\" (UID: \"6317dcc4-4669-49e0-96da-846071dd95cb\") " pod="calico-apiserver/calico-apiserver-5fc856f8c8-xbz48" Dec 13 15:51:46.588045 kubelet[2644]: I1213 15:51:46.587926 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2tkrw\" (UniqueName: \"kubernetes.io/projected/6317dcc4-4669-49e0-96da-846071dd95cb-kube-api-access-2tkrw\") pod \"calico-apiserver-5fc856f8c8-xbz48\" (UID: \"6317dcc4-4669-49e0-96da-846071dd95cb\") " pod="calico-apiserver/calico-apiserver-5fc856f8c8-xbz48" Dec 13 15:51:46.588045 kubelet[2644]: I1213 15:51:46.587941 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/80f5e21a-43ec-4c77-ad94-1aa18626856c-config-volume\") pod \"coredns-7db6d8ff4d-7c7rz\" (UID: \"80f5e21a-43ec-4c77-ad94-1aa18626856c\") " pod="kube-system/coredns-7db6d8ff4d-7c7rz" Dec 13 15:51:46.588045 kubelet[2644]: I1213 15:51:46.587956 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9gwdh\" (UniqueName: \"kubernetes.io/projected/b97ba304-f837-40f1-b3de-a9b43217ec78-kube-api-access-9gwdh\") pod \"calico-kube-controllers-656bc8f995-2lkj6\" (UID: \"b97ba304-f837-40f1-b3de-a9b43217ec78\") " pod="calico-system/calico-kube-controllers-656bc8f995-2lkj6" Dec 13 15:51:46.588045 kubelet[2644]: I1213 15:51:46.587972 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mh88c\" (UniqueName: \"kubernetes.io/projected/80f5e21a-43ec-4c77-ad94-1aa18626856c-kube-api-access-mh88c\") pod \"coredns-7db6d8ff4d-7c7rz\" (UID: \"80f5e21a-43ec-4c77-ad94-1aa18626856c\") " pod="kube-system/coredns-7db6d8ff4d-7c7rz" Dec 13 15:51:46.588195 kubelet[2644]: I1213 15:51:46.587986 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/bdd6c047-a986-425d-afa8-7e18fd8918ce-config-volume\") pod \"coredns-7db6d8ff4d-9rnvx\" (UID: \"bdd6c047-a986-425d-afa8-7e18fd8918ce\") " pod="kube-system/coredns-7db6d8ff4d-9rnvx" Dec 13 15:51:46.588195 kubelet[2644]: I1213 15:51:46.588027 2644 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hchq2\" (UniqueName: \"kubernetes.io/projected/f8f4d6d7-9983-47ab-aeca-6edc82b7ad2b-kube-api-access-hchq2\") pod \"calico-apiserver-5fc856f8c8-lxqwx\" (UID: \"f8f4d6d7-9983-47ab-aeca-6edc82b7ad2b\") " pod="calico-apiserver/calico-apiserver-5fc856f8c8-lxqwx" Dec 13 15:51:46.871627 env[1570]: time="2024-12-13T15:51:46.871388133Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-7c7rz,Uid:80f5e21a-43ec-4c77-ad94-1aa18626856c,Namespace:kube-system,Attempt:0,}" Dec 13 15:51:46.876718 env[1570]: time="2024-12-13T15:51:46.876610504Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-9rnvx,Uid:bdd6c047-a986-425d-afa8-7e18fd8918ce,Namespace:kube-system,Attempt:0,}" Dec 13 15:51:46.881944 env[1570]: time="2024-12-13T15:51:46.881837396Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5fc856f8c8-xbz48,Uid:6317dcc4-4669-49e0-96da-846071dd95cb,Namespace:calico-apiserver,Attempt:0,}" Dec 13 15:51:46.885067 env[1570]: time="2024-12-13T15:51:46.884968111Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-656bc8f995-2lkj6,Uid:b97ba304-f837-40f1-b3de-a9b43217ec78,Namespace:calico-system,Attempt:0,}" Dec 13 15:51:46.888179 env[1570]: time="2024-12-13T15:51:46.888072183Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5fc856f8c8-lxqwx,Uid:f8f4d6d7-9983-47ab-aeca-6edc82b7ad2b,Namespace:calico-apiserver,Attempt:0,}" Dec 13 15:51:47.116647 env[1570]: time="2024-12-13T15:51:47.116536895Z" level=info msg="shim disconnected" id=d35e739b933001cd29052108c028179d36356b4c462b53045e28a19bd8f93c1d Dec 13 15:51:47.116916 env[1570]: time="2024-12-13T15:51:47.116674561Z" level=warning msg="cleaning up after shim disconnected" id=d35e739b933001cd29052108c028179d36356b4c462b53045e28a19bd8f93c1d namespace=k8s.io Dec 13 15:51:47.116916 env[1570]: time="2024-12-13T15:51:47.116707984Z" level=info msg="cleaning up dead shim" Dec 13 15:51:47.132338 env[1570]: time="2024-12-13T15:51:47.132110506Z" level=warning msg="cleanup warnings time=\"2024-12-13T15:51:47Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3420 runtime=io.containerd.runc.v2\n" Dec 13 15:51:47.184094 env[1570]: time="2024-12-13T15:51:47.184049079Z" level=error msg="Failed to destroy network for sandbox \"4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:51:47.184094 env[1570]: time="2024-12-13T15:51:47.184074186Z" level=error msg="Failed to destroy network for sandbox \"e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:51:47.184094 env[1570]: time="2024-12-13T15:51:47.184059478Z" level=error msg="Failed to destroy network for sandbox \"c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:51:47.184245 env[1570]: time="2024-12-13T15:51:47.184211325Z" level=error msg="Failed to destroy network for sandbox \"6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:51:47.184309 env[1570]: time="2024-12-13T15:51:47.184291894Z" level=error msg="encountered an error cleaning up failed sandbox \"4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:51:47.184338 env[1570]: time="2024-12-13T15:51:47.184324568Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-7c7rz,Uid:80f5e21a-43ec-4c77-ad94-1aa18626856c,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:51:47.184338 env[1570]: time="2024-12-13T15:51:47.184321551Z" level=error msg="encountered an error cleaning up failed sandbox \"e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:51:47.184381 env[1570]: time="2024-12-13T15:51:47.184333599Z" level=error msg="encountered an error cleaning up failed sandbox \"c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:51:47.184381 env[1570]: time="2024-12-13T15:51:47.184356876Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-656bc8f995-2lkj6,Uid:b97ba304-f837-40f1-b3de-a9b43217ec78,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:51:47.184381 env[1570]: time="2024-12-13T15:51:47.184362929Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-9rnvx,Uid:bdd6c047-a986-425d-afa8-7e18fd8918ce,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:51:47.184467 env[1570]: time="2024-12-13T15:51:47.184376752Z" level=error msg="encountered an error cleaning up failed sandbox \"6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:51:47.184467 env[1570]: time="2024-12-13T15:51:47.184401637Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5fc856f8c8-xbz48,Uid:6317dcc4-4669-49e0-96da-846071dd95cb,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:51:47.184529 kubelet[2644]: E1213 15:51:47.184473 2644 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:51:47.184529 kubelet[2644]: E1213 15:51:47.184471 2644 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:51:47.184529 kubelet[2644]: E1213 15:51:47.184472 2644 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:51:47.184529 kubelet[2644]: E1213 15:51:47.184472 2644 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:51:47.184633 kubelet[2644]: E1213 15:51:47.184520 2644 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-656bc8f995-2lkj6" Dec 13 15:51:47.184633 kubelet[2644]: E1213 15:51:47.184523 2644 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5fc856f8c8-xbz48" Dec 13 15:51:47.184633 kubelet[2644]: E1213 15:51:47.184534 2644 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-656bc8f995-2lkj6" Dec 13 15:51:47.184633 kubelet[2644]: E1213 15:51:47.184541 2644 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5fc856f8c8-xbz48" Dec 13 15:51:47.184716 env[1570]: time="2024-12-13T15:51:47.184536326Z" level=error msg="Failed to destroy network for sandbox \"7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:51:47.184716 env[1570]: time="2024-12-13T15:51:47.184673243Z" level=error msg="encountered an error cleaning up failed sandbox \"7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:51:47.184716 env[1570]: time="2024-12-13T15:51:47.184694141Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5fc856f8c8-lxqwx,Uid:f8f4d6d7-9983-47ab-aeca-6edc82b7ad2b,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:51:47.184789 kubelet[2644]: E1213 15:51:47.184537 2644 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-7c7rz" Dec 13 15:51:47.184789 kubelet[2644]: E1213 15:51:47.184559 2644 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-7c7rz" Dec 13 15:51:47.184789 kubelet[2644]: E1213 15:51:47.184561 2644 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-656bc8f995-2lkj6_calico-system(b97ba304-f837-40f1-b3de-a9b43217ec78)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-656bc8f995-2lkj6_calico-system(b97ba304-f837-40f1-b3de-a9b43217ec78)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-656bc8f995-2lkj6" podUID="b97ba304-f837-40f1-b3de-a9b43217ec78" Dec 13 15:51:47.184865 kubelet[2644]: E1213 15:51:47.184567 2644 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5fc856f8c8-xbz48_calico-apiserver(6317dcc4-4669-49e0-96da-846071dd95cb)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5fc856f8c8-xbz48_calico-apiserver(6317dcc4-4669-49e0-96da-846071dd95cb)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5fc856f8c8-xbz48" podUID="6317dcc4-4669-49e0-96da-846071dd95cb" Dec 13 15:51:47.184865 kubelet[2644]: E1213 15:51:47.184525 2644 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-9rnvx" Dec 13 15:51:47.184865 kubelet[2644]: E1213 15:51:47.184584 2644 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-7c7rz_kube-system(80f5e21a-43ec-4c77-ad94-1aa18626856c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-7c7rz_kube-system(80f5e21a-43ec-4c77-ad94-1aa18626856c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-7c7rz" podUID="80f5e21a-43ec-4c77-ad94-1aa18626856c" Dec 13 15:51:47.184955 kubelet[2644]: E1213 15:51:47.184596 2644 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-9rnvx" Dec 13 15:51:47.184955 kubelet[2644]: E1213 15:51:47.184625 2644 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-9rnvx_kube-system(bdd6c047-a986-425d-afa8-7e18fd8918ce)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-9rnvx_kube-system(bdd6c047-a986-425d-afa8-7e18fd8918ce)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-9rnvx" podUID="bdd6c047-a986-425d-afa8-7e18fd8918ce" Dec 13 15:51:47.184955 kubelet[2644]: E1213 15:51:47.184775 2644 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:51:47.185032 kubelet[2644]: E1213 15:51:47.184798 2644 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5fc856f8c8-lxqwx" Dec 13 15:51:47.185032 kubelet[2644]: E1213 15:51:47.184812 2644 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5fc856f8c8-lxqwx" Dec 13 15:51:47.185032 kubelet[2644]: E1213 15:51:47.184835 2644 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5fc856f8c8-lxqwx_calico-apiserver(f8f4d6d7-9983-47ab-aeca-6edc82b7ad2b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5fc856f8c8-lxqwx_calico-apiserver(f8f4d6d7-9983-47ab-aeca-6edc82b7ad2b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5fc856f8c8-lxqwx" podUID="f8f4d6d7-9983-47ab-aeca-6edc82b7ad2b" Dec 13 15:51:47.297965 kubelet[2644]: I1213 15:51:47.297854 2644 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" Dec 13 15:51:47.299203 env[1570]: time="2024-12-13T15:51:47.299126892Z" level=info msg="StopPodSandbox for \"c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57\"" Dec 13 15:51:47.299994 kubelet[2644]: I1213 15:51:47.299944 2644 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" Dec 13 15:51:47.301172 env[1570]: time="2024-12-13T15:51:47.301090610Z" level=info msg="StopPodSandbox for \"7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99\"" Dec 13 15:51:47.308745 env[1570]: time="2024-12-13T15:51:47.308653790Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 15:51:47.309652 kubelet[2644]: I1213 15:51:47.309580 2644 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" Dec 13 15:51:47.311069 env[1570]: time="2024-12-13T15:51:47.310971875Z" level=info msg="StopPodSandbox for \"4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6\"" Dec 13 15:51:47.312281 kubelet[2644]: I1213 15:51:47.312223 2644 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" Dec 13 15:51:47.313664 env[1570]: time="2024-12-13T15:51:47.313547630Z" level=info msg="StopPodSandbox for \"6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f\"" Dec 13 15:51:47.314843 kubelet[2644]: I1213 15:51:47.314780 2644 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" Dec 13 15:51:47.316258 env[1570]: time="2024-12-13T15:51:47.316162881Z" level=info msg="StopPodSandbox for \"e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce\"" Dec 13 15:51:47.353550 env[1570]: time="2024-12-13T15:51:47.353439274Z" level=error msg="StopPodSandbox for \"7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99\" failed" error="failed to destroy network for sandbox \"7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:51:47.353767 kubelet[2644]: E1213 15:51:47.353700 2644 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" Dec 13 15:51:47.353846 kubelet[2644]: E1213 15:51:47.353766 2644 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99"} Dec 13 15:51:47.353898 kubelet[2644]: E1213 15:51:47.353851 2644 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f8f4d6d7-9983-47ab-aeca-6edc82b7ad2b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:51:47.353978 kubelet[2644]: E1213 15:51:47.353886 2644 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f8f4d6d7-9983-47ab-aeca-6edc82b7ad2b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5fc856f8c8-lxqwx" podUID="f8f4d6d7-9983-47ab-aeca-6edc82b7ad2b" Dec 13 15:51:47.354611 env[1570]: time="2024-12-13T15:51:47.354566595Z" level=error msg="StopPodSandbox for \"c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57\" failed" error="failed to destroy network for sandbox \"c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:51:47.354767 kubelet[2644]: E1213 15:51:47.354744 2644 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" Dec 13 15:51:47.354846 kubelet[2644]: E1213 15:51:47.354778 2644 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57"} Dec 13 15:51:47.354846 kubelet[2644]: E1213 15:51:47.354816 2644 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bdd6c047-a986-425d-afa8-7e18fd8918ce\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:51:47.354957 kubelet[2644]: E1213 15:51:47.354848 2644 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bdd6c047-a986-425d-afa8-7e18fd8918ce\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-9rnvx" podUID="bdd6c047-a986-425d-afa8-7e18fd8918ce" Dec 13 15:51:47.355571 env[1570]: time="2024-12-13T15:51:47.355537421Z" level=error msg="StopPodSandbox for \"4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6\" failed" error="failed to destroy network for sandbox \"4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:51:47.355706 kubelet[2644]: E1213 15:51:47.355683 2644 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" Dec 13 15:51:47.355776 kubelet[2644]: E1213 15:51:47.355709 2644 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6"} Dec 13 15:51:47.355776 kubelet[2644]: E1213 15:51:47.355732 2644 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"80f5e21a-43ec-4c77-ad94-1aa18626856c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:51:47.355776 kubelet[2644]: E1213 15:51:47.355748 2644 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"80f5e21a-43ec-4c77-ad94-1aa18626856c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-7c7rz" podUID="80f5e21a-43ec-4c77-ad94-1aa18626856c" Dec 13 15:51:47.356552 env[1570]: time="2024-12-13T15:51:47.356478717Z" level=error msg="StopPodSandbox for \"e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce\" failed" error="failed to destroy network for sandbox \"e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:51:47.356640 kubelet[2644]: E1213 15:51:47.356612 2644 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" Dec 13 15:51:47.356714 kubelet[2644]: E1213 15:51:47.356646 2644 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce"} Dec 13 15:51:47.356714 kubelet[2644]: E1213 15:51:47.356680 2644 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b97ba304-f837-40f1-b3de-a9b43217ec78\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:51:47.356823 env[1570]: time="2024-12-13T15:51:47.356667923Z" level=error msg="StopPodSandbox for \"6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f\" failed" error="failed to destroy network for sandbox \"6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:51:47.356866 kubelet[2644]: E1213 15:51:47.356712 2644 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b97ba304-f837-40f1-b3de-a9b43217ec78\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-656bc8f995-2lkj6" podUID="b97ba304-f837-40f1-b3de-a9b43217ec78" Dec 13 15:51:47.356866 kubelet[2644]: E1213 15:51:47.356805 2644 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" Dec 13 15:51:47.356866 kubelet[2644]: E1213 15:51:47.356829 2644 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f"} Dec 13 15:51:47.356866 kubelet[2644]: E1213 15:51:47.356852 2644 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6317dcc4-4669-49e0-96da-846071dd95cb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:51:47.357032 kubelet[2644]: E1213 15:51:47.356868 2644 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6317dcc4-4669-49e0-96da-846071dd95cb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5fc856f8c8-xbz48" podUID="6317dcc4-4669-49e0-96da-846071dd95cb" Dec 13 15:51:47.465774 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57-shm.mount: Deactivated successfully. Dec 13 15:51:47.466024 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6-shm.mount: Deactivated successfully. Dec 13 15:51:48.216651 systemd[1]: Created slice kubepods-besteffort-pod11d81f55_fe60_46f8_9d77_159b021295c1.slice. Dec 13 15:51:48.221941 env[1570]: time="2024-12-13T15:51:48.221826270Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-jxftf,Uid:11d81f55-fe60-46f8-9d77-159b021295c1,Namespace:calico-system,Attempt:0,}" Dec 13 15:51:48.258869 env[1570]: time="2024-12-13T15:51:48.258811010Z" level=error msg="Failed to destroy network for sandbox \"2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:51:48.259031 env[1570]: time="2024-12-13T15:51:48.258986102Z" level=error msg="encountered an error cleaning up failed sandbox \"2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:51:48.259031 env[1570]: time="2024-12-13T15:51:48.259013444Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-jxftf,Uid:11d81f55-fe60-46f8-9d77-159b021295c1,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:51:48.259177 kubelet[2644]: E1213 15:51:48.259149 2644 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:51:48.259214 kubelet[2644]: E1213 15:51:48.259200 2644 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-jxftf" Dec 13 15:51:48.259242 kubelet[2644]: E1213 15:51:48.259221 2644 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-jxftf" Dec 13 15:51:48.259275 kubelet[2644]: E1213 15:51:48.259257 2644 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-jxftf_calico-system(11d81f55-fe60-46f8-9d77-159b021295c1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-jxftf_calico-system(11d81f55-fe60-46f8-9d77-159b021295c1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-jxftf" podUID="11d81f55-fe60-46f8-9d77-159b021295c1" Dec 13 15:51:48.260309 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b-shm.mount: Deactivated successfully. Dec 13 15:51:48.318790 kubelet[2644]: I1213 15:51:48.318736 2644 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" Dec 13 15:51:48.319672 env[1570]: time="2024-12-13T15:51:48.319573787Z" level=info msg="StopPodSandbox for \"2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b\"" Dec 13 15:51:48.370155 env[1570]: time="2024-12-13T15:51:48.370065612Z" level=error msg="StopPodSandbox for \"2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b\" failed" error="failed to destroy network for sandbox \"2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 15:51:48.370367 kubelet[2644]: E1213 15:51:48.370324 2644 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" Dec 13 15:51:48.370430 kubelet[2644]: E1213 15:51:48.370383 2644 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b"} Dec 13 15:51:48.370534 kubelet[2644]: E1213 15:51:48.370433 2644 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"11d81f55-fe60-46f8-9d77-159b021295c1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 15:51:48.370534 kubelet[2644]: E1213 15:51:48.370460 2644 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"11d81f55-fe60-46f8-9d77-159b021295c1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-jxftf" podUID="11d81f55-fe60-46f8-9d77-159b021295c1" Dec 13 15:51:53.777350 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2082744786.mount: Deactivated successfully. Dec 13 15:51:53.799275 env[1570]: time="2024-12-13T15:51:53.799227292Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:53.799844 env[1570]: time="2024-12-13T15:51:53.799804383Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:53.800322 env[1570]: time="2024-12-13T15:51:53.800280813Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:53.800933 env[1570]: time="2024-12-13T15:51:53.800891591Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:51:53.801183 env[1570]: time="2024-12-13T15:51:53.801136500Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 15:51:53.805358 env[1570]: time="2024-12-13T15:51:53.805341782Z" level=info msg="CreateContainer within sandbox \"1506c4aaeec43f85aca5d96fd056fd971887b7170bd4c0eedad8a4216f955a60\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 15:51:53.811452 env[1570]: time="2024-12-13T15:51:53.811405033Z" level=info msg="CreateContainer within sandbox \"1506c4aaeec43f85aca5d96fd056fd971887b7170bd4c0eedad8a4216f955a60\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"9cfe5266a1250d69511976abb0f2ae0e5b71089799f4a5d7b38dee38f84185b7\"" Dec 13 15:51:53.811796 env[1570]: time="2024-12-13T15:51:53.811740935Z" level=info msg="StartContainer for \"9cfe5266a1250d69511976abb0f2ae0e5b71089799f4a5d7b38dee38f84185b7\"" Dec 13 15:51:53.819780 systemd[1]: Started cri-containerd-9cfe5266a1250d69511976abb0f2ae0e5b71089799f4a5d7b38dee38f84185b7.scope. Dec 13 15:51:53.826000 audit[3917]: AVC avc: denied { perfmon } for pid=3917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:53.855871 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 15:51:53.855941 kernel: audit: type=1400 audit(1734105113.826:995): avc: denied { perfmon } for pid=3917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:53.826000 audit[3917]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f4e99405328 items=0 ppid=3138 pid=3917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:53.921488 kernel: audit: type=1300 audit(1734105113.826:995): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f4e99405328 items=0 ppid=3138 pid=3917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:53.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963666535323636613132353064363935313139373661626230663261 Dec 13 15:51:54.111778 kernel: audit: type=1327 audit(1734105113.826:995): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963666535323636613132353064363935313139373661626230663261 Dec 13 15:51:54.111810 kernel: audit: type=1400 audit(1734105113.826:996): avc: denied { bpf } for pid=3917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:53.826000 audit[3917]: AVC avc: denied { bpf } for pid=3917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:54.176421 kernel: audit: type=1400 audit(1734105113.826:996): avc: denied { bpf } for pid=3917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:53.826000 audit[3917]: AVC avc: denied { bpf } for pid=3917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:54.241355 kernel: audit: type=1400 audit(1734105113.826:996): avc: denied { bpf } for pid=3917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:53.826000 audit[3917]: AVC avc: denied { bpf } for pid=3917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:53.826000 audit[3917]: AVC avc: denied { perfmon } for pid=3917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:54.369731 kernel: audit: type=1400 audit(1734105113.826:996): avc: denied { perfmon } for pid=3917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:54.369772 kernel: audit: type=1400 audit(1734105113.826:996): avc: denied { perfmon } for pid=3917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:53.826000 audit[3917]: AVC avc: denied { perfmon } for pid=3917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:54.375197 env[1570]: time="2024-12-13T15:51:54.375176692Z" level=info msg="StartContainer for \"9cfe5266a1250d69511976abb0f2ae0e5b71089799f4a5d7b38dee38f84185b7\" returns successfully" Dec 13 15:51:53.826000 audit[3917]: AVC avc: denied { perfmon } for pid=3917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:54.497578 kernel: audit: type=1400 audit(1734105113.826:996): avc: denied { perfmon } for pid=3917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:54.497607 kernel: audit: type=1400 audit(1734105113.826:996): avc: denied { perfmon } for pid=3917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:53.826000 audit[3917]: AVC avc: denied { perfmon } for pid=3917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:53.826000 audit[3917]: AVC avc: denied { perfmon } for pid=3917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:53.826000 audit[3917]: AVC avc: denied { bpf } for pid=3917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:53.826000 audit[3917]: AVC avc: denied { bpf } for pid=3917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:53.826000 audit: BPF prog-id=139 op=LOAD Dec 13 15:51:53.826000 audit[3917]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002a5688 items=0 ppid=3138 pid=3917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:53.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963666535323636613132353064363935313139373661626230663261 Dec 13 15:51:54.016000 audit[3917]: AVC avc: denied { bpf } for pid=3917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:54.016000 audit[3917]: AVC avc: denied { bpf } for pid=3917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:54.016000 audit[3917]: AVC avc: denied { perfmon } for pid=3917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:54.016000 audit[3917]: AVC avc: denied { perfmon } for pid=3917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:54.016000 audit[3917]: AVC avc: denied { perfmon } for pid=3917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:54.016000 audit[3917]: AVC avc: denied { perfmon } for pid=3917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:54.016000 audit[3917]: AVC avc: denied { perfmon } for pid=3917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:54.016000 audit[3917]: AVC avc: denied { bpf } for pid=3917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:54.016000 audit[3917]: AVC avc: denied { bpf } for pid=3917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:54.016000 audit: BPF prog-id=140 op=LOAD Dec 13 15:51:54.016000 audit[3917]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002a56d8 items=0 ppid=3138 pid=3917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:54.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963666535323636613132353064363935313139373661626230663261 Dec 13 15:51:54.175000 audit: BPF prog-id=140 op=UNLOAD Dec 13 15:51:54.175000 audit: BPF prog-id=139 op=UNLOAD Dec 13 15:51:54.175000 audit[3917]: AVC avc: denied { bpf } for pid=3917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:54.175000 audit[3917]: AVC avc: denied { bpf } for pid=3917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:54.175000 audit[3917]: AVC avc: denied { bpf } for pid=3917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:54.175000 audit[3917]: AVC avc: denied { perfmon } for pid=3917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:54.175000 audit[3917]: AVC avc: denied { perfmon } for pid=3917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:54.175000 audit[3917]: AVC avc: denied { perfmon } for pid=3917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:54.175000 audit[3917]: AVC avc: denied { perfmon } for pid=3917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:54.175000 audit[3917]: AVC avc: denied { perfmon } for pid=3917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:54.175000 audit[3917]: AVC avc: denied { bpf } for pid=3917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:54.175000 audit[3917]: AVC avc: denied { bpf } for pid=3917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:54.175000 audit: BPF prog-id=141 op=LOAD Dec 13 15:51:54.175000 audit[3917]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002a5768 items=0 ppid=3138 pid=3917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:54.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963666535323636613132353064363935313139373661626230663261 Dec 13 15:51:54.646367 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 15:51:54.646403 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 15:51:55.370597 kubelet[2644]: I1213 15:51:55.370561 2644 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-blbsh" podStartSLOduration=2.335913352 podStartE2EDuration="19.370550138s" podCreationTimestamp="2024-12-13 15:51:36 +0000 UTC" firstStartedPulling="2024-12-13 15:51:36.766921872 +0000 UTC m=+20.657712901" lastFinishedPulling="2024-12-13 15:51:53.801558653 +0000 UTC m=+37.692349687" observedRunningTime="2024-12-13 15:51:55.370459291 +0000 UTC m=+39.261250321" watchObservedRunningTime="2024-12-13 15:51:55.370550138 +0000 UTC m=+39.261341164" Dec 13 15:51:55.985000 audit[4061]: AVC avc: denied { write } for pid=4061 comm="tee" name="fd" dev="proc" ino=37162 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:51:55.985000 audit[4061]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc58422a0c a2=241 a3=1b6 items=1 ppid=4032 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:55.985000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 15:51:55.985000 audit: PATH item=0 name="/dev/fd/63" inode=36286 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:51:55.985000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:51:55.985000 audit[4076]: AVC avc: denied { write } for pid=4076 comm="tee" name="fd" dev="proc" ino=39197 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:51:55.985000 audit[4076]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd5eaa7a0c a2=241 a3=1b6 items=1 ppid=4029 pid=4076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:55.985000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 15:51:55.985000 audit: PATH item=0 name="/dev/fd/63" inode=40987 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:51:55.985000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:51:55.985000 audit[4073]: AVC avc: denied { write } for pid=4073 comm="tee" name="fd" dev="proc" ino=42032 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:51:55.985000 audit[4073]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff120f29fc a2=241 a3=1b6 items=1 ppid=4030 pid=4073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:55.985000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 15:51:55.985000 audit: PATH item=0 name="/dev/fd/63" inode=42029 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:51:55.985000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:51:55.985000 audit[4071]: AVC avc: denied { write } for pid=4071 comm="tee" name="fd" dev="proc" ino=32093 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:51:55.985000 audit[4071]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc863349fd a2=241 a3=1b6 items=1 ppid=4035 pid=4071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:55.985000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 15:51:55.985000 audit: PATH item=0 name="/dev/fd/63" inode=32090 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:51:55.985000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:51:55.985000 audit[4077]: AVC avc: denied { write } for pid=4077 comm="tee" name="fd" dev="proc" ino=19384 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:51:55.985000 audit[4077]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffc0663a0d a2=241 a3=1b6 items=1 ppid=4033 pid=4077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:55.985000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 15:51:55.985000 audit: PATH item=0 name="/dev/fd/63" inode=19381 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:51:55.985000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:51:55.986000 audit[4068]: AVC avc: denied { write } for pid=4068 comm="tee" name="fd" dev="proc" ino=19388 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:51:55.986000 audit[4072]: AVC avc: denied { write } for pid=4072 comm="tee" name="fd" dev="proc" ino=40196 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 15:51:55.986000 audit[4072]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffde2739a0e a2=241 a3=1b6 items=1 ppid=4031 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:55.986000 audit[4068]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff9ef1aa0c a2=241 a3=1b6 items=1 ppid=4034 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:55.986000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 15:51:55.986000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 15:51:55.986000 audit: PATH item=0 name="/dev/fd/63" inode=40193 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:51:55.986000 audit: PATH item=0 name="/dev/fd/63" inode=39194 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 15:51:55.986000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:51:55.986000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 15:51:57.998679 kubelet[2644]: I1213 15:51:57.998577 2644 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 15:51:58.022000 audit[4204]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=4204 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:51:58.022000 audit[4204]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc67c716d0 a2=0 a3=7ffc67c716bc items=0 ppid=2919 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.022000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:51:58.041000 audit[4204]: NETFILTER_CFG table=nat:94 family=2 entries=19 op=nft_register_chain pid=4204 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:51:58.041000 audit[4204]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffc67c716d0 a2=0 a3=7ffc67c716bc items=0 ppid=2919 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.041000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:51:58.101000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.101000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.101000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.101000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.101000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.101000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.101000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.101000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.101000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.101000 audit: BPF prog-id=142 op=LOAD Dec 13 15:51:58.101000 audit[4287]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc8b95b990 a2=98 a3=3 items=0 ppid=4234 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.101000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:51:58.101000 audit: BPF prog-id=142 op=UNLOAD Dec 13 15:51:58.102000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.102000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.102000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.102000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.102000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.102000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.102000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.102000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.102000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.102000 audit: BPF prog-id=143 op=LOAD Dec 13 15:51:58.102000 audit[4287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc8b95b770 a2=74 a3=540051 items=0 ppid=4234 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.102000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:51:58.102000 audit: BPF prog-id=143 op=UNLOAD Dec 13 15:51:58.102000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.102000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.102000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.102000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.102000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.102000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.102000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.102000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.102000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.102000 audit: BPF prog-id=144 op=LOAD Dec 13 15:51:58.102000 audit[4287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc8b95b7a0 a2=94 a3=2 items=0 ppid=4234 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.102000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:51:58.102000 audit: BPF prog-id=144 op=UNLOAD Dec 13 15:51:58.181000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.181000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.181000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.181000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.181000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.181000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.181000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.181000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.181000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.181000 audit: BPF prog-id=145 op=LOAD Dec 13 15:51:58.181000 audit[4287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc8b95b660 a2=40 a3=1 items=0 ppid=4234 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.181000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:51:58.181000 audit: BPF prog-id=145 op=UNLOAD Dec 13 15:51:58.181000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.181000 audit[4287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc8b95b730 a2=50 a3=7ffc8b95b810 items=0 ppid=4234 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.181000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc8b95b670 a2=28 a3=0 items=0 ppid=4234 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.188000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8b95b6a0 a2=28 a3=0 items=0 ppid=4234 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.188000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8b95b5b0 a2=28 a3=0 items=0 ppid=4234 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.188000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc8b95b6c0 a2=28 a3=0 items=0 ppid=4234 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.188000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc8b95b6a0 a2=28 a3=0 items=0 ppid=4234 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.188000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc8b95b690 a2=28 a3=0 items=0 ppid=4234 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.188000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc8b95b6c0 a2=28 a3=0 items=0 ppid=4234 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.188000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8b95b6a0 a2=28 a3=0 items=0 ppid=4234 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.188000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8b95b6c0 a2=28 a3=0 items=0 ppid=4234 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.188000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8b95b690 a2=28 a3=0 items=0 ppid=4234 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.188000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc8b95b700 a2=28 a3=0 items=0 ppid=4234 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.188000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc8b95b4b0 a2=50 a3=1 items=0 ppid=4234 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.188000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit: BPF prog-id=146 op=LOAD Dec 13 15:51:58.188000 audit[4287]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc8b95b4b0 a2=94 a3=5 items=0 ppid=4234 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.188000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:51:58.188000 audit: BPF prog-id=146 op=UNLOAD Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc8b95b560 a2=50 a3=1 items=0 ppid=4234 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.188000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc8b95b680 a2=4 a3=38 items=0 ppid=4234 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.188000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { confidentiality } for pid=4287 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:51:58.188000 audit[4287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc8b95b6d0 a2=94 a3=6 items=0 ppid=4234 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.188000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { confidentiality } for pid=4287 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:51:58.188000 audit[4287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc8b95ae80 a2=94 a3=83 items=0 ppid=4234 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.188000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { perfmon } for pid=4287 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { bpf } for pid=4287 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.188000 audit[4287]: AVC avc: denied { confidentiality } for pid=4287 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:51:58.188000 audit[4287]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc8b95ae80 a2=94 a3=83 items=0 ppid=4234 pid=4287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.188000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 15:51:58.192000 audit[4290]: AVC avc: denied { bpf } for pid=4290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.192000 audit[4290]: AVC avc: denied { bpf } for pid=4290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.192000 audit[4290]: AVC avc: denied { perfmon } for pid=4290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.192000 audit[4290]: AVC avc: denied { perfmon } for pid=4290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.192000 audit[4290]: AVC avc: denied { perfmon } for pid=4290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.192000 audit[4290]: AVC avc: denied { perfmon } for pid=4290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.192000 audit[4290]: AVC avc: denied { perfmon } for pid=4290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.192000 audit[4290]: AVC avc: denied { bpf } for pid=4290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.192000 audit[4290]: AVC avc: denied { bpf } for pid=4290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.192000 audit: BPF prog-id=147 op=LOAD Dec 13 15:51:58.192000 audit[4290]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff4a2af730 a2=98 a3=1999999999999999 items=0 ppid=4234 pid=4290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.192000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 15:51:58.192000 audit: BPF prog-id=147 op=UNLOAD Dec 13 15:51:58.192000 audit[4290]: AVC avc: denied { bpf } for pid=4290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.192000 audit[4290]: AVC avc: denied { bpf } for pid=4290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.192000 audit[4290]: AVC avc: denied { perfmon } for pid=4290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.192000 audit[4290]: AVC avc: denied { perfmon } for pid=4290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.192000 audit[4290]: AVC avc: denied { perfmon } for pid=4290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.192000 audit[4290]: AVC avc: denied { perfmon } for pid=4290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.192000 audit[4290]: AVC avc: denied { perfmon } for pid=4290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.192000 audit[4290]: AVC avc: denied { bpf } for pid=4290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.192000 audit[4290]: AVC avc: denied { bpf } for pid=4290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.192000 audit: BPF prog-id=148 op=LOAD Dec 13 15:51:58.192000 audit[4290]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff4a2af610 a2=74 a3=ffff items=0 ppid=4234 pid=4290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.192000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 15:51:58.192000 audit: BPF prog-id=148 op=UNLOAD Dec 13 15:51:58.192000 audit[4290]: AVC avc: denied { bpf } for pid=4290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.192000 audit[4290]: AVC avc: denied { bpf } for pid=4290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.192000 audit[4290]: AVC avc: denied { perfmon } for pid=4290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.192000 audit[4290]: AVC avc: denied { perfmon } for pid=4290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.192000 audit[4290]: AVC avc: denied { perfmon } for pid=4290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.192000 audit[4290]: AVC avc: denied { perfmon } for pid=4290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.192000 audit[4290]: AVC avc: denied { perfmon } for pid=4290 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.192000 audit[4290]: AVC avc: denied { bpf } for pid=4290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.192000 audit[4290]: AVC avc: denied { bpf } for pid=4290 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.192000 audit: BPF prog-id=149 op=LOAD Dec 13 15:51:58.192000 audit[4290]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff4a2af650 a2=40 a3=7fff4a2af830 items=0 ppid=4234 pid=4290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.192000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 15:51:58.192000 audit: BPF prog-id=149 op=UNLOAD Dec 13 15:51:58.215934 systemd-networkd[1315]: vxlan.calico: Link UP Dec 13 15:51:58.215936 systemd-networkd[1315]: vxlan.calico: Gained carrier Dec 13 15:51:58.217000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.217000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.217000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.217000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.217000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.217000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.217000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.217000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.217000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.217000 audit: BPF prog-id=150 op=LOAD Dec 13 15:51:58.217000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd78a8f590 a2=98 a3=ffffffff items=0 ppid=4234 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.217000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:51:58.217000 audit: BPF prog-id=150 op=UNLOAD Dec 13 15:51:58.217000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.217000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.217000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.217000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.217000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.217000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.217000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.217000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.217000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.217000 audit: BPF prog-id=151 op=LOAD Dec 13 15:51:58.217000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd78a8f3a0 a2=74 a3=540051 items=0 ppid=4234 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.217000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:51:58.217000 audit: BPF prog-id=151 op=UNLOAD Dec 13 15:51:58.217000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.217000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.217000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.217000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.217000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.217000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.217000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.217000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.217000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.217000 audit: BPF prog-id=152 op=LOAD Dec 13 15:51:58.217000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd78a8f3d0 a2=94 a3=2 items=0 ppid=4234 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.217000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:51:58.217000 audit: BPF prog-id=152 op=UNLOAD Dec 13 15:51:58.217000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.217000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd78a8f2a0 a2=28 a3=0 items=0 ppid=4234 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.217000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:51:58.217000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.217000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd78a8f2d0 a2=28 a3=0 items=0 ppid=4234 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.217000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:51:58.217000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.217000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd78a8f1e0 a2=28 a3=0 items=0 ppid=4234 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.217000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:51:58.217000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.217000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd78a8f2f0 a2=28 a3=0 items=0 ppid=4234 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.217000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:51:58.217000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.217000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd78a8f2d0 a2=28 a3=0 items=0 ppid=4234 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.217000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:51:58.217000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.217000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd78a8f2c0 a2=28 a3=0 items=0 ppid=4234 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.217000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:51:58.218000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.218000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd78a8f2f0 a2=28 a3=0 items=0 ppid=4234 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.218000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:51:58.218000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.218000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd78a8f2d0 a2=28 a3=0 items=0 ppid=4234 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.218000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:51:58.218000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.218000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd78a8f2f0 a2=28 a3=0 items=0 ppid=4234 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.218000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:51:58.218000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.218000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd78a8f2c0 a2=28 a3=0 items=0 ppid=4234 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.218000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:51:58.218000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.218000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd78a8f330 a2=28 a3=0 items=0 ppid=4234 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.218000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:51:58.218000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.218000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.218000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.218000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.218000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.218000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.218000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.218000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.218000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.218000 audit: BPF prog-id=153 op=LOAD Dec 13 15:51:58.218000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd78a8f1a0 a2=40 a3=0 items=0 ppid=4234 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.218000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:51:58.218000 audit: BPF prog-id=153 op=UNLOAD Dec 13 15:51:58.218000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.218000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd78a8f190 a2=50 a3=2800 items=0 ppid=4234 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.218000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:51:58.218000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.218000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffd78a8f190 a2=50 a3=2800 items=0 ppid=4234 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.218000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:51:58.218000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.218000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.218000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.218000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.218000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.218000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.218000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.218000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.218000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.218000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.218000 audit: BPF prog-id=154 op=LOAD Dec 13 15:51:58.218000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd78a8e9b0 a2=94 a3=2 items=0 ppid=4234 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.218000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:51:58.218000 audit: BPF prog-id=154 op=UNLOAD Dec 13 15:51:58.218000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.218000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.218000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.218000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.218000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.218000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.218000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.218000 audit[4322]: AVC avc: denied { perfmon } for pid=4322 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.218000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.218000 audit[4322]: AVC avc: denied { bpf } for pid=4322 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.218000 audit: BPF prog-id=155 op=LOAD Dec 13 15:51:58.218000 audit[4322]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd78a8eab0 a2=94 a3=2d items=0 ppid=4234 pid=4322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.218000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 15:51:58.219000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.219000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.219000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.219000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.219000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.219000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.219000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.219000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.219000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.219000 audit: BPF prog-id=156 op=LOAD Dec 13 15:51:58.219000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff2d41fc50 a2=98 a3=0 items=0 ppid=4234 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.219000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:51:58.219000 audit: BPF prog-id=156 op=UNLOAD Dec 13 15:51:58.219000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.219000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.219000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.219000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.219000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.219000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.219000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.219000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.219000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.219000 audit: BPF prog-id=157 op=LOAD Dec 13 15:51:58.219000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff2d41fa30 a2=74 a3=540051 items=0 ppid=4234 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.219000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:51:58.219000 audit: BPF prog-id=157 op=UNLOAD Dec 13 15:51:58.219000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.219000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.219000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.219000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.219000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.219000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.219000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.219000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.219000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.219000 audit: BPF prog-id=158 op=LOAD Dec 13 15:51:58.219000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff2d41fa60 a2=94 a3=2 items=0 ppid=4234 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.219000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:51:58.220000 audit: BPF prog-id=158 op=UNLOAD Dec 13 15:51:58.300000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.300000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.300000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.300000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.300000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.300000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.300000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.300000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.300000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.300000 audit: BPF prog-id=159 op=LOAD Dec 13 15:51:58.300000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff2d41f920 a2=40 a3=1 items=0 ppid=4234 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.300000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:51:58.300000 audit: BPF prog-id=159 op=UNLOAD Dec 13 15:51:58.300000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.300000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff2d41f9f0 a2=50 a3=7fff2d41fad0 items=0 ppid=4234 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.300000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff2d41f930 a2=28 a3=0 items=0 ppid=4234 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff2d41f960 a2=28 a3=0 items=0 ppid=4234 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff2d41f870 a2=28 a3=0 items=0 ppid=4234 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff2d41f980 a2=28 a3=0 items=0 ppid=4234 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff2d41f960 a2=28 a3=0 items=0 ppid=4234 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff2d41f950 a2=28 a3=0 items=0 ppid=4234 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff2d41f980 a2=28 a3=0 items=0 ppid=4234 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff2d41f960 a2=28 a3=0 items=0 ppid=4234 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff2d41f980 a2=28 a3=0 items=0 ppid=4234 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff2d41f950 a2=28 a3=0 items=0 ppid=4234 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff2d41f9c0 a2=28 a3=0 items=0 ppid=4234 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff2d41f770 a2=50 a3=1 items=0 ppid=4234 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit: BPF prog-id=160 op=LOAD Dec 13 15:51:58.307000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff2d41f770 a2=94 a3=5 items=0 ppid=4234 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:51:58.307000 audit: BPF prog-id=160 op=UNLOAD Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff2d41f820 a2=50 a3=1 items=0 ppid=4234 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff2d41f940 a2=4 a3=38 items=0 ppid=4234 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { confidentiality } for pid=4327 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:51:58.307000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff2d41f990 a2=94 a3=6 items=0 ppid=4234 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { confidentiality } for pid=4327 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:51:58.307000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff2d41f140 a2=94 a3=83 items=0 ppid=4234 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.307000 audit[4327]: AVC avc: denied { confidentiality } for pid=4327 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 15:51:58.307000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff2d41f140 a2=94 a3=83 items=0 ppid=4234 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.307000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:51:58.308000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.308000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff2d420b80 a2=10 a3=f1f00800 items=0 ppid=4234 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:51:58.308000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.308000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff2d420a20 a2=10 a3=3 items=0 ppid=4234 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:51:58.308000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.308000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff2d4209c0 a2=10 a3=3 items=0 ppid=4234 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:51:58.308000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:58.308000 audit[4327]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff2d4209c0 a2=10 a3=7 items=0 ppid=4234 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.308000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 15:51:58.320000 audit: BPF prog-id=155 op=UNLOAD Dec 13 15:51:58.351000 audit[4382]: NETFILTER_CFG table=mangle:95 family=2 entries=16 op=nft_register_chain pid=4382 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:51:58.351000 audit[4382]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc8d10bc90 a2=0 a3=7ffc8d10bc7c items=0 ppid=4234 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.351000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:51:58.356000 audit[4385]: NETFILTER_CFG table=nat:96 family=2 entries=15 op=nft_register_chain pid=4385 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:51:58.356000 audit[4385]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffed597b320 a2=0 a3=7ffed597b30c items=0 ppid=4234 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.356000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:51:58.357000 audit[4379]: NETFILTER_CFG table=raw:97 family=2 entries=21 op=nft_register_chain pid=4379 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:51:58.357000 audit[4379]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffeda956b90 a2=0 a3=7ffeda956b7c items=0 ppid=4234 pid=4379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.357000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:51:58.358000 audit[4384]: NETFILTER_CFG table=filter:98 family=2 entries=39 op=nft_register_chain pid=4384 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:51:58.358000 audit[4384]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffcf45cf100 a2=0 a3=7ffcf45cf0ec items=0 ppid=4234 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:58.358000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:51:59.205117 env[1570]: time="2024-12-13T15:51:59.204980962Z" level=info msg="StopPodSandbox for \"4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6\"" Dec 13 15:51:59.303752 env[1570]: 2024-12-13 15:51:59.277 [INFO][4409] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" Dec 13 15:51:59.303752 env[1570]: 2024-12-13 15:51:59.277 [INFO][4409] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" iface="eth0" netns="/var/run/netns/cni-68e67551-da15-1a98-4a00-aa80dda60876" Dec 13 15:51:59.303752 env[1570]: 2024-12-13 15:51:59.277 [INFO][4409] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" iface="eth0" netns="/var/run/netns/cni-68e67551-da15-1a98-4a00-aa80dda60876" Dec 13 15:51:59.303752 env[1570]: 2024-12-13 15:51:59.277 [INFO][4409] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" iface="eth0" netns="/var/run/netns/cni-68e67551-da15-1a98-4a00-aa80dda60876" Dec 13 15:51:59.303752 env[1570]: 2024-12-13 15:51:59.277 [INFO][4409] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" Dec 13 15:51:59.303752 env[1570]: 2024-12-13 15:51:59.277 [INFO][4409] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" Dec 13 15:51:59.303752 env[1570]: 2024-12-13 15:51:59.293 [INFO][4424] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" HandleID="k8s-pod-network.4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" Workload="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--7c7rz-eth0" Dec 13 15:51:59.303752 env[1570]: 2024-12-13 15:51:59.293 [INFO][4424] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:51:59.303752 env[1570]: 2024-12-13 15:51:59.293 [INFO][4424] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:51:59.303752 env[1570]: 2024-12-13 15:51:59.299 [WARNING][4424] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" HandleID="k8s-pod-network.4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" Workload="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--7c7rz-eth0" Dec 13 15:51:59.303752 env[1570]: 2024-12-13 15:51:59.299 [INFO][4424] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" HandleID="k8s-pod-network.4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" Workload="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--7c7rz-eth0" Dec 13 15:51:59.303752 env[1570]: 2024-12-13 15:51:59.300 [INFO][4424] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:51:59.303752 env[1570]: 2024-12-13 15:51:59.302 [INFO][4409] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" Dec 13 15:51:59.304423 env[1570]: time="2024-12-13T15:51:59.303834939Z" level=info msg="TearDown network for sandbox \"4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6\" successfully" Dec 13 15:51:59.304423 env[1570]: time="2024-12-13T15:51:59.303861771Z" level=info msg="StopPodSandbox for \"4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6\" returns successfully" Dec 13 15:51:59.304541 env[1570]: time="2024-12-13T15:51:59.304417477Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-7c7rz,Uid:80f5e21a-43ec-4c77-ad94-1aa18626856c,Namespace:kube-system,Attempt:1,}" Dec 13 15:51:59.306296 systemd[1]: run-netns-cni\x2d68e67551\x2dda15\x2d1a98\x2d4a00\x2daa80dda60876.mount: Deactivated successfully. Dec 13 15:51:59.392495 systemd-networkd[1315]: cali1e3a840f7d0: Link UP Dec 13 15:51:59.420532 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 15:51:59.420596 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1e3a840f7d0: link becomes ready Dec 13 15:51:59.449057 systemd-networkd[1315]: cali1e3a840f7d0: Gained carrier Dec 13 15:51:59.455204 env[1570]: 2024-12-13 15:51:59.336 [INFO][4440] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--7c7rz-eth0 coredns-7db6d8ff4d- kube-system 80f5e21a-43ec-4c77-ad94-1aa18626856c 739 0 2024-12-13 15:51:29 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.6-a-a4f471fe95 coredns-7db6d8ff4d-7c7rz eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali1e3a840f7d0 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="a1a9959c2ed3d13c5e593f3667813b47b8b2141b068a0d41123b488935a36913" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7c7rz" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--7c7rz-" Dec 13 15:51:59.455204 env[1570]: 2024-12-13 15:51:59.336 [INFO][4440] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a1a9959c2ed3d13c5e593f3667813b47b8b2141b068a0d41123b488935a36913" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7c7rz" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--7c7rz-eth0" Dec 13 15:51:59.455204 env[1570]: 2024-12-13 15:51:59.358 [INFO][4462] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a1a9959c2ed3d13c5e593f3667813b47b8b2141b068a0d41123b488935a36913" HandleID="k8s-pod-network.a1a9959c2ed3d13c5e593f3667813b47b8b2141b068a0d41123b488935a36913" Workload="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--7c7rz-eth0" Dec 13 15:51:59.455204 env[1570]: 2024-12-13 15:51:59.365 [INFO][4462] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a1a9959c2ed3d13c5e593f3667813b47b8b2141b068a0d41123b488935a36913" HandleID="k8s-pod-network.a1a9959c2ed3d13c5e593f3667813b47b8b2141b068a0d41123b488935a36913" Workload="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--7c7rz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0005cb4b0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.6-a-a4f471fe95", "pod":"coredns-7db6d8ff4d-7c7rz", "timestamp":"2024-12-13 15:51:59.358026313 +0000 UTC"}, Hostname:"ci-3510.3.6-a-a4f471fe95", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:51:59.455204 env[1570]: 2024-12-13 15:51:59.366 [INFO][4462] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:51:59.455204 env[1570]: 2024-12-13 15:51:59.366 [INFO][4462] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:51:59.455204 env[1570]: 2024-12-13 15:51:59.366 [INFO][4462] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-a4f471fe95' Dec 13 15:51:59.455204 env[1570]: 2024-12-13 15:51:59.367 [INFO][4462] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a1a9959c2ed3d13c5e593f3667813b47b8b2141b068a0d41123b488935a36913" host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:59.455204 env[1570]: 2024-12-13 15:51:59.371 [INFO][4462] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:59.455204 env[1570]: 2024-12-13 15:51:59.374 [INFO][4462] ipam/ipam.go 489: Trying affinity for 192.168.110.192/26 host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:59.455204 env[1570]: 2024-12-13 15:51:59.376 [INFO][4462] ipam/ipam.go 155: Attempting to load block cidr=192.168.110.192/26 host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:59.455204 env[1570]: 2024-12-13 15:51:59.378 [INFO][4462] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.110.192/26 host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:59.455204 env[1570]: 2024-12-13 15:51:59.378 [INFO][4462] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.110.192/26 handle="k8s-pod-network.a1a9959c2ed3d13c5e593f3667813b47b8b2141b068a0d41123b488935a36913" host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:59.455204 env[1570]: 2024-12-13 15:51:59.379 [INFO][4462] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a1a9959c2ed3d13c5e593f3667813b47b8b2141b068a0d41123b488935a36913 Dec 13 15:51:59.455204 env[1570]: 2024-12-13 15:51:59.383 [INFO][4462] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.110.192/26 handle="k8s-pod-network.a1a9959c2ed3d13c5e593f3667813b47b8b2141b068a0d41123b488935a36913" host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:59.455204 env[1570]: 2024-12-13 15:51:59.388 [INFO][4462] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.110.193/26] block=192.168.110.192/26 handle="k8s-pod-network.a1a9959c2ed3d13c5e593f3667813b47b8b2141b068a0d41123b488935a36913" host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:59.455204 env[1570]: 2024-12-13 15:51:59.389 [INFO][4462] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.110.193/26] handle="k8s-pod-network.a1a9959c2ed3d13c5e593f3667813b47b8b2141b068a0d41123b488935a36913" host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:51:59.455204 env[1570]: 2024-12-13 15:51:59.389 [INFO][4462] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:51:59.455204 env[1570]: 2024-12-13 15:51:59.389 [INFO][4462] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.110.193/26] IPv6=[] ContainerID="a1a9959c2ed3d13c5e593f3667813b47b8b2141b068a0d41123b488935a36913" HandleID="k8s-pod-network.a1a9959c2ed3d13c5e593f3667813b47b8b2141b068a0d41123b488935a36913" Workload="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--7c7rz-eth0" Dec 13 15:51:59.455679 env[1570]: 2024-12-13 15:51:59.390 [INFO][4440] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a1a9959c2ed3d13c5e593f3667813b47b8b2141b068a0d41123b488935a36913" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7c7rz" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--7c7rz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--7c7rz-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"80f5e21a-43ec-4c77-ad94-1aa18626856c", ResourceVersion:"739", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 51, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-a4f471fe95", ContainerID:"", Pod:"coredns-7db6d8ff4d-7c7rz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1e3a840f7d0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:51:59.455679 env[1570]: 2024-12-13 15:51:59.391 [INFO][4440] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.110.193/32] ContainerID="a1a9959c2ed3d13c5e593f3667813b47b8b2141b068a0d41123b488935a36913" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7c7rz" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--7c7rz-eth0" Dec 13 15:51:59.455679 env[1570]: 2024-12-13 15:51:59.391 [INFO][4440] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1e3a840f7d0 ContainerID="a1a9959c2ed3d13c5e593f3667813b47b8b2141b068a0d41123b488935a36913" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7c7rz" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--7c7rz-eth0" Dec 13 15:51:59.455679 env[1570]: 2024-12-13 15:51:59.448 [INFO][4440] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a1a9959c2ed3d13c5e593f3667813b47b8b2141b068a0d41123b488935a36913" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7c7rz" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--7c7rz-eth0" Dec 13 15:51:59.455679 env[1570]: 2024-12-13 15:51:59.449 [INFO][4440] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a1a9959c2ed3d13c5e593f3667813b47b8b2141b068a0d41123b488935a36913" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7c7rz" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--7c7rz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--7c7rz-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"80f5e21a-43ec-4c77-ad94-1aa18626856c", ResourceVersion:"739", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 51, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-a4f471fe95", ContainerID:"a1a9959c2ed3d13c5e593f3667813b47b8b2141b068a0d41123b488935a36913", Pod:"coredns-7db6d8ff4d-7c7rz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1e3a840f7d0", MAC:"72:a3:ff:a2:bb:c4", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:51:59.455679 env[1570]: 2024-12-13 15:51:59.454 [INFO][4440] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a1a9959c2ed3d13c5e593f3667813b47b8b2141b068a0d41123b488935a36913" Namespace="kube-system" Pod="coredns-7db6d8ff4d-7c7rz" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--7c7rz-eth0" Dec 13 15:51:59.459000 audit[4497]: NETFILTER_CFG table=filter:99 family=2 entries=34 op=nft_register_chain pid=4497 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:51:59.460760 env[1570]: time="2024-12-13T15:51:59.460673274Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:51:59.460760 env[1570]: time="2024-12-13T15:51:59.460697314Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:51:59.460760 env[1570]: time="2024-12-13T15:51:59.460704241Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:51:59.460829 env[1570]: time="2024-12-13T15:51:59.460777365Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a1a9959c2ed3d13c5e593f3667813b47b8b2141b068a0d41123b488935a36913 pid=4500 runtime=io.containerd.runc.v2 Dec 13 15:51:59.467468 systemd[1]: Started cri-containerd-a1a9959c2ed3d13c5e593f3667813b47b8b2141b068a0d41123b488935a36913.scope. Dec 13 15:51:59.486796 kernel: kauditd_printk_skb: 554 callbacks suppressed Dec 13 15:51:59.486833 kernel: audit: type=1325 audit(1734105119.459:1105): table=filter:99 family=2 entries=34 op=nft_register_chain pid=4497 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:51:59.459000 audit[4497]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffd2a5c6e40 a2=0 a3=7ffd2a5c6e2c items=0 ppid=4234 pid=4497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:59.545544 kernel: audit: type=1300 audit(1734105119.459:1105): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffd2a5c6e40 a2=0 a3=7ffd2a5c6e2c items=0 ppid=4234 pid=4497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:59.459000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:51:59.701194 kernel: audit: type=1327 audit(1734105119.459:1105): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:51:59.701235 kernel: audit: type=1400 audit(1734105119.550:1106): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.763506 kernel: audit: type=1400 audit(1734105119.550:1107): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.888229 kernel: audit: type=1400 audit(1734105119.550:1108): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.888254 kernel: audit: type=1400 audit(1734105119.550:1109): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.950924 kernel: audit: type=1400 audit(1734105119.550:1110): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.013660 kernel: audit: type=1400 audit(1734105119.550:1111): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.076338 kernel: audit: type=1400 audit(1734105119.550:1112): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.699000 audit: BPF prog-id=161 op=LOAD Dec 13 15:51:59.699000 audit[4510]: AVC avc: denied { bpf } for pid=4510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.699000 audit[4510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4500 pid=4510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:59.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131613939353963326564336431336335653539336633363637383133 Dec 13 15:51:59.699000 audit[4510]: AVC avc: denied { perfmon } for pid=4510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.699000 audit[4510]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4500 pid=4510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:59.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131613939353963326564336431336335653539336633363637383133 Dec 13 15:51:59.700000 audit[4510]: AVC avc: denied { bpf } for pid=4510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.700000 audit[4510]: AVC avc: denied { bpf } for pid=4510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.700000 audit[4510]: AVC avc: denied { bpf } for pid=4510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.700000 audit[4510]: AVC avc: denied { perfmon } for pid=4510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.700000 audit[4510]: AVC avc: denied { perfmon } for pid=4510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.700000 audit[4510]: AVC avc: denied { perfmon } for pid=4510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.700000 audit[4510]: AVC avc: denied { perfmon } for pid=4510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.700000 audit[4510]: AVC avc: denied { perfmon } for pid=4510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.700000 audit[4510]: AVC avc: denied { bpf } for pid=4510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.700000 audit[4510]: AVC avc: denied { bpf } for pid=4510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.700000 audit: BPF prog-id=162 op=LOAD Dec 13 15:51:59.700000 audit[4510]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000361fe0 items=0 ppid=4500 pid=4510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:59.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131613939353963326564336431336335653539336633363637383133 Dec 13 15:51:59.824000 audit[4510]: AVC avc: denied { bpf } for pid=4510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.824000 audit[4510]: AVC avc: denied { bpf } for pid=4510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.824000 audit[4510]: AVC avc: denied { perfmon } for pid=4510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.824000 audit[4510]: AVC avc: denied { perfmon } for pid=4510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.824000 audit[4510]: AVC avc: denied { perfmon } for pid=4510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.824000 audit[4510]: AVC avc: denied { perfmon } for pid=4510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.824000 audit[4510]: AVC avc: denied { perfmon } for pid=4510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.824000 audit[4510]: AVC avc: denied { bpf } for pid=4510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.824000 audit[4510]: AVC avc: denied { bpf } for pid=4510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.824000 audit: BPF prog-id=163 op=LOAD Dec 13 15:51:59.824000 audit[4510]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003de028 items=0 ppid=4500 pid=4510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:59.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131613939353963326564336431336335653539336633363637383133 Dec 13 15:51:59.949000 audit: BPF prog-id=163 op=UNLOAD Dec 13 15:51:59.949000 audit: BPF prog-id=162 op=UNLOAD Dec 13 15:51:59.949000 audit[4510]: AVC avc: denied { bpf } for pid=4510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.949000 audit[4510]: AVC avc: denied { bpf } for pid=4510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.949000 audit[4510]: AVC avc: denied { bpf } for pid=4510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.949000 audit[4510]: AVC avc: denied { perfmon } for pid=4510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.949000 audit[4510]: AVC avc: denied { perfmon } for pid=4510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.949000 audit[4510]: AVC avc: denied { perfmon } for pid=4510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.949000 audit[4510]: AVC avc: denied { perfmon } for pid=4510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.949000 audit[4510]: AVC avc: denied { perfmon } for pid=4510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.949000 audit[4510]: AVC avc: denied { bpf } for pid=4510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.949000 audit[4510]: AVC avc: denied { bpf } for pid=4510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:51:59.949000 audit: BPF prog-id=164 op=LOAD Dec 13 15:51:59.949000 audit[4510]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003de438 items=0 ppid=4500 pid=4510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:51:59.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131613939353963326564336431336335653539336633363637383133 Dec 13 15:52:00.155210 env[1570]: time="2024-12-13T15:52:00.155185393Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-7c7rz,Uid:80f5e21a-43ec-4c77-ad94-1aa18626856c,Namespace:kube-system,Attempt:1,} returns sandbox id \"a1a9959c2ed3d13c5e593f3667813b47b8b2141b068a0d41123b488935a36913\"" Dec 13 15:52:00.156410 env[1570]: time="2024-12-13T15:52:00.156396644Z" level=info msg="CreateContainer within sandbox \"a1a9959c2ed3d13c5e593f3667813b47b8b2141b068a0d41123b488935a36913\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 15:52:00.160954 env[1570]: time="2024-12-13T15:52:00.160903495Z" level=info msg="CreateContainer within sandbox \"a1a9959c2ed3d13c5e593f3667813b47b8b2141b068a0d41123b488935a36913\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"86d3a1136a8f0aa7c30717186d36d9ed87d48c1c55099c9086ad719820fd32c5\"" Dec 13 15:52:00.161156 env[1570]: time="2024-12-13T15:52:00.161140143Z" level=info msg="StartContainer for \"86d3a1136a8f0aa7c30717186d36d9ed87d48c1c55099c9086ad719820fd32c5\"" Dec 13 15:52:00.168656 systemd[1]: Started cri-containerd-86d3a1136a8f0aa7c30717186d36d9ed87d48c1c55099c9086ad719820fd32c5.scope. Dec 13 15:52:00.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.173000 audit: BPF prog-id=165 op=LOAD Dec 13 15:52:00.173000 audit[4543]: AVC avc: denied { bpf } for pid=4543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.173000 audit[4543]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4500 pid=4543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:00.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836643361313133366138663061613763333037313731383664333664 Dec 13 15:52:00.173000 audit[4543]: AVC avc: denied { perfmon } for pid=4543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.173000 audit[4543]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4500 pid=4543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:00.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836643361313133366138663061613763333037313731383664333664 Dec 13 15:52:00.173000 audit[4543]: AVC avc: denied { bpf } for pid=4543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.173000 audit[4543]: AVC avc: denied { bpf } for pid=4543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.173000 audit[4543]: AVC avc: denied { bpf } for pid=4543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.173000 audit[4543]: AVC avc: denied { perfmon } for pid=4543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.173000 audit[4543]: AVC avc: denied { perfmon } for pid=4543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.173000 audit[4543]: AVC avc: denied { perfmon } for pid=4543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.173000 audit[4543]: AVC avc: denied { perfmon } for pid=4543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.173000 audit[4543]: AVC avc: denied { perfmon } for pid=4543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.173000 audit[4543]: AVC avc: denied { bpf } for pid=4543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.173000 audit[4543]: AVC avc: denied { bpf } for pid=4543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.173000 audit: BPF prog-id=166 op=LOAD Dec 13 15:52:00.173000 audit[4543]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000f3de0 items=0 ppid=4500 pid=4543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:00.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836643361313133366138663061613763333037313731383664333664 Dec 13 15:52:00.174000 audit[4543]: AVC avc: denied { bpf } for pid=4543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.174000 audit[4543]: AVC avc: denied { bpf } for pid=4543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.174000 audit[4543]: AVC avc: denied { perfmon } for pid=4543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.174000 audit[4543]: AVC avc: denied { perfmon } for pid=4543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.174000 audit[4543]: AVC avc: denied { perfmon } for pid=4543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.174000 audit[4543]: AVC avc: denied { perfmon } for pid=4543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.174000 audit[4543]: AVC avc: denied { perfmon } for pid=4543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.174000 audit[4543]: AVC avc: denied { bpf } for pid=4543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.174000 audit[4543]: AVC avc: denied { bpf } for pid=4543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.174000 audit: BPF prog-id=167 op=LOAD Dec 13 15:52:00.174000 audit[4543]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000f3e28 items=0 ppid=4500 pid=4543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:00.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836643361313133366138663061613763333037313731383664333664 Dec 13 15:52:00.174000 audit: BPF prog-id=167 op=UNLOAD Dec 13 15:52:00.174000 audit: BPF prog-id=166 op=UNLOAD Dec 13 15:52:00.174000 audit[4543]: AVC avc: denied { bpf } for pid=4543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.174000 audit[4543]: AVC avc: denied { bpf } for pid=4543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.174000 audit[4543]: AVC avc: denied { bpf } for pid=4543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.174000 audit[4543]: AVC avc: denied { perfmon } for pid=4543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.174000 audit[4543]: AVC avc: denied { perfmon } for pid=4543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.174000 audit[4543]: AVC avc: denied { perfmon } for pid=4543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.174000 audit[4543]: AVC avc: denied { perfmon } for pid=4543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.174000 audit[4543]: AVC avc: denied { perfmon } for pid=4543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.174000 audit[4543]: AVC avc: denied { bpf } for pid=4543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.174000 audit[4543]: AVC avc: denied { bpf } for pid=4543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:00.174000 audit: BPF prog-id=168 op=LOAD Dec 13 15:52:00.174000 audit[4543]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003b2238 items=0 ppid=4500 pid=4543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:00.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836643361313133366138663061613763333037313731383664333664 Dec 13 15:52:00.180496 env[1570]: time="2024-12-13T15:52:00.180469274Z" level=info msg="StartContainer for \"86d3a1136a8f0aa7c30717186d36d9ed87d48c1c55099c9086ad719820fd32c5\" returns successfully" Dec 13 15:52:00.217723 systemd-networkd[1315]: vxlan.calico: Gained IPv6LL Dec 13 15:52:00.372905 kubelet[2644]: I1213 15:52:00.372827 2644 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-7c7rz" podStartSLOduration=31.372813091 podStartE2EDuration="31.372813091s" podCreationTimestamp="2024-12-13 15:51:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 15:52:00.372488612 +0000 UTC m=+44.263279643" watchObservedRunningTime="2024-12-13 15:52:00.372813091 +0000 UTC m=+44.263604120" Dec 13 15:52:00.377000 audit[4584]: NETFILTER_CFG table=filter:100 family=2 entries=16 op=nft_register_rule pid=4584 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:52:00.377000 audit[4584]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd8d576fa0 a2=0 a3=7ffd8d576f8c items=0 ppid=2919 pid=4584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:00.377000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:52:00.388000 audit[4584]: NETFILTER_CFG table=nat:101 family=2 entries=14 op=nft_register_rule pid=4584 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:52:00.388000 audit[4584]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffd8d576fa0 a2=0 a3=0 items=0 ppid=2919 pid=4584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:00.388000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:52:00.398000 audit[4586]: NETFILTER_CFG table=filter:102 family=2 entries=13 op=nft_register_rule pid=4586 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:52:00.398000 audit[4586]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe9680edd0 a2=0 a3=7ffe9680edbc items=0 ppid=2919 pid=4586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:00.398000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:52:00.412000 audit[4586]: NETFILTER_CFG table=nat:103 family=2 entries=35 op=nft_register_chain pid=4586 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:52:00.412000 audit[4586]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe9680edd0 a2=0 a3=7ffe9680edbc items=0 ppid=2919 pid=4586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:00.412000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:52:00.920797 systemd-networkd[1315]: cali1e3a840f7d0: Gained IPv6LL Dec 13 15:52:01.204262 env[1570]: time="2024-12-13T15:52:01.204055842Z" level=info msg="StopPodSandbox for \"6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f\"" Dec 13 15:52:01.205041 env[1570]: time="2024-12-13T15:52:01.204327918Z" level=info msg="StopPodSandbox for \"e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce\"" Dec 13 15:52:01.205041 env[1570]: time="2024-12-13T15:52:01.204344451Z" level=info msg="StopPodSandbox for \"c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57\"" Dec 13 15:52:01.205041 env[1570]: time="2024-12-13T15:52:01.204515288Z" level=info msg="StopPodSandbox for \"7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99\"" Dec 13 15:52:01.251196 env[1570]: 2024-12-13 15:52:01.233 [INFO][4655] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" Dec 13 15:52:01.251196 env[1570]: 2024-12-13 15:52:01.233 [INFO][4655] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" iface="eth0" netns="/var/run/netns/cni-0f322041-cd32-684f-49b2-1cda0ed2fdc6" Dec 13 15:52:01.251196 env[1570]: 2024-12-13 15:52:01.233 [INFO][4655] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" iface="eth0" netns="/var/run/netns/cni-0f322041-cd32-684f-49b2-1cda0ed2fdc6" Dec 13 15:52:01.251196 env[1570]: 2024-12-13 15:52:01.233 [INFO][4655] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" iface="eth0" netns="/var/run/netns/cni-0f322041-cd32-684f-49b2-1cda0ed2fdc6" Dec 13 15:52:01.251196 env[1570]: 2024-12-13 15:52:01.233 [INFO][4655] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" Dec 13 15:52:01.251196 env[1570]: 2024-12-13 15:52:01.233 [INFO][4655] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" Dec 13 15:52:01.251196 env[1570]: 2024-12-13 15:52:01.244 [INFO][4719] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" HandleID="k8s-pod-network.c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" Workload="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--9rnvx-eth0" Dec 13 15:52:01.251196 env[1570]: 2024-12-13 15:52:01.244 [INFO][4719] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:52:01.251196 env[1570]: 2024-12-13 15:52:01.244 [INFO][4719] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:52:01.251196 env[1570]: 2024-12-13 15:52:01.249 [WARNING][4719] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" HandleID="k8s-pod-network.c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" Workload="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--9rnvx-eth0" Dec 13 15:52:01.251196 env[1570]: 2024-12-13 15:52:01.249 [INFO][4719] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" HandleID="k8s-pod-network.c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" Workload="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--9rnvx-eth0" Dec 13 15:52:01.251196 env[1570]: 2024-12-13 15:52:01.250 [INFO][4719] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:52:01.251196 env[1570]: 2024-12-13 15:52:01.250 [INFO][4655] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" Dec 13 15:52:01.251541 env[1570]: time="2024-12-13T15:52:01.251271496Z" level=info msg="TearDown network for sandbox \"c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57\" successfully" Dec 13 15:52:01.251541 env[1570]: time="2024-12-13T15:52:01.251293705Z" level=info msg="StopPodSandbox for \"c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57\" returns successfully" Dec 13 15:52:01.251689 env[1570]: time="2024-12-13T15:52:01.251673200Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-9rnvx,Uid:bdd6c047-a986-425d-afa8-7e18fd8918ce,Namespace:kube-system,Attempt:1,}" Dec 13 15:52:01.253084 systemd[1]: run-netns-cni\x2d0f322041\x2dcd32\x2d684f\x2d49b2\x2d1cda0ed2fdc6.mount: Deactivated successfully. Dec 13 15:52:01.255714 env[1570]: 2024-12-13 15:52:01.232 [INFO][4654] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" Dec 13 15:52:01.255714 env[1570]: 2024-12-13 15:52:01.232 [INFO][4654] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" iface="eth0" netns="/var/run/netns/cni-1044d197-2d3b-2c74-4060-387e09bd84a6" Dec 13 15:52:01.255714 env[1570]: 2024-12-13 15:52:01.232 [INFO][4654] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" iface="eth0" netns="/var/run/netns/cni-1044d197-2d3b-2c74-4060-387e09bd84a6" Dec 13 15:52:01.255714 env[1570]: 2024-12-13 15:52:01.232 [INFO][4654] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" iface="eth0" netns="/var/run/netns/cni-1044d197-2d3b-2c74-4060-387e09bd84a6" Dec 13 15:52:01.255714 env[1570]: 2024-12-13 15:52:01.232 [INFO][4654] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" Dec 13 15:52:01.255714 env[1570]: 2024-12-13 15:52:01.232 [INFO][4654] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" Dec 13 15:52:01.255714 env[1570]: 2024-12-13 15:52:01.244 [INFO][4718] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" HandleID="k8s-pod-network.6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" Workload="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--xbz48-eth0" Dec 13 15:52:01.255714 env[1570]: 2024-12-13 15:52:01.244 [INFO][4718] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:52:01.255714 env[1570]: 2024-12-13 15:52:01.250 [INFO][4718] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:52:01.255714 env[1570]: 2024-12-13 15:52:01.253 [WARNING][4718] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" HandleID="k8s-pod-network.6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" Workload="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--xbz48-eth0" Dec 13 15:52:01.255714 env[1570]: 2024-12-13 15:52:01.253 [INFO][4718] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" HandleID="k8s-pod-network.6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" Workload="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--xbz48-eth0" Dec 13 15:52:01.255714 env[1570]: 2024-12-13 15:52:01.254 [INFO][4718] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:52:01.255714 env[1570]: 2024-12-13 15:52:01.255 [INFO][4654] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" Dec 13 15:52:01.256008 env[1570]: time="2024-12-13T15:52:01.255757435Z" level=info msg="TearDown network for sandbox \"6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f\" successfully" Dec 13 15:52:01.256008 env[1570]: time="2024-12-13T15:52:01.255777695Z" level=info msg="StopPodSandbox for \"6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f\" returns successfully" Dec 13 15:52:01.256277 env[1570]: time="2024-12-13T15:52:01.256259509Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5fc856f8c8-xbz48,Uid:6317dcc4-4669-49e0-96da-846071dd95cb,Namespace:calico-apiserver,Attempt:1,}" Dec 13 15:52:01.259373 systemd[1]: run-netns-cni\x2d1044d197\x2d2d3b\x2d2c74\x2d4060\x2d387e09bd84a6.mount: Deactivated successfully. Dec 13 15:52:01.261377 env[1570]: 2024-12-13 15:52:01.234 [INFO][4656] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" Dec 13 15:52:01.261377 env[1570]: 2024-12-13 15:52:01.235 [INFO][4656] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" iface="eth0" netns="/var/run/netns/cni-09e3aaad-f3e5-b98c-ca58-17a8edc045fc" Dec 13 15:52:01.261377 env[1570]: 2024-12-13 15:52:01.235 [INFO][4656] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" iface="eth0" netns="/var/run/netns/cni-09e3aaad-f3e5-b98c-ca58-17a8edc045fc" Dec 13 15:52:01.261377 env[1570]: 2024-12-13 15:52:01.235 [INFO][4656] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" iface="eth0" netns="/var/run/netns/cni-09e3aaad-f3e5-b98c-ca58-17a8edc045fc" Dec 13 15:52:01.261377 env[1570]: 2024-12-13 15:52:01.235 [INFO][4656] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" Dec 13 15:52:01.261377 env[1570]: 2024-12-13 15:52:01.235 [INFO][4656] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" Dec 13 15:52:01.261377 env[1570]: 2024-12-13 15:52:01.245 [INFO][4728] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" HandleID="k8s-pod-network.7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" Workload="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--lxqwx-eth0" Dec 13 15:52:01.261377 env[1570]: 2024-12-13 15:52:01.246 [INFO][4728] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:52:01.261377 env[1570]: 2024-12-13 15:52:01.254 [INFO][4728] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:52:01.261377 env[1570]: 2024-12-13 15:52:01.258 [WARNING][4728] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" HandleID="k8s-pod-network.7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" Workload="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--lxqwx-eth0" Dec 13 15:52:01.261377 env[1570]: 2024-12-13 15:52:01.258 [INFO][4728] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" HandleID="k8s-pod-network.7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" Workload="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--lxqwx-eth0" Dec 13 15:52:01.261377 env[1570]: 2024-12-13 15:52:01.260 [INFO][4728] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:52:01.261377 env[1570]: 2024-12-13 15:52:01.260 [INFO][4656] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" Dec 13 15:52:01.261900 env[1570]: time="2024-12-13T15:52:01.261457460Z" level=info msg="TearDown network for sandbox \"7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99\" successfully" Dec 13 15:52:01.261900 env[1570]: time="2024-12-13T15:52:01.261484627Z" level=info msg="StopPodSandbox for \"7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99\" returns successfully" Dec 13 15:52:01.262073 env[1570]: time="2024-12-13T15:52:01.262056779Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5fc856f8c8-lxqwx,Uid:f8f4d6d7-9983-47ab-aeca-6edc82b7ad2b,Namespace:calico-apiserver,Attempt:1,}" Dec 13 15:52:01.269220 env[1570]: 2024-12-13 15:52:01.235 [INFO][4657] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" Dec 13 15:52:01.269220 env[1570]: 2024-12-13 15:52:01.235 [INFO][4657] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" iface="eth0" netns="/var/run/netns/cni-3f95f3df-d0db-9c7b-ac83-f46a4e546ece" Dec 13 15:52:01.269220 env[1570]: 2024-12-13 15:52:01.235 [INFO][4657] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" iface="eth0" netns="/var/run/netns/cni-3f95f3df-d0db-9c7b-ac83-f46a4e546ece" Dec 13 15:52:01.269220 env[1570]: 2024-12-13 15:52:01.235 [INFO][4657] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" iface="eth0" netns="/var/run/netns/cni-3f95f3df-d0db-9c7b-ac83-f46a4e546ece" Dec 13 15:52:01.269220 env[1570]: 2024-12-13 15:52:01.235 [INFO][4657] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" Dec 13 15:52:01.269220 env[1570]: 2024-12-13 15:52:01.235 [INFO][4657] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" Dec 13 15:52:01.269220 env[1570]: 2024-12-13 15:52:01.247 [INFO][4729] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" HandleID="k8s-pod-network.e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" Workload="ci--3510.3.6--a--a4f471fe95-k8s-calico--kube--controllers--656bc8f995--2lkj6-eth0" Dec 13 15:52:01.269220 env[1570]: 2024-12-13 15:52:01.247 [INFO][4729] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:52:01.269220 env[1570]: 2024-12-13 15:52:01.260 [INFO][4729] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:52:01.269220 env[1570]: 2024-12-13 15:52:01.264 [WARNING][4729] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" HandleID="k8s-pod-network.e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" Workload="ci--3510.3.6--a--a4f471fe95-k8s-calico--kube--controllers--656bc8f995--2lkj6-eth0" Dec 13 15:52:01.269220 env[1570]: 2024-12-13 15:52:01.264 [INFO][4729] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" HandleID="k8s-pod-network.e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" Workload="ci--3510.3.6--a--a4f471fe95-k8s-calico--kube--controllers--656bc8f995--2lkj6-eth0" Dec 13 15:52:01.269220 env[1570]: 2024-12-13 15:52:01.267 [INFO][4729] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:52:01.269220 env[1570]: 2024-12-13 15:52:01.268 [INFO][4657] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" Dec 13 15:52:01.269533 env[1570]: time="2024-12-13T15:52:01.269282453Z" level=info msg="TearDown network for sandbox \"e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce\" successfully" Dec 13 15:52:01.269533 env[1570]: time="2024-12-13T15:52:01.269300881Z" level=info msg="StopPodSandbox for \"e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce\" returns successfully" Dec 13 15:52:01.269727 env[1570]: time="2024-12-13T15:52:01.269713682Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-656bc8f995-2lkj6,Uid:b97ba304-f837-40f1-b3de-a9b43217ec78,Namespace:calico-system,Attempt:1,}" Dec 13 15:52:01.307012 systemd[1]: run-netns-cni\x2d3f95f3df\x2dd0db\x2d9c7b\x2dac83\x2df46a4e546ece.mount: Deactivated successfully. Dec 13 15:52:01.307075 systemd[1]: run-netns-cni\x2d09e3aaad\x2df3e5\x2db98c\x2dca58\x2d17a8edc045fc.mount: Deactivated successfully. Dec 13 15:52:01.316810 systemd-networkd[1315]: calie158c05817b: Link UP Dec 13 15:52:01.372082 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 15:52:01.372151 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie158c05817b: link becomes ready Dec 13 15:52:01.372164 systemd-networkd[1315]: calie158c05817b: Gained carrier Dec 13 15:52:01.373416 systemd-networkd[1315]: cali8ef1f5d778f: Link UP Dec 13 15:52:01.373541 systemd-networkd[1315]: cali9dcd0562887: Link UP Dec 13 15:52:01.373647 systemd-networkd[1315]: calie03fa54f359: Link UP Dec 13 15:52:01.379912 env[1570]: 2024-12-13 15:52:01.276 [INFO][4765] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--9rnvx-eth0 coredns-7db6d8ff4d- kube-system bdd6c047-a986-425d-afa8-7e18fd8918ce 762 0 2024-12-13 15:51:29 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.6-a-a4f471fe95 coredns-7db6d8ff4d-9rnvx eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calie158c05817b [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="427ebc1662455ff35ae09379d804197ab1d4c5be00cdfa0d2c4fbe890ef04219" Namespace="kube-system" Pod="coredns-7db6d8ff4d-9rnvx" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--9rnvx-" Dec 13 15:52:01.379912 env[1570]: 2024-12-13 15:52:01.276 [INFO][4765] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="427ebc1662455ff35ae09379d804197ab1d4c5be00cdfa0d2c4fbe890ef04219" Namespace="kube-system" Pod="coredns-7db6d8ff4d-9rnvx" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--9rnvx-eth0" Dec 13 15:52:01.379912 env[1570]: 2024-12-13 15:52:01.290 [INFO][4848] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="427ebc1662455ff35ae09379d804197ab1d4c5be00cdfa0d2c4fbe890ef04219" HandleID="k8s-pod-network.427ebc1662455ff35ae09379d804197ab1d4c5be00cdfa0d2c4fbe890ef04219" Workload="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--9rnvx-eth0" Dec 13 15:52:01.379912 env[1570]: 2024-12-13 15:52:01.296 [INFO][4848] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="427ebc1662455ff35ae09379d804197ab1d4c5be00cdfa0d2c4fbe890ef04219" HandleID="k8s-pod-network.427ebc1662455ff35ae09379d804197ab1d4c5be00cdfa0d2c4fbe890ef04219" Workload="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--9rnvx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f6010), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.6-a-a4f471fe95", "pod":"coredns-7db6d8ff4d-9rnvx", "timestamp":"2024-12-13 15:52:01.290747511 +0000 UTC"}, Hostname:"ci-3510.3.6-a-a4f471fe95", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:52:01.379912 env[1570]: 2024-12-13 15:52:01.296 [INFO][4848] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:52:01.379912 env[1570]: 2024-12-13 15:52:01.296 [INFO][4848] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:52:01.379912 env[1570]: 2024-12-13 15:52:01.296 [INFO][4848] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-a4f471fe95' Dec 13 15:52:01.379912 env[1570]: 2024-12-13 15:52:01.297 [INFO][4848] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.427ebc1662455ff35ae09379d804197ab1d4c5be00cdfa0d2c4fbe890ef04219" host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:01.379912 env[1570]: 2024-12-13 15:52:01.300 [INFO][4848] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:01.379912 env[1570]: 2024-12-13 15:52:01.303 [INFO][4848] ipam/ipam.go 489: Trying affinity for 192.168.110.192/26 host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:01.379912 env[1570]: 2024-12-13 15:52:01.305 [INFO][4848] ipam/ipam.go 155: Attempting to load block cidr=192.168.110.192/26 host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:01.379912 env[1570]: 2024-12-13 15:52:01.306 [INFO][4848] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.110.192/26 host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:01.379912 env[1570]: 2024-12-13 15:52:01.306 [INFO][4848] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.110.192/26 handle="k8s-pod-network.427ebc1662455ff35ae09379d804197ab1d4c5be00cdfa0d2c4fbe890ef04219" host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:01.379912 env[1570]: 2024-12-13 15:52:01.307 [INFO][4848] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.427ebc1662455ff35ae09379d804197ab1d4c5be00cdfa0d2c4fbe890ef04219 Dec 13 15:52:01.379912 env[1570]: 2024-12-13 15:52:01.311 [INFO][4848] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.110.192/26 handle="k8s-pod-network.427ebc1662455ff35ae09379d804197ab1d4c5be00cdfa0d2c4fbe890ef04219" host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:01.379912 env[1570]: 2024-12-13 15:52:01.314 [INFO][4848] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.110.194/26] block=192.168.110.192/26 handle="k8s-pod-network.427ebc1662455ff35ae09379d804197ab1d4c5be00cdfa0d2c4fbe890ef04219" host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:01.379912 env[1570]: 2024-12-13 15:52:01.314 [INFO][4848] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.110.194/26] handle="k8s-pod-network.427ebc1662455ff35ae09379d804197ab1d4c5be00cdfa0d2c4fbe890ef04219" host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:01.379912 env[1570]: 2024-12-13 15:52:01.314 [INFO][4848] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:52:01.379912 env[1570]: 2024-12-13 15:52:01.314 [INFO][4848] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.110.194/26] IPv6=[] ContainerID="427ebc1662455ff35ae09379d804197ab1d4c5be00cdfa0d2c4fbe890ef04219" HandleID="k8s-pod-network.427ebc1662455ff35ae09379d804197ab1d4c5be00cdfa0d2c4fbe890ef04219" Workload="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--9rnvx-eth0" Dec 13 15:52:01.380333 env[1570]: 2024-12-13 15:52:01.315 [INFO][4765] cni-plugin/k8s.go 386: Populated endpoint ContainerID="427ebc1662455ff35ae09379d804197ab1d4c5be00cdfa0d2c4fbe890ef04219" Namespace="kube-system" Pod="coredns-7db6d8ff4d-9rnvx" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--9rnvx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--9rnvx-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"bdd6c047-a986-425d-afa8-7e18fd8918ce", ResourceVersion:"762", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 51, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-a4f471fe95", ContainerID:"", Pod:"coredns-7db6d8ff4d-9rnvx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie158c05817b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:52:01.380333 env[1570]: 2024-12-13 15:52:01.315 [INFO][4765] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.110.194/32] ContainerID="427ebc1662455ff35ae09379d804197ab1d4c5be00cdfa0d2c4fbe890ef04219" Namespace="kube-system" Pod="coredns-7db6d8ff4d-9rnvx" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--9rnvx-eth0" Dec 13 15:52:01.380333 env[1570]: 2024-12-13 15:52:01.315 [INFO][4765] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie158c05817b ContainerID="427ebc1662455ff35ae09379d804197ab1d4c5be00cdfa0d2c4fbe890ef04219" Namespace="kube-system" Pod="coredns-7db6d8ff4d-9rnvx" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--9rnvx-eth0" Dec 13 15:52:01.380333 env[1570]: 2024-12-13 15:52:01.372 [INFO][4765] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="427ebc1662455ff35ae09379d804197ab1d4c5be00cdfa0d2c4fbe890ef04219" Namespace="kube-system" Pod="coredns-7db6d8ff4d-9rnvx" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--9rnvx-eth0" Dec 13 15:52:01.380333 env[1570]: 2024-12-13 15:52:01.373 [INFO][4765] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="427ebc1662455ff35ae09379d804197ab1d4c5be00cdfa0d2c4fbe890ef04219" Namespace="kube-system" Pod="coredns-7db6d8ff4d-9rnvx" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--9rnvx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--9rnvx-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"bdd6c047-a986-425d-afa8-7e18fd8918ce", ResourceVersion:"762", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 51, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-a4f471fe95", ContainerID:"427ebc1662455ff35ae09379d804197ab1d4c5be00cdfa0d2c4fbe890ef04219", Pod:"coredns-7db6d8ff4d-9rnvx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie158c05817b", MAC:"76:d2:3d:86:4b:bd", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:52:01.380333 env[1570]: 2024-12-13 15:52:01.379 [INFO][4765] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="427ebc1662455ff35ae09379d804197ab1d4c5be00cdfa0d2c4fbe890ef04219" Namespace="kube-system" Pod="coredns-7db6d8ff4d-9rnvx" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--9rnvx-eth0" Dec 13 15:52:01.383000 audit[4915]: NETFILTER_CFG table=filter:104 family=2 entries=30 op=nft_register_chain pid=4915 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:52:01.383000 audit[4915]: SYSCALL arch=c000003e syscall=46 success=yes exit=17032 a0=3 a1=7ffe506237a0 a2=0 a3=7ffe5062378c items=0 ppid=4234 pid=4915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:01.383000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:52:01.386448 env[1570]: time="2024-12-13T15:52:01.386419499Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:52:01.386448 env[1570]: time="2024-12-13T15:52:01.386439685Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:52:01.386549 env[1570]: time="2024-12-13T15:52:01.386446660Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:52:01.386549 env[1570]: time="2024-12-13T15:52:01.386526114Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/427ebc1662455ff35ae09379d804197ab1d4c5be00cdfa0d2c4fbe890ef04219 pid=4923 runtime=io.containerd.runc.v2 Dec 13 15:52:01.394757 systemd[1]: Started cri-containerd-427ebc1662455ff35ae09379d804197ab1d4c5be00cdfa0d2c4fbe890ef04219.scope. Dec 13 15:52:01.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.407000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.407000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.428807 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9dcd0562887: link becomes ready Dec 13 15:52:01.428844 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie03fa54f359: link becomes ready Dec 13 15:52:01.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.427000 audit: BPF prog-id=169 op=LOAD Dec 13 15:52:01.427000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.427000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4923 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:01.427000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432376562633136363234353566663335616530393337396438303431 Dec 13 15:52:01.427000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.427000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4923 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:01.427000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432376562633136363234353566663335616530393337396438303431 Dec 13 15:52:01.427000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.427000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.427000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.427000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.427000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.427000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.427000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.429512 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8ef1f5d778f: link becomes ready Dec 13 15:52:01.427000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.427000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.427000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.427000 audit: BPF prog-id=170 op=LOAD Dec 13 15:52:01.427000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00008ea90 items=0 ppid=4923 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:01.427000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432376562633136363234353566663335616530393337396438303431 Dec 13 15:52:01.454000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.454000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.454000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.454000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.454000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.454000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.454000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.454000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.454000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.454000 audit: BPF prog-id=171 op=LOAD Dec 13 15:52:01.454000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00008ead8 items=0 ppid=4923 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:01.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432376562633136363234353566663335616530393337396438303431 Dec 13 15:52:01.454000 audit: BPF prog-id=171 op=UNLOAD Dec 13 15:52:01.454000 audit: BPF prog-id=170 op=UNLOAD Dec 13 15:52:01.454000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.454000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.454000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.454000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.454000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.454000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.454000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.454000 audit[4934]: AVC avc: denied { perfmon } for pid=4934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.454000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.454000 audit[4934]: AVC avc: denied { bpf } for pid=4934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.454000 audit: BPF prog-id=172 op=LOAD Dec 13 15:52:01.454000 audit[4934]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00008eee8 items=0 ppid=4923 pid=4934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:01.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432376562633136363234353566663335616530393337396438303431 Dec 13 15:52:01.456554 systemd-networkd[1315]: cali9dcd0562887: Gained carrier Dec 13 15:52:01.456687 systemd-networkd[1315]: calie03fa54f359: Gained carrier Dec 13 15:52:01.456888 systemd-networkd[1315]: cali8ef1f5d778f: Gained carrier Dec 13 15:52:01.463503 env[1570]: 2024-12-13 15:52:01.290 [INFO][4830] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--a4f471fe95-k8s-calico--kube--controllers--656bc8f995--2lkj6-eth0 calico-kube-controllers-656bc8f995- calico-system b97ba304-f837-40f1-b3de-a9b43217ec78 764 0 2024-12-13 15:51:36 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:656bc8f995 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.6-a-a4f471fe95 calico-kube-controllers-656bc8f995-2lkj6 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali9dcd0562887 [] []}} ContainerID="187127ace754a8cdbd1a8a5380439ee44098b2243f2a1bd476221b94edb59100" Namespace="calico-system" Pod="calico-kube-controllers-656bc8f995-2lkj6" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-calico--kube--controllers--656bc8f995--2lkj6-" Dec 13 15:52:01.463503 env[1570]: 2024-12-13 15:52:01.291 [INFO][4830] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="187127ace754a8cdbd1a8a5380439ee44098b2243f2a1bd476221b94edb59100" Namespace="calico-system" Pod="calico-kube-controllers-656bc8f995-2lkj6" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-calico--kube--controllers--656bc8f995--2lkj6-eth0" Dec 13 15:52:01.463503 env[1570]: 2024-12-13 15:52:01.308 [INFO][4886] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="187127ace754a8cdbd1a8a5380439ee44098b2243f2a1bd476221b94edb59100" HandleID="k8s-pod-network.187127ace754a8cdbd1a8a5380439ee44098b2243f2a1bd476221b94edb59100" Workload="ci--3510.3.6--a--a4f471fe95-k8s-calico--kube--controllers--656bc8f995--2lkj6-eth0" Dec 13 15:52:01.463503 env[1570]: 2024-12-13 15:52:01.314 [INFO][4886] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="187127ace754a8cdbd1a8a5380439ee44098b2243f2a1bd476221b94edb59100" HandleID="k8s-pod-network.187127ace754a8cdbd1a8a5380439ee44098b2243f2a1bd476221b94edb59100" Workload="ci--3510.3.6--a--a4f471fe95-k8s-calico--kube--controllers--656bc8f995--2lkj6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000050590), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.6-a-a4f471fe95", "pod":"calico-kube-controllers-656bc8f995-2lkj6", "timestamp":"2024-12-13 15:52:01.30870453 +0000 UTC"}, Hostname:"ci-3510.3.6-a-a4f471fe95", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:52:01.463503 env[1570]: 2024-12-13 15:52:01.314 [INFO][4886] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:52:01.463503 env[1570]: 2024-12-13 15:52:01.345 [INFO][4886] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:52:01.463503 env[1570]: 2024-12-13 15:52:01.345 [INFO][4886] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-a4f471fe95' Dec 13 15:52:01.463503 env[1570]: 2024-12-13 15:52:01.347 [INFO][4886] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.187127ace754a8cdbd1a8a5380439ee44098b2243f2a1bd476221b94edb59100" host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:01.463503 env[1570]: 2024-12-13 15:52:01.349 [INFO][4886] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:01.463503 env[1570]: 2024-12-13 15:52:01.352 [INFO][4886] ipam/ipam.go 489: Trying affinity for 192.168.110.192/26 host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:01.463503 env[1570]: 2024-12-13 15:52:01.353 [INFO][4886] ipam/ipam.go 155: Attempting to load block cidr=192.168.110.192/26 host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:01.463503 env[1570]: 2024-12-13 15:52:01.355 [INFO][4886] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.110.192/26 host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:01.463503 env[1570]: 2024-12-13 15:52:01.355 [INFO][4886] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.110.192/26 handle="k8s-pod-network.187127ace754a8cdbd1a8a5380439ee44098b2243f2a1bd476221b94edb59100" host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:01.463503 env[1570]: 2024-12-13 15:52:01.356 [INFO][4886] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.187127ace754a8cdbd1a8a5380439ee44098b2243f2a1bd476221b94edb59100 Dec 13 15:52:01.463503 env[1570]: 2024-12-13 15:52:01.358 [INFO][4886] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.110.192/26 handle="k8s-pod-network.187127ace754a8cdbd1a8a5380439ee44098b2243f2a1bd476221b94edb59100" host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:01.463503 env[1570]: 2024-12-13 15:52:01.362 [INFO][4886] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.110.197/26] block=192.168.110.192/26 handle="k8s-pod-network.187127ace754a8cdbd1a8a5380439ee44098b2243f2a1bd476221b94edb59100" host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:01.463503 env[1570]: 2024-12-13 15:52:01.362 [INFO][4886] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.110.197/26] handle="k8s-pod-network.187127ace754a8cdbd1a8a5380439ee44098b2243f2a1bd476221b94edb59100" host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:01.463503 env[1570]: 2024-12-13 15:52:01.362 [INFO][4886] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:52:01.463503 env[1570]: 2024-12-13 15:52:01.362 [INFO][4886] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.110.197/26] IPv6=[] ContainerID="187127ace754a8cdbd1a8a5380439ee44098b2243f2a1bd476221b94edb59100" HandleID="k8s-pod-network.187127ace754a8cdbd1a8a5380439ee44098b2243f2a1bd476221b94edb59100" Workload="ci--3510.3.6--a--a4f471fe95-k8s-calico--kube--controllers--656bc8f995--2lkj6-eth0" Dec 13 15:52:01.463946 env[1570]: 2024-12-13 15:52:01.363 [INFO][4830] cni-plugin/k8s.go 386: Populated endpoint ContainerID="187127ace754a8cdbd1a8a5380439ee44098b2243f2a1bd476221b94edb59100" Namespace="calico-system" Pod="calico-kube-controllers-656bc8f995-2lkj6" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-calico--kube--controllers--656bc8f995--2lkj6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--a4f471fe95-k8s-calico--kube--controllers--656bc8f995--2lkj6-eth0", GenerateName:"calico-kube-controllers-656bc8f995-", Namespace:"calico-system", SelfLink:"", UID:"b97ba304-f837-40f1-b3de-a9b43217ec78", ResourceVersion:"764", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 51, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"656bc8f995", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-a4f471fe95", ContainerID:"", Pod:"calico-kube-controllers-656bc8f995-2lkj6", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.110.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali9dcd0562887", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:52:01.463946 env[1570]: 2024-12-13 15:52:01.363 [INFO][4830] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.110.197/32] ContainerID="187127ace754a8cdbd1a8a5380439ee44098b2243f2a1bd476221b94edb59100" Namespace="calico-system" Pod="calico-kube-controllers-656bc8f995-2lkj6" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-calico--kube--controllers--656bc8f995--2lkj6-eth0" Dec 13 15:52:01.463946 env[1570]: 2024-12-13 15:52:01.363 [INFO][4830] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9dcd0562887 ContainerID="187127ace754a8cdbd1a8a5380439ee44098b2243f2a1bd476221b94edb59100" Namespace="calico-system" Pod="calico-kube-controllers-656bc8f995-2lkj6" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-calico--kube--controllers--656bc8f995--2lkj6-eth0" Dec 13 15:52:01.463946 env[1570]: 2024-12-13 15:52:01.455 [INFO][4830] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="187127ace754a8cdbd1a8a5380439ee44098b2243f2a1bd476221b94edb59100" Namespace="calico-system" Pod="calico-kube-controllers-656bc8f995-2lkj6" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-calico--kube--controllers--656bc8f995--2lkj6-eth0" Dec 13 15:52:01.463946 env[1570]: 2024-12-13 15:52:01.456 [INFO][4830] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="187127ace754a8cdbd1a8a5380439ee44098b2243f2a1bd476221b94edb59100" Namespace="calico-system" Pod="calico-kube-controllers-656bc8f995-2lkj6" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-calico--kube--controllers--656bc8f995--2lkj6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--a4f471fe95-k8s-calico--kube--controllers--656bc8f995--2lkj6-eth0", GenerateName:"calico-kube-controllers-656bc8f995-", Namespace:"calico-system", SelfLink:"", UID:"b97ba304-f837-40f1-b3de-a9b43217ec78", ResourceVersion:"764", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 51, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"656bc8f995", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-a4f471fe95", ContainerID:"187127ace754a8cdbd1a8a5380439ee44098b2243f2a1bd476221b94edb59100", Pod:"calico-kube-controllers-656bc8f995-2lkj6", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.110.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali9dcd0562887", MAC:"8e:1d:36:23:11:c1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:52:01.463946 env[1570]: 2024-12-13 15:52:01.462 [INFO][4830] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="187127ace754a8cdbd1a8a5380439ee44098b2243f2a1bd476221b94edb59100" Namespace="calico-system" Pod="calico-kube-controllers-656bc8f995-2lkj6" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-calico--kube--controllers--656bc8f995--2lkj6-eth0" Dec 13 15:52:01.464110 env[1570]: 2024-12-13 15:52:01.282 [INFO][4800] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--lxqwx-eth0 calico-apiserver-5fc856f8c8- calico-apiserver f8f4d6d7-9983-47ab-aeca-6edc82b7ad2b 763 0 2024-12-13 15:51:36 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5fc856f8c8 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.6-a-a4f471fe95 calico-apiserver-5fc856f8c8-lxqwx eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calie03fa54f359 [] []}} ContainerID="3809a76cdd6f4c0d5fddc67dffda192b36016307706528db74f4e3d589b6fd86" Namespace="calico-apiserver" Pod="calico-apiserver-5fc856f8c8-lxqwx" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--lxqwx-" Dec 13 15:52:01.464110 env[1570]: 2024-12-13 15:52:01.282 [INFO][4800] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="3809a76cdd6f4c0d5fddc67dffda192b36016307706528db74f4e3d589b6fd86" Namespace="calico-apiserver" Pod="calico-apiserver-5fc856f8c8-lxqwx" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--lxqwx-eth0" Dec 13 15:52:01.464110 env[1570]: 2024-12-13 15:52:01.301 [INFO][4874] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3809a76cdd6f4c0d5fddc67dffda192b36016307706528db74f4e3d589b6fd86" HandleID="k8s-pod-network.3809a76cdd6f4c0d5fddc67dffda192b36016307706528db74f4e3d589b6fd86" Workload="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--lxqwx-eth0" Dec 13 15:52:01.464110 env[1570]: 2024-12-13 15:52:01.306 [INFO][4874] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3809a76cdd6f4c0d5fddc67dffda192b36016307706528db74f4e3d589b6fd86" HandleID="k8s-pod-network.3809a76cdd6f4c0d5fddc67dffda192b36016307706528db74f4e3d589b6fd86" Workload="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--lxqwx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000305560), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.6-a-a4f471fe95", "pod":"calico-apiserver-5fc856f8c8-lxqwx", "timestamp":"2024-12-13 15:52:01.301829991 +0000 UTC"}, Hostname:"ci-3510.3.6-a-a4f471fe95", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:52:01.464110 env[1570]: 2024-12-13 15:52:01.306 [INFO][4874] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:52:01.464110 env[1570]: 2024-12-13 15:52:01.329 [INFO][4874] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:52:01.464110 env[1570]: 2024-12-13 15:52:01.330 [INFO][4874] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-a4f471fe95' Dec 13 15:52:01.464110 env[1570]: 2024-12-13 15:52:01.331 [INFO][4874] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3809a76cdd6f4c0d5fddc67dffda192b36016307706528db74f4e3d589b6fd86" host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:01.464110 env[1570]: 2024-12-13 15:52:01.333 [INFO][4874] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:01.464110 env[1570]: 2024-12-13 15:52:01.336 [INFO][4874] ipam/ipam.go 489: Trying affinity for 192.168.110.192/26 host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:01.464110 env[1570]: 2024-12-13 15:52:01.337 [INFO][4874] ipam/ipam.go 155: Attempting to load block cidr=192.168.110.192/26 host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:01.464110 env[1570]: 2024-12-13 15:52:01.339 [INFO][4874] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.110.192/26 host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:01.464110 env[1570]: 2024-12-13 15:52:01.339 [INFO][4874] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.110.192/26 handle="k8s-pod-network.3809a76cdd6f4c0d5fddc67dffda192b36016307706528db74f4e3d589b6fd86" host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:01.464110 env[1570]: 2024-12-13 15:52:01.340 [INFO][4874] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.3809a76cdd6f4c0d5fddc67dffda192b36016307706528db74f4e3d589b6fd86 Dec 13 15:52:01.464110 env[1570]: 2024-12-13 15:52:01.343 [INFO][4874] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.110.192/26 handle="k8s-pod-network.3809a76cdd6f4c0d5fddc67dffda192b36016307706528db74f4e3d589b6fd86" host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:01.464110 env[1570]: 2024-12-13 15:52:01.345 [INFO][4874] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.110.196/26] block=192.168.110.192/26 handle="k8s-pod-network.3809a76cdd6f4c0d5fddc67dffda192b36016307706528db74f4e3d589b6fd86" host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:01.464110 env[1570]: 2024-12-13 15:52:01.345 [INFO][4874] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.110.196/26] handle="k8s-pod-network.3809a76cdd6f4c0d5fddc67dffda192b36016307706528db74f4e3d589b6fd86" host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:01.464110 env[1570]: 2024-12-13 15:52:01.345 [INFO][4874] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:52:01.464110 env[1570]: 2024-12-13 15:52:01.345 [INFO][4874] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.110.196/26] IPv6=[] ContainerID="3809a76cdd6f4c0d5fddc67dffda192b36016307706528db74f4e3d589b6fd86" HandleID="k8s-pod-network.3809a76cdd6f4c0d5fddc67dffda192b36016307706528db74f4e3d589b6fd86" Workload="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--lxqwx-eth0" Dec 13 15:52:01.464461 env[1570]: 2024-12-13 15:52:01.346 [INFO][4800] cni-plugin/k8s.go 386: Populated endpoint ContainerID="3809a76cdd6f4c0d5fddc67dffda192b36016307706528db74f4e3d589b6fd86" Namespace="calico-apiserver" Pod="calico-apiserver-5fc856f8c8-lxqwx" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--lxqwx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--lxqwx-eth0", GenerateName:"calico-apiserver-5fc856f8c8-", Namespace:"calico-apiserver", SelfLink:"", UID:"f8f4d6d7-9983-47ab-aeca-6edc82b7ad2b", ResourceVersion:"763", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 51, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5fc856f8c8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-a4f471fe95", ContainerID:"", Pod:"calico-apiserver-5fc856f8c8-lxqwx", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie03fa54f359", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:52:01.464461 env[1570]: 2024-12-13 15:52:01.346 [INFO][4800] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.110.196/32] ContainerID="3809a76cdd6f4c0d5fddc67dffda192b36016307706528db74f4e3d589b6fd86" Namespace="calico-apiserver" Pod="calico-apiserver-5fc856f8c8-lxqwx" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--lxqwx-eth0" Dec 13 15:52:01.464461 env[1570]: 2024-12-13 15:52:01.346 [INFO][4800] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie03fa54f359 ContainerID="3809a76cdd6f4c0d5fddc67dffda192b36016307706528db74f4e3d589b6fd86" Namespace="calico-apiserver" Pod="calico-apiserver-5fc856f8c8-lxqwx" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--lxqwx-eth0" Dec 13 15:52:01.464461 env[1570]: 2024-12-13 15:52:01.429 [INFO][4800] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3809a76cdd6f4c0d5fddc67dffda192b36016307706528db74f4e3d589b6fd86" Namespace="calico-apiserver" Pod="calico-apiserver-5fc856f8c8-lxqwx" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--lxqwx-eth0" Dec 13 15:52:01.464461 env[1570]: 2024-12-13 15:52:01.455 [INFO][4800] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="3809a76cdd6f4c0d5fddc67dffda192b36016307706528db74f4e3d589b6fd86" Namespace="calico-apiserver" Pod="calico-apiserver-5fc856f8c8-lxqwx" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--lxqwx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--lxqwx-eth0", GenerateName:"calico-apiserver-5fc856f8c8-", Namespace:"calico-apiserver", SelfLink:"", UID:"f8f4d6d7-9983-47ab-aeca-6edc82b7ad2b", ResourceVersion:"763", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 51, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5fc856f8c8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-a4f471fe95", ContainerID:"3809a76cdd6f4c0d5fddc67dffda192b36016307706528db74f4e3d589b6fd86", Pod:"calico-apiserver-5fc856f8c8-lxqwx", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie03fa54f359", MAC:"d6:17:d3:84:37:50", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:52:01.464461 env[1570]: 2024-12-13 15:52:01.462 [INFO][4800] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="3809a76cdd6f4c0d5fddc67dffda192b36016307706528db74f4e3d589b6fd86" Namespace="calico-apiserver" Pod="calico-apiserver-5fc856f8c8-lxqwx" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--lxqwx-eth0" Dec 13 15:52:01.464685 env[1570]: 2024-12-13 15:52:01.277 [INFO][4779] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--xbz48-eth0 calico-apiserver-5fc856f8c8- calico-apiserver 6317dcc4-4669-49e0-96da-846071dd95cb 761 0 2024-12-13 15:51:36 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5fc856f8c8 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.6-a-a4f471fe95 calico-apiserver-5fc856f8c8-xbz48 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali8ef1f5d778f [] []}} ContainerID="18c2adb1f0474940eb5fc872e6f23f6ee80628120650a0b40000239f83d644c0" Namespace="calico-apiserver" Pod="calico-apiserver-5fc856f8c8-xbz48" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--xbz48-" Dec 13 15:52:01.464685 env[1570]: 2024-12-13 15:52:01.278 [INFO][4779] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="18c2adb1f0474940eb5fc872e6f23f6ee80628120650a0b40000239f83d644c0" Namespace="calico-apiserver" Pod="calico-apiserver-5fc856f8c8-xbz48" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--xbz48-eth0" Dec 13 15:52:01.464685 env[1570]: 2024-12-13 15:52:01.294 [INFO][4853] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="18c2adb1f0474940eb5fc872e6f23f6ee80628120650a0b40000239f83d644c0" HandleID="k8s-pod-network.18c2adb1f0474940eb5fc872e6f23f6ee80628120650a0b40000239f83d644c0" Workload="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--xbz48-eth0" Dec 13 15:52:01.464685 env[1570]: 2024-12-13 15:52:01.300 [INFO][4853] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="18c2adb1f0474940eb5fc872e6f23f6ee80628120650a0b40000239f83d644c0" HandleID="k8s-pod-network.18c2adb1f0474940eb5fc872e6f23f6ee80628120650a0b40000239f83d644c0" Workload="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--xbz48-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000050430), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.6-a-a4f471fe95", "pod":"calico-apiserver-5fc856f8c8-xbz48", "timestamp":"2024-12-13 15:52:01.29464923 +0000 UTC"}, Hostname:"ci-3510.3.6-a-a4f471fe95", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:52:01.464685 env[1570]: 2024-12-13 15:52:01.300 [INFO][4853] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:52:01.464685 env[1570]: 2024-12-13 15:52:01.314 [INFO][4853] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:52:01.464685 env[1570]: 2024-12-13 15:52:01.314 [INFO][4853] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-a4f471fe95' Dec 13 15:52:01.464685 env[1570]: 2024-12-13 15:52:01.315 [INFO][4853] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.18c2adb1f0474940eb5fc872e6f23f6ee80628120650a0b40000239f83d644c0" host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:01.464685 env[1570]: 2024-12-13 15:52:01.318 [INFO][4853] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:01.464685 env[1570]: 2024-12-13 15:52:01.320 [INFO][4853] ipam/ipam.go 489: Trying affinity for 192.168.110.192/26 host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:01.464685 env[1570]: 2024-12-13 15:52:01.322 [INFO][4853] ipam/ipam.go 155: Attempting to load block cidr=192.168.110.192/26 host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:01.464685 env[1570]: 2024-12-13 15:52:01.323 [INFO][4853] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.110.192/26 host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:01.464685 env[1570]: 2024-12-13 15:52:01.323 [INFO][4853] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.110.192/26 handle="k8s-pod-network.18c2adb1f0474940eb5fc872e6f23f6ee80628120650a0b40000239f83d644c0" host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:01.464685 env[1570]: 2024-12-13 15:52:01.324 [INFO][4853] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.18c2adb1f0474940eb5fc872e6f23f6ee80628120650a0b40000239f83d644c0 Dec 13 15:52:01.464685 env[1570]: 2024-12-13 15:52:01.327 [INFO][4853] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.110.192/26 handle="k8s-pod-network.18c2adb1f0474940eb5fc872e6f23f6ee80628120650a0b40000239f83d644c0" host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:01.464685 env[1570]: 2024-12-13 15:52:01.329 [INFO][4853] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.110.195/26] block=192.168.110.192/26 handle="k8s-pod-network.18c2adb1f0474940eb5fc872e6f23f6ee80628120650a0b40000239f83d644c0" host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:01.464685 env[1570]: 2024-12-13 15:52:01.329 [INFO][4853] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.110.195/26] handle="k8s-pod-network.18c2adb1f0474940eb5fc872e6f23f6ee80628120650a0b40000239f83d644c0" host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:01.464685 env[1570]: 2024-12-13 15:52:01.329 [INFO][4853] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:52:01.464685 env[1570]: 2024-12-13 15:52:01.329 [INFO][4853] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.110.195/26] IPv6=[] ContainerID="18c2adb1f0474940eb5fc872e6f23f6ee80628120650a0b40000239f83d644c0" HandleID="k8s-pod-network.18c2adb1f0474940eb5fc872e6f23f6ee80628120650a0b40000239f83d644c0" Workload="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--xbz48-eth0" Dec 13 15:52:01.465027 env[1570]: 2024-12-13 15:52:01.330 [INFO][4779] cni-plugin/k8s.go 386: Populated endpoint ContainerID="18c2adb1f0474940eb5fc872e6f23f6ee80628120650a0b40000239f83d644c0" Namespace="calico-apiserver" Pod="calico-apiserver-5fc856f8c8-xbz48" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--xbz48-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--xbz48-eth0", GenerateName:"calico-apiserver-5fc856f8c8-", Namespace:"calico-apiserver", SelfLink:"", UID:"6317dcc4-4669-49e0-96da-846071dd95cb", ResourceVersion:"761", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 51, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5fc856f8c8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-a4f471fe95", ContainerID:"", Pod:"calico-apiserver-5fc856f8c8-xbz48", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8ef1f5d778f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:52:01.465027 env[1570]: 2024-12-13 15:52:01.330 [INFO][4779] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.110.195/32] ContainerID="18c2adb1f0474940eb5fc872e6f23f6ee80628120650a0b40000239f83d644c0" Namespace="calico-apiserver" Pod="calico-apiserver-5fc856f8c8-xbz48" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--xbz48-eth0" Dec 13 15:52:01.465027 env[1570]: 2024-12-13 15:52:01.330 [INFO][4779] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8ef1f5d778f ContainerID="18c2adb1f0474940eb5fc872e6f23f6ee80628120650a0b40000239f83d644c0" Namespace="calico-apiserver" Pod="calico-apiserver-5fc856f8c8-xbz48" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--xbz48-eth0" Dec 13 15:52:01.465027 env[1570]: 2024-12-13 15:52:01.456 [INFO][4779] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="18c2adb1f0474940eb5fc872e6f23f6ee80628120650a0b40000239f83d644c0" Namespace="calico-apiserver" Pod="calico-apiserver-5fc856f8c8-xbz48" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--xbz48-eth0" Dec 13 15:52:01.465027 env[1570]: 2024-12-13 15:52:01.456 [INFO][4779] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="18c2adb1f0474940eb5fc872e6f23f6ee80628120650a0b40000239f83d644c0" Namespace="calico-apiserver" Pod="calico-apiserver-5fc856f8c8-xbz48" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--xbz48-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--xbz48-eth0", GenerateName:"calico-apiserver-5fc856f8c8-", Namespace:"calico-apiserver", SelfLink:"", UID:"6317dcc4-4669-49e0-96da-846071dd95cb", ResourceVersion:"761", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 51, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5fc856f8c8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-a4f471fe95", ContainerID:"18c2adb1f0474940eb5fc872e6f23f6ee80628120650a0b40000239f83d644c0", Pod:"calico-apiserver-5fc856f8c8-xbz48", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8ef1f5d778f", MAC:"ae:4e:0f:73:ea:cf", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:52:01.465027 env[1570]: 2024-12-13 15:52:01.463 [INFO][4779] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="18c2adb1f0474940eb5fc872e6f23f6ee80628120650a0b40000239f83d644c0" Namespace="calico-apiserver" Pod="calico-apiserver-5fc856f8c8-xbz48" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--xbz48-eth0" Dec 13 15:52:01.467000 audit[4993]: NETFILTER_CFG table=filter:105 family=2 entries=42 op=nft_register_chain pid=4993 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:52:01.467000 audit[4993]: SYSCALL arch=c000003e syscall=46 success=yes exit=21524 a0=3 a1=7ffd248f47f0 a2=0 a3=7ffd248f47dc items=0 ppid=4234 pid=4993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:01.467000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:52:01.469152 env[1570]: time="2024-12-13T15:52:01.468974119Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:52:01.469152 env[1570]: time="2024-12-13T15:52:01.469009544Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:52:01.469152 env[1570]: time="2024-12-13T15:52:01.469016621Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:52:01.469152 env[1570]: time="2024-12-13T15:52:01.469084743Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/187127ace754a8cdbd1a8a5380439ee44098b2243f2a1bd476221b94edb59100 pid=4999 runtime=io.containerd.runc.v2 Dec 13 15:52:01.469448 env[1570]: time="2024-12-13T15:52:01.469423674Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:52:01.469448 env[1570]: time="2024-12-13T15:52:01.469440457Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:52:01.469501 env[1570]: time="2024-12-13T15:52:01.469447028Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:52:01.469543 env[1570]: time="2024-12-13T15:52:01.469521502Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3809a76cdd6f4c0d5fddc67dffda192b36016307706528db74f4e3d589b6fd86 pid=5008 runtime=io.containerd.runc.v2 Dec 13 15:52:01.469877 env[1570]: time="2024-12-13T15:52:01.469852157Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:52:01.469877 env[1570]: time="2024-12-13T15:52:01.469869183Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:52:01.469948 env[1570]: time="2024-12-13T15:52:01.469875439Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:52:01.469948 env[1570]: time="2024-12-13T15:52:01.469935100Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/18c2adb1f0474940eb5fc872e6f23f6ee80628120650a0b40000239f83d644c0 pid=5016 runtime=io.containerd.runc.v2 Dec 13 15:52:01.475953 env[1570]: time="2024-12-13T15:52:01.475912295Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-9rnvx,Uid:bdd6c047-a986-425d-afa8-7e18fd8918ce,Namespace:kube-system,Attempt:1,} returns sandbox id \"427ebc1662455ff35ae09379d804197ab1d4c5be00cdfa0d2c4fbe890ef04219\"" Dec 13 15:52:01.476170 systemd[1]: Started cri-containerd-187127ace754a8cdbd1a8a5380439ee44098b2243f2a1bd476221b94edb59100.scope. Dec 13 15:52:01.478544 systemd[1]: Started cri-containerd-18c2adb1f0474940eb5fc872e6f23f6ee80628120650a0b40000239f83d644c0.scope. Dec 13 15:52:01.479393 systemd[1]: Started cri-containerd-3809a76cdd6f4c0d5fddc67dffda192b36016307706528db74f4e3d589b6fd86.scope. Dec 13 15:52:01.480025 env[1570]: time="2024-12-13T15:52:01.479997761Z" level=info msg="CreateContainer within sandbox \"427ebc1662455ff35ae09379d804197ab1d4c5be00cdfa0d2c4fbe890ef04219\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 15:52:01.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit: BPF prog-id=173 op=LOAD Dec 13 15:52:01.483000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[5033]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4999 pid=5033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:01.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138373132376163653735346138636462643161386135333830343339 Dec 13 15:52:01.483000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[5033]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4999 pid=5033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:01.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138373132376163653735346138636462643161386135333830343339 Dec 13 15:52:01.483000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit: BPF prog-id=174 op=LOAD Dec 13 15:52:01.483000 audit[5033]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000321b10 items=0 ppid=4999 pid=5033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:01.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138373132376163653735346138636462643161386135333830343339 Dec 13 15:52:01.483000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit: BPF prog-id=175 op=LOAD Dec 13 15:52:01.483000 audit[5033]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000321b58 items=0 ppid=4999 pid=5033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:01.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138373132376163653735346138636462643161386135333830343339 Dec 13 15:52:01.483000 audit: BPF prog-id=175 op=UNLOAD Dec 13 15:52:01.483000 audit: BPF prog-id=174 op=UNLOAD Dec 13 15:52:01.483000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[5033]: AVC avc: denied { perfmon } for pid=5033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit[5033]: AVC avc: denied { bpf } for pid=5033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.483000 audit: BPF prog-id=176 op=LOAD Dec 13 15:52:01.483000 audit[5033]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000321f68 items=0 ppid=4999 pid=5033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:01.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138373132376163653735346138636462643161386135333830343339 Dec 13 15:52:01.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit: BPF prog-id=177 op=LOAD Dec 13 15:52:01.484000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[5037]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5016 pid=5037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:01.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138633261646231663034373439343065623566633837326536663233 Dec 13 15:52:01.484000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[5037]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=5016 pid=5037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:01.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138633261646231663034373439343065623566633837326536663233 Dec 13 15:52:01.484000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit: BPF prog-id=178 op=LOAD Dec 13 15:52:01.484000 audit[5037]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000096a50 items=0 ppid=5016 pid=5037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:01.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138633261646231663034373439343065623566633837326536663233 Dec 13 15:52:01.484000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit: BPF prog-id=179 op=LOAD Dec 13 15:52:01.484000 audit[5037]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000096a98 items=0 ppid=5016 pid=5037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:01.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138633261646231663034373439343065623566633837326536663233 Dec 13 15:52:01.484000 audit: BPF prog-id=179 op=UNLOAD Dec 13 15:52:01.484000 audit: BPF prog-id=178 op=UNLOAD Dec 13 15:52:01.484000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.484000 audit: BPF prog-id=180 op=LOAD Dec 13 15:52:01.484000 audit[5037]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000096ea8 items=0 ppid=5016 pid=5037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:01.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138633261646231663034373439343065623566633837326536663233 Dec 13 15:52:01.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit: BPF prog-id=181 op=LOAD Dec 13 15:52:01.485000 audit[5034]: AVC avc: denied { bpf } for pid=5034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[5034]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5008 pid=5034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:01.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338303961373663646436663463306435666464633637646666646131 Dec 13 15:52:01.485000 audit[5034]: AVC avc: denied { perfmon } for pid=5034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[5034]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=5008 pid=5034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:01.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338303961373663646436663463306435666464633637646666646131 Dec 13 15:52:01.485000 audit[5034]: AVC avc: denied { bpf } for pid=5034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[5034]: AVC avc: denied { bpf } for pid=5034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[5034]: AVC avc: denied { bpf } for pid=5034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[5034]: AVC avc: denied { perfmon } for pid=5034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[5034]: AVC avc: denied { perfmon } for pid=5034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[5034]: AVC avc: denied { perfmon } for pid=5034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[5034]: AVC avc: denied { perfmon } for pid=5034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[5034]: AVC avc: denied { perfmon } for pid=5034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[5034]: AVC avc: denied { bpf } for pid=5034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[5034]: AVC avc: denied { bpf } for pid=5034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit: BPF prog-id=182 op=LOAD Dec 13 15:52:01.485000 audit[5034]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001bd330 items=0 ppid=5008 pid=5034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:01.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338303961373663646436663463306435666464633637646666646131 Dec 13 15:52:01.485000 audit[5034]: AVC avc: denied { bpf } for pid=5034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[5034]: AVC avc: denied { bpf } for pid=5034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[5034]: AVC avc: denied { perfmon } for pid=5034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[5034]: AVC avc: denied { perfmon } for pid=5034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[5034]: AVC avc: denied { perfmon } for pid=5034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[5034]: AVC avc: denied { perfmon } for pid=5034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[5034]: AVC avc: denied { perfmon } for pid=5034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[5034]: AVC avc: denied { bpf } for pid=5034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[5034]: AVC avc: denied { bpf } for pid=5034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit: BPF prog-id=183 op=LOAD Dec 13 15:52:01.485000 audit[5034]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001bd378 items=0 ppid=5008 pid=5034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:01.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338303961373663646436663463306435666464633637646666646131 Dec 13 15:52:01.485000 audit: BPF prog-id=183 op=UNLOAD Dec 13 15:52:01.485000 audit: BPF prog-id=182 op=UNLOAD Dec 13 15:52:01.485000 audit[5034]: AVC avc: denied { bpf } for pid=5034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[5034]: AVC avc: denied { bpf } for pid=5034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[5034]: AVC avc: denied { bpf } for pid=5034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[5034]: AVC avc: denied { perfmon } for pid=5034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[5034]: AVC avc: denied { perfmon } for pid=5034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[5034]: AVC avc: denied { perfmon } for pid=5034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[5034]: AVC avc: denied { perfmon } for pid=5034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[5034]: AVC avc: denied { perfmon } for pid=5034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[5034]: AVC avc: denied { bpf } for pid=5034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit[5034]: AVC avc: denied { bpf } for pid=5034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.485000 audit: BPF prog-id=184 op=LOAD Dec 13 15:52:01.485000 audit[5034]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001bd788 items=0 ppid=5008 pid=5034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:01.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338303961373663646436663463306435666464633637646666646131 Dec 13 15:52:01.486000 audit[5091]: NETFILTER_CFG table=filter:106 family=2 entries=84 op=nft_register_chain pid=5091 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:52:01.486000 audit[5091]: SYSCALL arch=c000003e syscall=46 success=yes exit=47336 a0=3 a1=7ffce4544cf0 a2=0 a3=7ffce4544cdc items=0 ppid=4234 pid=5091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:01.486000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:52:01.490350 env[1570]: time="2024-12-13T15:52:01.486220376Z" level=info msg="CreateContainer within sandbox \"427ebc1662455ff35ae09379d804197ab1d4c5be00cdfa0d2c4fbe890ef04219\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"ba964b91d576786bedc7575e2fa0d5372cea59367f7f007fa0deee931168353b\"" Dec 13 15:52:01.490350 env[1570]: time="2024-12-13T15:52:01.486537557Z" level=info msg="StartContainer for \"ba964b91d576786bedc7575e2fa0d5372cea59367f7f007fa0deee931168353b\"" Dec 13 15:52:01.493886 systemd[1]: Started cri-containerd-ba964b91d576786bedc7575e2fa0d5372cea59367f7f007fa0deee931168353b.scope. Dec 13 15:52:01.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.499000 audit: BPF prog-id=185 op=LOAD Dec 13 15:52:01.499000 audit[5099]: AVC avc: denied { bpf } for pid=5099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.499000 audit[5099]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4923 pid=5099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:01.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261393634623931643537363738366265646337353735653266613064 Dec 13 15:52:01.499000 audit[5099]: AVC avc: denied { perfmon } for pid=5099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.499000 audit[5099]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=4923 pid=5099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:01.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261393634623931643537363738366265646337353735653266613064 Dec 13 15:52:01.500000 audit[5099]: AVC avc: denied { bpf } for pid=5099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.500000 audit[5099]: AVC avc: denied { bpf } for pid=5099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.500000 audit[5099]: AVC avc: denied { bpf } for pid=5099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.500000 audit[5099]: AVC avc: denied { perfmon } for pid=5099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.500000 audit[5099]: AVC avc: denied { perfmon } for pid=5099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.500000 audit[5099]: AVC avc: denied { perfmon } for pid=5099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.500000 audit[5099]: AVC avc: denied { perfmon } for pid=5099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.500000 audit[5099]: AVC avc: denied { perfmon } for pid=5099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.500000 audit[5099]: AVC avc: denied { bpf } for pid=5099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.500000 audit[5099]: AVC avc: denied { bpf } for pid=5099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.500000 audit: BPF prog-id=186 op=LOAD Dec 13 15:52:01.500000 audit[5099]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003a0c10 items=0 ppid=4923 pid=5099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:01.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261393634623931643537363738366265646337353735653266613064 Dec 13 15:52:01.500000 audit[5099]: AVC avc: denied { bpf } for pid=5099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.500000 audit[5099]: AVC avc: denied { bpf } for pid=5099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.500000 audit[5099]: AVC avc: denied { perfmon } for pid=5099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.500000 audit[5099]: AVC avc: denied { perfmon } for pid=5099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.500000 audit[5099]: AVC avc: denied { perfmon } for pid=5099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.500000 audit[5099]: AVC avc: denied { perfmon } for pid=5099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.500000 audit[5099]: AVC avc: denied { perfmon } for pid=5099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.500000 audit[5099]: AVC avc: denied { bpf } for pid=5099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.500000 audit[5099]: AVC avc: denied { bpf } for pid=5099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.500000 audit: BPF prog-id=187 op=LOAD Dec 13 15:52:01.500000 audit[5099]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003a0c58 items=0 ppid=4923 pid=5099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:01.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261393634623931643537363738366265646337353735653266613064 Dec 13 15:52:01.500000 audit: BPF prog-id=187 op=UNLOAD Dec 13 15:52:01.500000 audit: BPF prog-id=186 op=UNLOAD Dec 13 15:52:01.500000 audit[5099]: AVC avc: denied { bpf } for pid=5099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.500000 audit[5099]: AVC avc: denied { bpf } for pid=5099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.500000 audit[5099]: AVC avc: denied { bpf } for pid=5099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.500000 audit[5099]: AVC avc: denied { perfmon } for pid=5099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.500000 audit[5099]: AVC avc: denied { perfmon } for pid=5099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.500000 audit[5099]: AVC avc: denied { perfmon } for pid=5099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.500000 audit[5099]: AVC avc: denied { perfmon } for pid=5099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.500000 audit[5099]: AVC avc: denied { perfmon } for pid=5099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.500000 audit[5099]: AVC avc: denied { bpf } for pid=5099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.500000 audit[5099]: AVC avc: denied { bpf } for pid=5099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:01.500000 audit: BPF prog-id=188 op=LOAD Dec 13 15:52:01.500000 audit[5099]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003a1068 items=0 ppid=4923 pid=5099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:01.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261393634623931643537363738366265646337353735653266613064 Dec 13 15:52:01.503105 env[1570]: time="2024-12-13T15:52:01.502320524Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-656bc8f995-2lkj6,Uid:b97ba304-f837-40f1-b3de-a9b43217ec78,Namespace:calico-system,Attempt:1,} returns sandbox id \"187127ace754a8cdbd1a8a5380439ee44098b2243f2a1bd476221b94edb59100\"" Dec 13 15:52:01.503233 env[1570]: time="2024-12-13T15:52:01.503217808Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 15:52:01.505976 env[1570]: time="2024-12-13T15:52:01.505951846Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5fc856f8c8-xbz48,Uid:6317dcc4-4669-49e0-96da-846071dd95cb,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"18c2adb1f0474940eb5fc872e6f23f6ee80628120650a0b40000239f83d644c0\"" Dec 13 15:52:01.506851 env[1570]: time="2024-12-13T15:52:01.506829907Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5fc856f8c8-lxqwx,Uid:f8f4d6d7-9983-47ab-aeca-6edc82b7ad2b,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"3809a76cdd6f4c0d5fddc67dffda192b36016307706528db74f4e3d589b6fd86\"" Dec 13 15:52:01.507718 env[1570]: time="2024-12-13T15:52:01.507702460Z" level=info msg="StartContainer for \"ba964b91d576786bedc7575e2fa0d5372cea59367f7f007fa0deee931168353b\" returns successfully" Dec 13 15:52:02.204452 env[1570]: time="2024-12-13T15:52:02.204314186Z" level=info msg="StopPodSandbox for \"2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b\"" Dec 13 15:52:02.258503 env[1570]: 2024-12-13 15:52:02.241 [INFO][5176] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" Dec 13 15:52:02.258503 env[1570]: 2024-12-13 15:52:02.241 [INFO][5176] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" iface="eth0" netns="/var/run/netns/cni-4fe022c9-86a4-6289-63c8-d2f32ae6f406" Dec 13 15:52:02.258503 env[1570]: 2024-12-13 15:52:02.242 [INFO][5176] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" iface="eth0" netns="/var/run/netns/cni-4fe022c9-86a4-6289-63c8-d2f32ae6f406" Dec 13 15:52:02.258503 env[1570]: 2024-12-13 15:52:02.242 [INFO][5176] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" iface="eth0" netns="/var/run/netns/cni-4fe022c9-86a4-6289-63c8-d2f32ae6f406" Dec 13 15:52:02.258503 env[1570]: 2024-12-13 15:52:02.242 [INFO][5176] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" Dec 13 15:52:02.258503 env[1570]: 2024-12-13 15:52:02.242 [INFO][5176] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" Dec 13 15:52:02.258503 env[1570]: 2024-12-13 15:52:02.252 [INFO][5187] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" HandleID="k8s-pod-network.2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" Workload="ci--3510.3.6--a--a4f471fe95-k8s-csi--node--driver--jxftf-eth0" Dec 13 15:52:02.258503 env[1570]: 2024-12-13 15:52:02.252 [INFO][5187] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:52:02.258503 env[1570]: 2024-12-13 15:52:02.252 [INFO][5187] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:52:02.258503 env[1570]: 2024-12-13 15:52:02.256 [WARNING][5187] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" HandleID="k8s-pod-network.2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" Workload="ci--3510.3.6--a--a4f471fe95-k8s-csi--node--driver--jxftf-eth0" Dec 13 15:52:02.258503 env[1570]: 2024-12-13 15:52:02.256 [INFO][5187] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" HandleID="k8s-pod-network.2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" Workload="ci--3510.3.6--a--a4f471fe95-k8s-csi--node--driver--jxftf-eth0" Dec 13 15:52:02.258503 env[1570]: 2024-12-13 15:52:02.257 [INFO][5187] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:52:02.258503 env[1570]: 2024-12-13 15:52:02.257 [INFO][5176] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" Dec 13 15:52:02.258793 env[1570]: time="2024-12-13T15:52:02.258570152Z" level=info msg="TearDown network for sandbox \"2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b\" successfully" Dec 13 15:52:02.258793 env[1570]: time="2024-12-13T15:52:02.258589824Z" level=info msg="StopPodSandbox for \"2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b\" returns successfully" Dec 13 15:52:02.259021 env[1570]: time="2024-12-13T15:52:02.258988780Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-jxftf,Uid:11d81f55-fe60-46f8-9d77-159b021295c1,Namespace:calico-system,Attempt:1,}" Dec 13 15:52:02.308755 systemd[1]: run-netns-cni\x2d4fe022c9\x2d86a4\x2d6289\x2d63c8\x2dd2f32ae6f406.mount: Deactivated successfully. Dec 13 15:52:02.339301 systemd-networkd[1315]: cali29cce53f656: Link UP Dec 13 15:52:02.376309 kubelet[2644]: I1213 15:52:02.376269 2644 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-9rnvx" podStartSLOduration=33.376257115 podStartE2EDuration="33.376257115s" podCreationTimestamp="2024-12-13 15:51:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 15:52:02.375890775 +0000 UTC m=+46.266681814" watchObservedRunningTime="2024-12-13 15:52:02.376257115 +0000 UTC m=+46.267048148" Dec 13 15:52:02.381000 audit[5236]: NETFILTER_CFG table=filter:107 family=2 entries=10 op=nft_register_rule pid=5236 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:52:02.381000 audit[5236]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd983adf00 a2=0 a3=7ffd983adeec items=0 ppid=2919 pid=5236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:02.381000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:52:02.391610 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 15:52:02.391677 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali29cce53f656: link becomes ready Dec 13 15:52:02.391986 systemd-networkd[1315]: cali29cce53f656: Gained carrier Dec 13 15:52:02.397576 env[1570]: 2024-12-13 15:52:02.279 [INFO][5198] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--a4f471fe95-k8s-csi--node--driver--jxftf-eth0 csi-node-driver- calico-system 11d81f55-fe60-46f8-9d77-159b021295c1 786 0 2024-12-13 15:51:36 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:65bf684474 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510.3.6-a-a4f471fe95 csi-node-driver-jxftf eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali29cce53f656 [] []}} ContainerID="702df471a209ee1a3f2a6ad084ccbc63a5b84d2e7e3efddc4430e1bda81d0844" Namespace="calico-system" Pod="csi-node-driver-jxftf" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-csi--node--driver--jxftf-" Dec 13 15:52:02.397576 env[1570]: 2024-12-13 15:52:02.279 [INFO][5198] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="702df471a209ee1a3f2a6ad084ccbc63a5b84d2e7e3efddc4430e1bda81d0844" Namespace="calico-system" Pod="csi-node-driver-jxftf" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-csi--node--driver--jxftf-eth0" Dec 13 15:52:02.397576 env[1570]: 2024-12-13 15:52:02.297 [INFO][5220] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="702df471a209ee1a3f2a6ad084ccbc63a5b84d2e7e3efddc4430e1bda81d0844" HandleID="k8s-pod-network.702df471a209ee1a3f2a6ad084ccbc63a5b84d2e7e3efddc4430e1bda81d0844" Workload="ci--3510.3.6--a--a4f471fe95-k8s-csi--node--driver--jxftf-eth0" Dec 13 15:52:02.397576 env[1570]: 2024-12-13 15:52:02.304 [INFO][5220] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="702df471a209ee1a3f2a6ad084ccbc63a5b84d2e7e3efddc4430e1bda81d0844" HandleID="k8s-pod-network.702df471a209ee1a3f2a6ad084ccbc63a5b84d2e7e3efddc4430e1bda81d0844" Workload="ci--3510.3.6--a--a4f471fe95-k8s-csi--node--driver--jxftf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003c2ad0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.6-a-a4f471fe95", "pod":"csi-node-driver-jxftf", "timestamp":"2024-12-13 15:52:02.297575644 +0000 UTC"}, Hostname:"ci-3510.3.6-a-a4f471fe95", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 15:52:02.397576 env[1570]: 2024-12-13 15:52:02.304 [INFO][5220] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:52:02.397576 env[1570]: 2024-12-13 15:52:02.304 [INFO][5220] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:52:02.397576 env[1570]: 2024-12-13 15:52:02.304 [INFO][5220] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-a4f471fe95' Dec 13 15:52:02.397576 env[1570]: 2024-12-13 15:52:02.306 [INFO][5220] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.702df471a209ee1a3f2a6ad084ccbc63a5b84d2e7e3efddc4430e1bda81d0844" host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:02.397576 env[1570]: 2024-12-13 15:52:02.310 [INFO][5220] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:02.397576 env[1570]: 2024-12-13 15:52:02.313 [INFO][5220] ipam/ipam.go 489: Trying affinity for 192.168.110.192/26 host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:02.397576 env[1570]: 2024-12-13 15:52:02.315 [INFO][5220] ipam/ipam.go 155: Attempting to load block cidr=192.168.110.192/26 host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:02.397576 env[1570]: 2024-12-13 15:52:02.317 [INFO][5220] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.110.192/26 host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:02.397576 env[1570]: 2024-12-13 15:52:02.317 [INFO][5220] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.110.192/26 handle="k8s-pod-network.702df471a209ee1a3f2a6ad084ccbc63a5b84d2e7e3efddc4430e1bda81d0844" host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:02.397576 env[1570]: 2024-12-13 15:52:02.318 [INFO][5220] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.702df471a209ee1a3f2a6ad084ccbc63a5b84d2e7e3efddc4430e1bda81d0844 Dec 13 15:52:02.397576 env[1570]: 2024-12-13 15:52:02.330 [INFO][5220] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.110.192/26 handle="k8s-pod-network.702df471a209ee1a3f2a6ad084ccbc63a5b84d2e7e3efddc4430e1bda81d0844" host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:02.397576 env[1570]: 2024-12-13 15:52:02.336 [INFO][5220] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.110.198/26] block=192.168.110.192/26 handle="k8s-pod-network.702df471a209ee1a3f2a6ad084ccbc63a5b84d2e7e3efddc4430e1bda81d0844" host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:02.397576 env[1570]: 2024-12-13 15:52:02.336 [INFO][5220] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.110.198/26] handle="k8s-pod-network.702df471a209ee1a3f2a6ad084ccbc63a5b84d2e7e3efddc4430e1bda81d0844" host="ci-3510.3.6-a-a4f471fe95" Dec 13 15:52:02.397576 env[1570]: 2024-12-13 15:52:02.336 [INFO][5220] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:52:02.397576 env[1570]: 2024-12-13 15:52:02.336 [INFO][5220] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.110.198/26] IPv6=[] ContainerID="702df471a209ee1a3f2a6ad084ccbc63a5b84d2e7e3efddc4430e1bda81d0844" HandleID="k8s-pod-network.702df471a209ee1a3f2a6ad084ccbc63a5b84d2e7e3efddc4430e1bda81d0844" Workload="ci--3510.3.6--a--a4f471fe95-k8s-csi--node--driver--jxftf-eth0" Dec 13 15:52:02.398021 env[1570]: 2024-12-13 15:52:02.337 [INFO][5198] cni-plugin/k8s.go 386: Populated endpoint ContainerID="702df471a209ee1a3f2a6ad084ccbc63a5b84d2e7e3efddc4430e1bda81d0844" Namespace="calico-system" Pod="csi-node-driver-jxftf" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-csi--node--driver--jxftf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--a4f471fe95-k8s-csi--node--driver--jxftf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"11d81f55-fe60-46f8-9d77-159b021295c1", ResourceVersion:"786", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 51, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-a4f471fe95", ContainerID:"", Pod:"csi-node-driver-jxftf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.110.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali29cce53f656", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:52:02.398021 env[1570]: 2024-12-13 15:52:02.337 [INFO][5198] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.110.198/32] ContainerID="702df471a209ee1a3f2a6ad084ccbc63a5b84d2e7e3efddc4430e1bda81d0844" Namespace="calico-system" Pod="csi-node-driver-jxftf" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-csi--node--driver--jxftf-eth0" Dec 13 15:52:02.398021 env[1570]: 2024-12-13 15:52:02.338 [INFO][5198] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali29cce53f656 ContainerID="702df471a209ee1a3f2a6ad084ccbc63a5b84d2e7e3efddc4430e1bda81d0844" Namespace="calico-system" Pod="csi-node-driver-jxftf" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-csi--node--driver--jxftf-eth0" Dec 13 15:52:02.398021 env[1570]: 2024-12-13 15:52:02.391 [INFO][5198] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="702df471a209ee1a3f2a6ad084ccbc63a5b84d2e7e3efddc4430e1bda81d0844" Namespace="calico-system" Pod="csi-node-driver-jxftf" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-csi--node--driver--jxftf-eth0" Dec 13 15:52:02.398021 env[1570]: 2024-12-13 15:52:02.392 [INFO][5198] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="702df471a209ee1a3f2a6ad084ccbc63a5b84d2e7e3efddc4430e1bda81d0844" Namespace="calico-system" Pod="csi-node-driver-jxftf" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-csi--node--driver--jxftf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--a4f471fe95-k8s-csi--node--driver--jxftf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"11d81f55-fe60-46f8-9d77-159b021295c1", ResourceVersion:"786", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 51, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-a4f471fe95", ContainerID:"702df471a209ee1a3f2a6ad084ccbc63a5b84d2e7e3efddc4430e1bda81d0844", Pod:"csi-node-driver-jxftf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.110.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali29cce53f656", MAC:"b6:f7:50:e2:92:23", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:52:02.398021 env[1570]: 2024-12-13 15:52:02.396 [INFO][5198] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="702df471a209ee1a3f2a6ad084ccbc63a5b84d2e7e3efddc4430e1bda81d0844" Namespace="calico-system" Pod="csi-node-driver-jxftf" WorkloadEndpoint="ci--3510.3.6--a--a4f471fe95-k8s-csi--node--driver--jxftf-eth0" Dec 13 15:52:02.402684 env[1570]: time="2024-12-13T15:52:02.402652198Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 15:52:02.402684 env[1570]: time="2024-12-13T15:52:02.402671856Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 15:52:02.402684 env[1570]: time="2024-12-13T15:52:02.402678599Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 15:52:02.402797 env[1570]: time="2024-12-13T15:52:02.402741477Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/702df471a209ee1a3f2a6ad084ccbc63a5b84d2e7e3efddc4430e1bda81d0844 pid=5255 runtime=io.containerd.runc.v2 Dec 13 15:52:02.409518 systemd[1]: Started cri-containerd-702df471a209ee1a3f2a6ad084ccbc63a5b84d2e7e3efddc4430e1bda81d0844.scope. Dec 13 15:52:02.408000 audit[5236]: NETFILTER_CFG table=nat:108 family=2 entries=44 op=nft_register_rule pid=5236 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:52:02.408000 audit[5236]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd983adf00 a2=0 a3=7ffd983adeec items=0 ppid=2919 pid=5236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:02.408000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:52:02.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.412000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.412000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.412000 audit: BPF prog-id=189 op=LOAD Dec 13 15:52:02.412000 audit[5265]: AVC avc: denied { bpf } for pid=5265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.412000 audit[5265]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=5255 pid=5265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:02.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730326466343731613230396565316133663261366164303834636362 Dec 13 15:52:02.412000 audit[5265]: AVC avc: denied { perfmon } for pid=5265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.412000 audit[5265]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=5255 pid=5265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:02.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730326466343731613230396565316133663261366164303834636362 Dec 13 15:52:02.412000 audit[5265]: AVC avc: denied { bpf } for pid=5265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.412000 audit[5265]: AVC avc: denied { bpf } for pid=5265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.412000 audit[5265]: AVC avc: denied { bpf } for pid=5265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.412000 audit[5265]: AVC avc: denied { perfmon } for pid=5265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.412000 audit[5265]: AVC avc: denied { perfmon } for pid=5265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.412000 audit[5265]: AVC avc: denied { perfmon } for pid=5265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.412000 audit[5265]: AVC avc: denied { perfmon } for pid=5265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.412000 audit[5265]: AVC avc: denied { perfmon } for pid=5265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.412000 audit[5265]: AVC avc: denied { bpf } for pid=5265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.412000 audit[5265]: AVC avc: denied { bpf } for pid=5265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.412000 audit: BPF prog-id=190 op=LOAD Dec 13 15:52:02.412000 audit[5265]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000380b30 items=0 ppid=5255 pid=5265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:02.412000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730326466343731613230396565316133663261366164303834636362 Dec 13 15:52:02.413000 audit[5265]: AVC avc: denied { bpf } for pid=5265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.413000 audit[5265]: AVC avc: denied { bpf } for pid=5265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.413000 audit[5265]: AVC avc: denied { perfmon } for pid=5265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.413000 audit[5265]: AVC avc: denied { perfmon } for pid=5265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.413000 audit[5265]: AVC avc: denied { perfmon } for pid=5265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.413000 audit[5265]: AVC avc: denied { perfmon } for pid=5265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.413000 audit[5265]: AVC avc: denied { perfmon } for pid=5265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.413000 audit[5265]: AVC avc: denied { bpf } for pid=5265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.413000 audit[5265]: AVC avc: denied { bpf } for pid=5265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.413000 audit: BPF prog-id=191 op=LOAD Dec 13 15:52:02.413000 audit[5265]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000380b78 items=0 ppid=5255 pid=5265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:02.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730326466343731613230396565316133663261366164303834636362 Dec 13 15:52:02.413000 audit: BPF prog-id=191 op=UNLOAD Dec 13 15:52:02.413000 audit: BPF prog-id=190 op=UNLOAD Dec 13 15:52:02.413000 audit[5265]: AVC avc: denied { bpf } for pid=5265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.413000 audit[5265]: AVC avc: denied { bpf } for pid=5265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.413000 audit[5265]: AVC avc: denied { bpf } for pid=5265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.413000 audit[5265]: AVC avc: denied { perfmon } for pid=5265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.413000 audit[5265]: AVC avc: denied { perfmon } for pid=5265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.413000 audit[5265]: AVC avc: denied { perfmon } for pid=5265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.413000 audit[5265]: AVC avc: denied { perfmon } for pid=5265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.413000 audit[5265]: AVC avc: denied { perfmon } for pid=5265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.413000 audit[5265]: AVC avc: denied { bpf } for pid=5265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.413000 audit[5265]: AVC avc: denied { bpf } for pid=5265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:02.413000 audit: BPF prog-id=192 op=LOAD Dec 13 15:52:02.413000 audit[5265]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000380f88 items=0 ppid=5255 pid=5265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:02.413000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730326466343731613230396565316133663261366164303834636362 Dec 13 15:52:02.418912 env[1570]: time="2024-12-13T15:52:02.418888685Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-jxftf,Uid:11d81f55-fe60-46f8-9d77-159b021295c1,Namespace:calico-system,Attempt:1,} returns sandbox id \"702df471a209ee1a3f2a6ad084ccbc63a5b84d2e7e3efddc4430e1bda81d0844\"" Dec 13 15:52:02.419000 audit[5289]: NETFILTER_CFG table=filter:109 family=2 entries=46 op=nft_register_chain pid=5289 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 15:52:02.419000 audit[5289]: SYSCALL arch=c000003e syscall=46 success=yes exit=22188 a0=3 a1=7fff087da3e0 a2=0 a3=7fff087da3cc items=0 ppid=4234 pid=5289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:02.419000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 15:52:02.438000 audit[5290]: NETFILTER_CFG table=filter:110 family=2 entries=10 op=nft_register_rule pid=5290 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:52:02.438000 audit[5290]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffcdcd3efb0 a2=0 a3=7ffcdcd3ef9c items=0 ppid=2919 pid=5290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:02.438000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:52:02.456000 audit[5290]: NETFILTER_CFG table=nat:111 family=2 entries=56 op=nft_register_chain pid=5290 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:52:02.456000 audit[5290]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffcdcd3efb0 a2=0 a3=7ffcdcd3ef9c items=0 ppid=2919 pid=5290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:02.456000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:52:02.712787 systemd-networkd[1315]: calie158c05817b: Gained IPv6LL Dec 13 15:52:02.840720 systemd-networkd[1315]: cali8ef1f5d778f: Gained IPv6LL Dec 13 15:52:03.160748 systemd-networkd[1315]: cali9dcd0562887: Gained IPv6LL Dec 13 15:52:03.161447 systemd-networkd[1315]: calie03fa54f359: Gained IPv6LL Dec 13 15:52:03.992619 systemd-networkd[1315]: cali29cce53f656: Gained IPv6LL Dec 13 15:52:04.249155 env[1570]: time="2024-12-13T15:52:04.249073914Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:04.249748 env[1570]: time="2024-12-13T15:52:04.249721566Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:04.250466 env[1570]: time="2024-12-13T15:52:04.250453891Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:04.251235 env[1570]: time="2024-12-13T15:52:04.251193503Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:04.251621 env[1570]: time="2024-12-13T15:52:04.251578181Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 15:52:04.252355 env[1570]: time="2024-12-13T15:52:04.252341148Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 15:52:04.256359 env[1570]: time="2024-12-13T15:52:04.256341460Z" level=info msg="CreateContainer within sandbox \"187127ace754a8cdbd1a8a5380439ee44098b2243f2a1bd476221b94edb59100\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 15:52:04.261015 env[1570]: time="2024-12-13T15:52:04.260995573Z" level=info msg="CreateContainer within sandbox \"187127ace754a8cdbd1a8a5380439ee44098b2243f2a1bd476221b94edb59100\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"3316ce0886e457e04e3e26d340da154063b8fb16214b464dc4f5859d49652a34\"" Dec 13 15:52:04.261315 env[1570]: time="2024-12-13T15:52:04.261302434Z" level=info msg="StartContainer for \"3316ce0886e457e04e3e26d340da154063b8fb16214b464dc4f5859d49652a34\"" Dec 13 15:52:04.269723 systemd[1]: Started cri-containerd-3316ce0886e457e04e3e26d340da154063b8fb16214b464dc4f5859d49652a34.scope. Dec 13 15:52:04.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.275000 audit: BPF prog-id=193 op=LOAD Dec 13 15:52:04.276000 audit[5313]: AVC avc: denied { bpf } for pid=5313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.276000 audit[5313]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4999 pid=5313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:04.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333313663653038383665343537653034653365323664333430646131 Dec 13 15:52:04.276000 audit[5313]: AVC avc: denied { perfmon } for pid=5313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.276000 audit[5313]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4999 pid=5313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:04.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333313663653038383665343537653034653365323664333430646131 Dec 13 15:52:04.276000 audit[5313]: AVC avc: denied { bpf } for pid=5313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.276000 audit[5313]: AVC avc: denied { bpf } for pid=5313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.276000 audit[5313]: AVC avc: denied { bpf } for pid=5313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.276000 audit[5313]: AVC avc: denied { perfmon } for pid=5313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.276000 audit[5313]: AVC avc: denied { perfmon } for pid=5313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.276000 audit[5313]: AVC avc: denied { perfmon } for pid=5313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.276000 audit[5313]: AVC avc: denied { perfmon } for pid=5313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.276000 audit[5313]: AVC avc: denied { perfmon } for pid=5313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.276000 audit[5313]: AVC avc: denied { bpf } for pid=5313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.276000 audit[5313]: AVC avc: denied { bpf } for pid=5313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.276000 audit: BPF prog-id=194 op=LOAD Dec 13 15:52:04.276000 audit[5313]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002d9d10 items=0 ppid=4999 pid=5313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:04.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333313663653038383665343537653034653365323664333430646131 Dec 13 15:52:04.276000 audit[5313]: AVC avc: denied { bpf } for pid=5313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.276000 audit[5313]: AVC avc: denied { bpf } for pid=5313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.276000 audit[5313]: AVC avc: denied { perfmon } for pid=5313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.276000 audit[5313]: AVC avc: denied { perfmon } for pid=5313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.276000 audit[5313]: AVC avc: denied { perfmon } for pid=5313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.276000 audit[5313]: AVC avc: denied { perfmon } for pid=5313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.276000 audit[5313]: AVC avc: denied { perfmon } for pid=5313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.276000 audit[5313]: AVC avc: denied { bpf } for pid=5313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.276000 audit[5313]: AVC avc: denied { bpf } for pid=5313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.276000 audit: BPF prog-id=195 op=LOAD Dec 13 15:52:04.276000 audit[5313]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002d9d58 items=0 ppid=4999 pid=5313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:04.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333313663653038383665343537653034653365323664333430646131 Dec 13 15:52:04.276000 audit: BPF prog-id=195 op=UNLOAD Dec 13 15:52:04.276000 audit: BPF prog-id=194 op=UNLOAD Dec 13 15:52:04.276000 audit[5313]: AVC avc: denied { bpf } for pid=5313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.276000 audit[5313]: AVC avc: denied { bpf } for pid=5313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.276000 audit[5313]: AVC avc: denied { bpf } for pid=5313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.276000 audit[5313]: AVC avc: denied { perfmon } for pid=5313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.276000 audit[5313]: AVC avc: denied { perfmon } for pid=5313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.276000 audit[5313]: AVC avc: denied { perfmon } for pid=5313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.276000 audit[5313]: AVC avc: denied { perfmon } for pid=5313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.276000 audit[5313]: AVC avc: denied { perfmon } for pid=5313 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.276000 audit[5313]: AVC avc: denied { bpf } for pid=5313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.276000 audit[5313]: AVC avc: denied { bpf } for pid=5313 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:04.276000 audit: BPF prog-id=196 op=LOAD Dec 13 15:52:04.276000 audit[5313]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003c0168 items=0 ppid=4999 pid=5313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:04.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333313663653038383665343537653034653365323664333430646131 Dec 13 15:52:04.294419 env[1570]: time="2024-12-13T15:52:04.294366811Z" level=info msg="StartContainer for \"3316ce0886e457e04e3e26d340da154063b8fb16214b464dc4f5859d49652a34\" returns successfully" Dec 13 15:52:04.385595 kubelet[2644]: I1213 15:52:04.385526 2644 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-656bc8f995-2lkj6" podStartSLOduration=25.636104484 podStartE2EDuration="28.385504477s" podCreationTimestamp="2024-12-13 15:51:36 +0000 UTC" firstStartedPulling="2024-12-13 15:52:01.502862145 +0000 UTC m=+45.393653178" lastFinishedPulling="2024-12-13 15:52:04.252262145 +0000 UTC m=+48.143053171" observedRunningTime="2024-12-13 15:52:04.384814362 +0000 UTC m=+48.275605420" watchObservedRunningTime="2024-12-13 15:52:04.385504477 +0000 UTC m=+48.276295554" Dec 13 15:52:07.055871 env[1570]: time="2024-12-13T15:52:07.055813415Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:07.056434 env[1570]: time="2024-12-13T15:52:07.056392643Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:07.056992 env[1570]: time="2024-12-13T15:52:07.056951567Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:07.057997 env[1570]: time="2024-12-13T15:52:07.057956605Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:07.058186 env[1570]: time="2024-12-13T15:52:07.058144612Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 15:52:07.058852 env[1570]: time="2024-12-13T15:52:07.058839390Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 15:52:07.059496 env[1570]: time="2024-12-13T15:52:07.059477807Z" level=info msg="CreateContainer within sandbox \"18c2adb1f0474940eb5fc872e6f23f6ee80628120650a0b40000239f83d644c0\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 15:52:07.063702 env[1570]: time="2024-12-13T15:52:07.063685330Z" level=info msg="CreateContainer within sandbox \"18c2adb1f0474940eb5fc872e6f23f6ee80628120650a0b40000239f83d644c0\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"0d97fa945d88ab2f208ef1aed6b7095456dceced2fccbb458dae71726d0d5a76\"" Dec 13 15:52:07.064013 env[1570]: time="2024-12-13T15:52:07.063998672Z" level=info msg="StartContainer for \"0d97fa945d88ab2f208ef1aed6b7095456dceced2fccbb458dae71726d0d5a76\"" Dec 13 15:52:07.075994 systemd[1]: Started cri-containerd-0d97fa945d88ab2f208ef1aed6b7095456dceced2fccbb458dae71726d0d5a76.scope. Dec 13 15:52:07.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.106460 kernel: kauditd_printk_skb: 542 callbacks suppressed Dec 13 15:52:07.106495 kernel: audit: type=1400 audit(1734105127.080:1280): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.222418 kernel: audit: type=1400 audit(1734105127.080:1281): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.222452 kernel: audit: type=1400 audit(1734105127.080:1282): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.338838 kernel: audit: type=1400 audit(1734105127.080:1283): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.338871 kernel: audit: type=1400 audit(1734105127.080:1284): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.397230 kernel: audit: type=1400 audit(1734105127.080:1285): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.443293 env[1570]: time="2024-12-13T15:52:07.443270844Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:07.444020 env[1570]: time="2024-12-13T15:52:07.444007204Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:07.444766 env[1570]: time="2024-12-13T15:52:07.444750964Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:07.445496 env[1570]: time="2024-12-13T15:52:07.445478076Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:07.445817 env[1570]: time="2024-12-13T15:52:07.445803765Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 15:52:07.446373 env[1570]: time="2024-12-13T15:52:07.446361766Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 15:52:07.447008 env[1570]: time="2024-12-13T15:52:07.446994292Z" level=info msg="CreateContainer within sandbox \"3809a76cdd6f4c0d5fddc67dffda192b36016307706528db74f4e3d589b6fd86\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 15:52:07.455608 kernel: audit: type=1400 audit(1734105127.080:1286): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.514489 kernel: audit: type=1400 audit(1734105127.080:1287): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.573492 kernel: audit: type=1400 audit(1734105127.080:1288): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.692603 kernel: audit: type=1400 audit(1734105127.162:1289): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.162000 audit: BPF prog-id=197 op=LOAD Dec 13 15:52:07.163000 audit[5379]: AVC avc: denied { bpf } for pid=5379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.163000 audit[5379]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=5016 pid=5379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:07.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064393766613934356438386162326632303865663161656436623730 Dec 13 15:52:07.163000 audit[5379]: AVC avc: denied { perfmon } for pid=5379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.163000 audit[5379]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=5016 pid=5379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:07.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064393766613934356438386162326632303865663161656436623730 Dec 13 15:52:07.163000 audit[5379]: AVC avc: denied { bpf } for pid=5379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.163000 audit[5379]: AVC avc: denied { bpf } for pid=5379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.163000 audit[5379]: AVC avc: denied { bpf } for pid=5379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.163000 audit[5379]: AVC avc: denied { perfmon } for pid=5379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.163000 audit[5379]: AVC avc: denied { perfmon } for pid=5379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.163000 audit[5379]: AVC avc: denied { perfmon } for pid=5379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.163000 audit[5379]: AVC avc: denied { perfmon } for pid=5379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.163000 audit[5379]: AVC avc: denied { perfmon } for pid=5379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.163000 audit[5379]: AVC avc: denied { bpf } for pid=5379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.163000 audit[5379]: AVC avc: denied { bpf } for pid=5379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.163000 audit: BPF prog-id=198 op=LOAD Dec 13 15:52:07.163000 audit[5379]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001dbe10 items=0 ppid=5016 pid=5379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:07.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064393766613934356438386162326632303865663161656436623730 Dec 13 15:52:07.278000 audit[5379]: AVC avc: denied { bpf } for pid=5379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.278000 audit[5379]: AVC avc: denied { bpf } for pid=5379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.278000 audit[5379]: AVC avc: denied { perfmon } for pid=5379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.278000 audit[5379]: AVC avc: denied { perfmon } for pid=5379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.278000 audit[5379]: AVC avc: denied { perfmon } for pid=5379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.278000 audit[5379]: AVC avc: denied { perfmon } for pid=5379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.278000 audit[5379]: AVC avc: denied { perfmon } for pid=5379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.278000 audit[5379]: AVC avc: denied { bpf } for pid=5379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.278000 audit[5379]: AVC avc: denied { bpf } for pid=5379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.278000 audit: BPF prog-id=199 op=LOAD Dec 13 15:52:07.278000 audit[5379]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001dbe58 items=0 ppid=5016 pid=5379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:07.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064393766613934356438386162326632303865663161656436623730 Dec 13 15:52:07.395000 audit: BPF prog-id=199 op=UNLOAD Dec 13 15:52:07.395000 audit: BPF prog-id=198 op=UNLOAD Dec 13 15:52:07.395000 audit[5379]: AVC avc: denied { bpf } for pid=5379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.395000 audit[5379]: AVC avc: denied { bpf } for pid=5379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.395000 audit[5379]: AVC avc: denied { bpf } for pid=5379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.395000 audit[5379]: AVC avc: denied { perfmon } for pid=5379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.395000 audit[5379]: AVC avc: denied { perfmon } for pid=5379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.395000 audit[5379]: AVC avc: denied { perfmon } for pid=5379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.395000 audit[5379]: AVC avc: denied { perfmon } for pid=5379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.395000 audit[5379]: AVC avc: denied { perfmon } for pid=5379 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.395000 audit[5379]: AVC avc: denied { bpf } for pid=5379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.395000 audit[5379]: AVC avc: denied { bpf } for pid=5379 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.395000 audit: BPF prog-id=200 op=LOAD Dec 13 15:52:07.395000 audit[5379]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003ac268 items=0 ppid=5016 pid=5379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:07.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064393766613934356438386162326632303865663161656436623730 Dec 13 15:52:07.694967 env[1570]: time="2024-12-13T15:52:07.694945139Z" level=info msg="CreateContainer within sandbox \"3809a76cdd6f4c0d5fddc67dffda192b36016307706528db74f4e3d589b6fd86\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"e6d6482ffe0c81d269c4da74ebc4ff1be2f6a96f361278f011c9849774ff33be\"" Dec 13 15:52:07.695213 env[1570]: time="2024-12-13T15:52:07.695200169Z" level=info msg="StartContainer for \"e6d6482ffe0c81d269c4da74ebc4ff1be2f6a96f361278f011c9849774ff33be\"" Dec 13 15:52:07.703437 systemd[1]: Started cri-containerd-e6d6482ffe0c81d269c4da74ebc4ff1be2f6a96f361278f011c9849774ff33be.scope. Dec 13 15:52:07.709906 env[1570]: time="2024-12-13T15:52:07.709877464Z" level=info msg="StartContainer for \"0d97fa945d88ab2f208ef1aed6b7095456dceced2fccbb458dae71726d0d5a76\" returns successfully" Dec 13 15:52:07.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.709000 audit: BPF prog-id=201 op=LOAD Dec 13 15:52:07.709000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.709000 audit[5407]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5008 pid=5407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:07.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536643634383266666530633831643236396334646137346562633466 Dec 13 15:52:07.709000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.709000 audit[5407]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=5008 pid=5407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:07.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536643634383266666530633831643236396334646137346562633466 Dec 13 15:52:07.709000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.709000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.709000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.709000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.709000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.709000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.709000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.709000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.709000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.709000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.709000 audit: BPF prog-id=202 op=LOAD Dec 13 15:52:07.709000 audit[5407]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000097330 items=0 ppid=5008 pid=5407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:07.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536643634383266666530633831643236396334646137346562633466 Dec 13 15:52:07.709000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.709000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.709000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.709000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.709000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.709000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.709000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.709000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.709000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.709000 audit: BPF prog-id=203 op=LOAD Dec 13 15:52:07.709000 audit[5407]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000097378 items=0 ppid=5008 pid=5407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:07.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536643634383266666530633831643236396334646137346562633466 Dec 13 15:52:07.709000 audit: BPF prog-id=203 op=UNLOAD Dec 13 15:52:07.709000 audit: BPF prog-id=202 op=UNLOAD Dec 13 15:52:07.709000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.709000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.709000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.709000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.709000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.709000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.709000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.709000 audit[5407]: AVC avc: denied { perfmon } for pid=5407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.709000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.709000 audit[5407]: AVC avc: denied { bpf } for pid=5407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:07.709000 audit: BPF prog-id=204 op=LOAD Dec 13 15:52:07.709000 audit[5407]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000097788 items=0 ppid=5008 pid=5407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:07.709000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536643634383266666530633831643236396334646137346562633466 Dec 13 15:52:07.727882 env[1570]: time="2024-12-13T15:52:07.727829852Z" level=info msg="StartContainer for \"e6d6482ffe0c81d269c4da74ebc4ff1be2f6a96f361278f011c9849774ff33be\" returns successfully" Dec 13 15:52:08.244000 audit[5389]: AVC avc: denied { watch } for pid=5389 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_51_46.2152576997/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c754 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c3,c754 tclass=file permissive=0 Dec 13 15:52:08.244000 audit[5389]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000476220 a2=fc6 a3=0 items=0 ppid=5016 pid=5389 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c754 key=(null) Dec 13 15:52:08.244000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:52:08.392788 kubelet[2644]: I1213 15:52:08.392733 2644 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5fc856f8c8-lxqwx" podStartSLOduration=26.453691375 podStartE2EDuration="32.392714196s" podCreationTimestamp="2024-12-13 15:51:36 +0000 UTC" firstStartedPulling="2024-12-13 15:52:01.507272254 +0000 UTC m=+45.398063280" lastFinishedPulling="2024-12-13 15:52:07.446295074 +0000 UTC m=+51.337086101" observedRunningTime="2024-12-13 15:52:08.392388751 +0000 UTC m=+52.283179791" watchObservedRunningTime="2024-12-13 15:52:08.392714196 +0000 UTC m=+52.283505228" Dec 13 15:52:08.393000 audit[5417]: AVC avc: denied { watch } for pid=5417 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_51_46.403036532/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c782,c860 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c782,c860 tclass=file permissive=0 Dec 13 15:52:08.393000 audit[5417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001594080 a2=fc6 a3=0 items=0 ppid=5008 pid=5417 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c782,c860 key=(null) Dec 13 15:52:08.393000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:52:08.398000 audit[5484]: NETFILTER_CFG table=filter:112 family=2 entries=10 op=nft_register_rule pid=5484 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:52:08.398000 audit[5484]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc8abf81a0 a2=0 a3=7ffc8abf818c items=0 ppid=2919 pid=5484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:08.398000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:52:08.399987 kubelet[2644]: I1213 15:52:08.399951 2644 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5fc856f8c8-xbz48" podStartSLOduration=26.847855077 podStartE2EDuration="32.399936086s" podCreationTimestamp="2024-12-13 15:51:36 +0000 UTC" firstStartedPulling="2024-12-13 15:52:01.506698279 +0000 UTC m=+45.397489309" lastFinishedPulling="2024-12-13 15:52:07.058779291 +0000 UTC m=+50.949570318" observedRunningTime="2024-12-13 15:52:08.399532104 +0000 UTC m=+52.290323138" watchObservedRunningTime="2024-12-13 15:52:08.399936086 +0000 UTC m=+52.290727115" Dec 13 15:52:08.410000 audit[5484]: NETFILTER_CFG table=nat:113 family=2 entries=20 op=nft_register_rule pid=5484 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:52:08.410000 audit[5484]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc8abf81a0 a2=0 a3=7ffc8abf818c items=0 ppid=2919 pid=5484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:08.410000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:52:08.426000 audit[5486]: NETFILTER_CFG table=filter:114 family=2 entries=10 op=nft_register_rule pid=5486 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:52:08.426000 audit[5486]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff7ca966c0 a2=0 a3=7fff7ca966ac items=0 ppid=2919 pid=5486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:08.426000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:52:08.441000 audit[5486]: NETFILTER_CFG table=nat:115 family=2 entries=20 op=nft_register_rule pid=5486 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:52:08.441000 audit[5486]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff7ca966c0 a2=0 a3=7fff7ca966ac items=0 ppid=2919 pid=5486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:08.441000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:52:09.374392 env[1570]: time="2024-12-13T15:52:09.374366385Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:09.375118 env[1570]: time="2024-12-13T15:52:09.375103685Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:09.375763 env[1570]: time="2024-12-13T15:52:09.375720550Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:09.376368 env[1570]: time="2024-12-13T15:52:09.376327549Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:09.376915 env[1570]: time="2024-12-13T15:52:09.376873569Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 15:52:09.378029 env[1570]: time="2024-12-13T15:52:09.378017217Z" level=info msg="CreateContainer within sandbox \"702df471a209ee1a3f2a6ad084ccbc63a5b84d2e7e3efddc4430e1bda81d0844\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 15:52:09.383619 env[1570]: time="2024-12-13T15:52:09.383578574Z" level=info msg="CreateContainer within sandbox \"702df471a209ee1a3f2a6ad084ccbc63a5b84d2e7e3efddc4430e1bda81d0844\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"f18764a724065535d3d4d40f4f2916c6e284f37f208365821ab1a2335aa1e79c\"" Dec 13 15:52:09.383948 env[1570]: time="2024-12-13T15:52:09.383887621Z" level=info msg="StartContainer for \"f18764a724065535d3d4d40f4f2916c6e284f37f208365821ab1a2335aa1e79c\"" Dec 13 15:52:09.387827 kubelet[2644]: I1213 15:52:09.387813 2644 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 15:52:09.387904 kubelet[2644]: I1213 15:52:09.387813 2644 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 15:52:09.394654 systemd[1]: Started cri-containerd-f18764a724065535d3d4d40f4f2916c6e284f37f208365821ab1a2335aa1e79c.scope. Dec 13 15:52:09.400000 audit[5494]: AVC avc: denied { perfmon } for pid=5494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:09.400000 audit[5494]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f9b542aed58 items=0 ppid=5255 pid=5494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:09.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631383736346137323430363535333564336434643430663466323931 Dec 13 15:52:09.400000 audit[5494]: AVC avc: denied { bpf } for pid=5494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:09.400000 audit[5494]: AVC avc: denied { bpf } for pid=5494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:09.400000 audit[5494]: AVC avc: denied { bpf } for pid=5494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:09.400000 audit[5494]: AVC avc: denied { perfmon } for pid=5494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:09.400000 audit[5494]: AVC avc: denied { perfmon } for pid=5494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:09.400000 audit[5494]: AVC avc: denied { perfmon } for pid=5494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:09.400000 audit[5494]: AVC avc: denied { perfmon } for pid=5494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:09.400000 audit[5494]: AVC avc: denied { perfmon } for pid=5494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:09.400000 audit[5494]: AVC avc: denied { bpf } for pid=5494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:09.400000 audit[5494]: AVC avc: denied { bpf } for pid=5494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:09.400000 audit: BPF prog-id=205 op=LOAD Dec 13 15:52:09.400000 audit[5494]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c000273f68 items=0 ppid=5255 pid=5494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:09.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631383736346137323430363535333564336434643430663466323931 Dec 13 15:52:09.400000 audit[5494]: AVC avc: denied { bpf } for pid=5494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:09.400000 audit[5494]: AVC avc: denied { bpf } for pid=5494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:09.400000 audit[5494]: AVC avc: denied { perfmon } for pid=5494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:09.400000 audit[5494]: AVC avc: denied { perfmon } for pid=5494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:09.400000 audit[5494]: AVC avc: denied { perfmon } for pid=5494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:09.400000 audit[5494]: AVC avc: denied { perfmon } for pid=5494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:09.400000 audit[5494]: AVC avc: denied { perfmon } for pid=5494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:09.400000 audit[5494]: AVC avc: denied { bpf } for pid=5494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:09.400000 audit[5494]: AVC avc: denied { bpf } for pid=5494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:09.400000 audit: BPF prog-id=206 op=LOAD Dec 13 15:52:09.400000 audit[5494]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c000273fb8 items=0 ppid=5255 pid=5494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:09.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631383736346137323430363535333564336434643430663466323931 Dec 13 15:52:09.400000 audit: BPF prog-id=206 op=UNLOAD Dec 13 15:52:09.400000 audit: BPF prog-id=205 op=UNLOAD Dec 13 15:52:09.400000 audit[5494]: AVC avc: denied { bpf } for pid=5494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:09.400000 audit[5494]: AVC avc: denied { bpf } for pid=5494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:09.400000 audit[5494]: AVC avc: denied { bpf } for pid=5494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:09.400000 audit[5494]: AVC avc: denied { perfmon } for pid=5494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:09.400000 audit[5494]: AVC avc: denied { perfmon } for pid=5494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:09.400000 audit[5494]: AVC avc: denied { perfmon } for pid=5494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:09.400000 audit[5494]: AVC avc: denied { perfmon } for pid=5494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:09.400000 audit[5494]: AVC avc: denied { perfmon } for pid=5494 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:09.400000 audit[5494]: AVC avc: denied { bpf } for pid=5494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:09.400000 audit[5494]: AVC avc: denied { bpf } for pid=5494 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:09.400000 audit: BPF prog-id=207 op=LOAD Dec 13 15:52:09.400000 audit[5494]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c0003cc048 items=0 ppid=5255 pid=5494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:09.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631383736346137323430363535333564336434643430663466323931 Dec 13 15:52:09.408171 env[1570]: time="2024-12-13T15:52:09.408147743Z" level=info msg="StartContainer for \"f18764a724065535d3d4d40f4f2916c6e284f37f208365821ab1a2335aa1e79c\" returns successfully" Dec 13 15:52:09.408702 env[1570]: time="2024-12-13T15:52:09.408691582Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 15:52:11.485846 env[1570]: time="2024-12-13T15:52:11.485820512Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:11.486519 env[1570]: time="2024-12-13T15:52:11.486488108Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:11.487407 env[1570]: time="2024-12-13T15:52:11.487394213Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:11.488252 env[1570]: time="2024-12-13T15:52:11.488238025Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 15:52:11.488629 env[1570]: time="2024-12-13T15:52:11.488613787Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 15:52:11.489985 env[1570]: time="2024-12-13T15:52:11.489969308Z" level=info msg="CreateContainer within sandbox \"702df471a209ee1a3f2a6ad084ccbc63a5b84d2e7e3efddc4430e1bda81d0844\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 15:52:11.495028 env[1570]: time="2024-12-13T15:52:11.494985556Z" level=info msg="CreateContainer within sandbox \"702df471a209ee1a3f2a6ad084ccbc63a5b84d2e7e3efddc4430e1bda81d0844\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"02666576477219c756b69e556ae206d52f0e5c33a88795dac210b7b1203ea8ff\"" Dec 13 15:52:11.495325 env[1570]: time="2024-12-13T15:52:11.495276191Z" level=info msg="StartContainer for \"02666576477219c756b69e556ae206d52f0e5c33a88795dac210b7b1203ea8ff\"" Dec 13 15:52:11.505796 systemd[1]: Started cri-containerd-02666576477219c756b69e556ae206d52f0e5c33a88795dac210b7b1203ea8ff.scope. Dec 13 15:52:11.511000 audit[5529]: AVC avc: denied { perfmon } for pid=5529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:11.511000 audit[5529]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f8c99148ad8 items=0 ppid=5255 pid=5529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:11.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032363636353736343737323139633735366236396535353661653230 Dec 13 15:52:11.511000 audit[5529]: AVC avc: denied { bpf } for pid=5529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:11.511000 audit[5529]: AVC avc: denied { bpf } for pid=5529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:11.511000 audit[5529]: AVC avc: denied { bpf } for pid=5529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:11.511000 audit[5529]: AVC avc: denied { perfmon } for pid=5529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:11.511000 audit[5529]: AVC avc: denied { perfmon } for pid=5529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:11.511000 audit[5529]: AVC avc: denied { perfmon } for pid=5529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:11.511000 audit[5529]: AVC avc: denied { perfmon } for pid=5529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:11.511000 audit[5529]: AVC avc: denied { perfmon } for pid=5529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:11.511000 audit[5529]: AVC avc: denied { bpf } for pid=5529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:11.511000 audit[5529]: AVC avc: denied { bpf } for pid=5529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:11.511000 audit: BPF prog-id=208 op=LOAD Dec 13 15:52:11.511000 audit[5529]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00036eb08 items=0 ppid=5255 pid=5529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:11.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032363636353736343737323139633735366236396535353661653230 Dec 13 15:52:11.511000 audit[5529]: AVC avc: denied { bpf } for pid=5529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:11.511000 audit[5529]: AVC avc: denied { bpf } for pid=5529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:11.511000 audit[5529]: AVC avc: denied { perfmon } for pid=5529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:11.511000 audit[5529]: AVC avc: denied { perfmon } for pid=5529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:11.511000 audit[5529]: AVC avc: denied { perfmon } for pid=5529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:11.511000 audit[5529]: AVC avc: denied { perfmon } for pid=5529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:11.511000 audit[5529]: AVC avc: denied { perfmon } for pid=5529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:11.511000 audit[5529]: AVC avc: denied { bpf } for pid=5529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:11.511000 audit[5529]: AVC avc: denied { bpf } for pid=5529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:11.511000 audit: BPF prog-id=209 op=LOAD Dec 13 15:52:11.511000 audit[5529]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00036eb58 items=0 ppid=5255 pid=5529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:11.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032363636353736343737323139633735366236396535353661653230 Dec 13 15:52:11.511000 audit: BPF prog-id=209 op=UNLOAD Dec 13 15:52:11.511000 audit: BPF prog-id=208 op=UNLOAD Dec 13 15:52:11.511000 audit[5529]: AVC avc: denied { bpf } for pid=5529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:11.511000 audit[5529]: AVC avc: denied { bpf } for pid=5529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:11.511000 audit[5529]: AVC avc: denied { bpf } for pid=5529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:11.511000 audit[5529]: AVC avc: denied { perfmon } for pid=5529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:11.511000 audit[5529]: AVC avc: denied { perfmon } for pid=5529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:11.511000 audit[5529]: AVC avc: denied { perfmon } for pid=5529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:11.511000 audit[5529]: AVC avc: denied { perfmon } for pid=5529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:11.511000 audit[5529]: AVC avc: denied { perfmon } for pid=5529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:11.511000 audit[5529]: AVC avc: denied { bpf } for pid=5529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:11.511000 audit[5529]: AVC avc: denied { bpf } for pid=5529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 15:52:11.511000 audit: BPF prog-id=210 op=LOAD Dec 13 15:52:11.511000 audit[5529]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00036ebe8 items=0 ppid=5255 pid=5529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:11.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032363636353736343737323139633735366236396535353661653230 Dec 13 15:52:11.538107 env[1570]: time="2024-12-13T15:52:11.537968312Z" level=info msg="StartContainer for \"02666576477219c756b69e556ae206d52f0e5c33a88795dac210b7b1203ea8ff\" returns successfully" Dec 13 15:52:12.264404 kubelet[2644]: I1213 15:52:12.264320 2644 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 15:52:12.264404 kubelet[2644]: I1213 15:52:12.264404 2644 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 15:52:12.429439 kubelet[2644]: I1213 15:52:12.429326 2644 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-jxftf" podStartSLOduration=27.359567723 podStartE2EDuration="36.42928791s" podCreationTimestamp="2024-12-13 15:51:36 +0000 UTC" firstStartedPulling="2024-12-13 15:52:02.419490873 +0000 UTC m=+46.310281905" lastFinishedPulling="2024-12-13 15:52:11.489211059 +0000 UTC m=+55.380002092" observedRunningTime="2024-12-13 15:52:12.428049901 +0000 UTC m=+56.318841006" watchObservedRunningTime="2024-12-13 15:52:12.42928791 +0000 UTC m=+56.320078992" Dec 13 15:52:12.564000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:52:12.607358 kernel: kauditd_printk_skb: 208 callbacks suppressed Dec 13 15:52:12.607456 kernel: audit: type=1400 audit(1734105132.564:1334): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:52:12.564000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00181d480 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:52:12.805396 kernel: audit: type=1300 audit(1734105132.564:1334): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00181d480 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:52:12.805428 kernel: audit: type=1400 audit(1734105132.564:1335): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:52:12.564000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:52:12.564000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:52:12.977474 kernel: audit: type=1327 audit(1734105132.564:1334): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:52:12.977510 kernel: audit: type=1300 audit(1734105132.564:1335): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00071bb90 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:52:12.564000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00071bb90 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:52:13.089425 kernel: audit: type=1327 audit(1734105132.564:1335): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:52:12.564000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:52:13.176667 kernel: audit: type=1400 audit(1734105132.573:1336): avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:52:12.573000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:52:13.264639 kernel: audit: type=1300 audit(1734105132.573:1336): arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00dc13b30 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:52:12.573000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00dc13b30 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:52:13.364694 kernel: audit: type=1327 audit(1734105132.573:1336): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:52:12.573000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:52:13.458855 kernel: audit: type=1400 audit(1734105132.573:1337): avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:52:12.573000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:52:12.573000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c009e554e0 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:52:12.573000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:52:12.573000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:52:12.573000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c003d00e40 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:52:12.573000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:52:12.574000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:52:12.574000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c009d5f440 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:52:12.574000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:52:12.575000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:52:12.575000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c009e55540 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:52:12.575000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:52:12.575000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:52:12.575000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c007aa3050 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:52:12.575000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:52:15.960000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:52:15.960000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b18a80 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:52:15.960000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:52:15.960000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:52:15.960000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00187f3c0 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:52:15.960000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:52:15.960000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:52:15.960000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0013f7120 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:52:15.960000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:52:15.960000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:52:15.960000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b79800 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:52:15.960000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:52:16.189099 env[1570]: time="2024-12-13T15:52:16.189042579Z" level=info msg="StopPodSandbox for \"6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f\"" Dec 13 15:52:16.228953 env[1570]: 2024-12-13 15:52:16.209 [WARNING][5610] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--xbz48-eth0", GenerateName:"calico-apiserver-5fc856f8c8-", Namespace:"calico-apiserver", SelfLink:"", UID:"6317dcc4-4669-49e0-96da-846071dd95cb", ResourceVersion:"829", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 51, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5fc856f8c8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-a4f471fe95", ContainerID:"18c2adb1f0474940eb5fc872e6f23f6ee80628120650a0b40000239f83d644c0", Pod:"calico-apiserver-5fc856f8c8-xbz48", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8ef1f5d778f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:52:16.228953 env[1570]: 2024-12-13 15:52:16.209 [INFO][5610] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" Dec 13 15:52:16.228953 env[1570]: 2024-12-13 15:52:16.209 [INFO][5610] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" iface="eth0" netns="" Dec 13 15:52:16.228953 env[1570]: 2024-12-13 15:52:16.209 [INFO][5610] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" Dec 13 15:52:16.228953 env[1570]: 2024-12-13 15:52:16.209 [INFO][5610] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" Dec 13 15:52:16.228953 env[1570]: 2024-12-13 15:52:16.221 [INFO][5627] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" HandleID="k8s-pod-network.6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" Workload="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--xbz48-eth0" Dec 13 15:52:16.228953 env[1570]: 2024-12-13 15:52:16.221 [INFO][5627] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:52:16.228953 env[1570]: 2024-12-13 15:52:16.221 [INFO][5627] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:52:16.228953 env[1570]: 2024-12-13 15:52:16.226 [WARNING][5627] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" HandleID="k8s-pod-network.6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" Workload="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--xbz48-eth0" Dec 13 15:52:16.228953 env[1570]: 2024-12-13 15:52:16.226 [INFO][5627] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" HandleID="k8s-pod-network.6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" Workload="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--xbz48-eth0" Dec 13 15:52:16.228953 env[1570]: 2024-12-13 15:52:16.227 [INFO][5627] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:52:16.228953 env[1570]: 2024-12-13 15:52:16.228 [INFO][5610] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" Dec 13 15:52:16.228953 env[1570]: time="2024-12-13T15:52:16.228937591Z" level=info msg="TearDown network for sandbox \"6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f\" successfully" Dec 13 15:52:16.229337 env[1570]: time="2024-12-13T15:52:16.228959934Z" level=info msg="StopPodSandbox for \"6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f\" returns successfully" Dec 13 15:52:16.229365 env[1570]: time="2024-12-13T15:52:16.229326273Z" level=info msg="RemovePodSandbox for \"6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f\"" Dec 13 15:52:16.229390 env[1570]: time="2024-12-13T15:52:16.229355076Z" level=info msg="Forcibly stopping sandbox \"6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f\"" Dec 13 15:52:16.270172 env[1570]: 2024-12-13 15:52:16.250 [WARNING][5655] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--xbz48-eth0", GenerateName:"calico-apiserver-5fc856f8c8-", Namespace:"calico-apiserver", SelfLink:"", UID:"6317dcc4-4669-49e0-96da-846071dd95cb", ResourceVersion:"829", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 51, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5fc856f8c8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-a4f471fe95", ContainerID:"18c2adb1f0474940eb5fc872e6f23f6ee80628120650a0b40000239f83d644c0", Pod:"calico-apiserver-5fc856f8c8-xbz48", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8ef1f5d778f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:52:16.270172 env[1570]: 2024-12-13 15:52:16.250 [INFO][5655] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" Dec 13 15:52:16.270172 env[1570]: 2024-12-13 15:52:16.250 [INFO][5655] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" iface="eth0" netns="" Dec 13 15:52:16.270172 env[1570]: 2024-12-13 15:52:16.250 [INFO][5655] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" Dec 13 15:52:16.270172 env[1570]: 2024-12-13 15:52:16.250 [INFO][5655] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" Dec 13 15:52:16.270172 env[1570]: 2024-12-13 15:52:16.263 [INFO][5669] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" HandleID="k8s-pod-network.6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" Workload="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--xbz48-eth0" Dec 13 15:52:16.270172 env[1570]: 2024-12-13 15:52:16.263 [INFO][5669] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:52:16.270172 env[1570]: 2024-12-13 15:52:16.263 [INFO][5669] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:52:16.270172 env[1570]: 2024-12-13 15:52:16.267 [WARNING][5669] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" HandleID="k8s-pod-network.6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" Workload="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--xbz48-eth0" Dec 13 15:52:16.270172 env[1570]: 2024-12-13 15:52:16.267 [INFO][5669] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" HandleID="k8s-pod-network.6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" Workload="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--xbz48-eth0" Dec 13 15:52:16.270172 env[1570]: 2024-12-13 15:52:16.268 [INFO][5669] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:52:16.270172 env[1570]: 2024-12-13 15:52:16.269 [INFO][5655] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f" Dec 13 15:52:16.270555 env[1570]: time="2024-12-13T15:52:16.270188390Z" level=info msg="TearDown network for sandbox \"6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f\" successfully" Dec 13 15:52:16.271771 env[1570]: time="2024-12-13T15:52:16.271731193Z" level=info msg="RemovePodSandbox \"6f43abc56e19b84769a07ee6258887ff8d6d27338ab3022a72da6fca62b71a2f\" returns successfully" Dec 13 15:52:16.272034 env[1570]: time="2024-12-13T15:52:16.272019808Z" level=info msg="StopPodSandbox for \"4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6\"" Dec 13 15:52:16.312209 env[1570]: 2024-12-13 15:52:16.293 [WARNING][5696] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--7c7rz-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"80f5e21a-43ec-4c77-ad94-1aa18626856c", ResourceVersion:"751", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 51, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-a4f471fe95", ContainerID:"a1a9959c2ed3d13c5e593f3667813b47b8b2141b068a0d41123b488935a36913", Pod:"coredns-7db6d8ff4d-7c7rz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1e3a840f7d0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:52:16.312209 env[1570]: 2024-12-13 15:52:16.293 [INFO][5696] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" Dec 13 15:52:16.312209 env[1570]: 2024-12-13 15:52:16.293 [INFO][5696] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" iface="eth0" netns="" Dec 13 15:52:16.312209 env[1570]: 2024-12-13 15:52:16.293 [INFO][5696] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" Dec 13 15:52:16.312209 env[1570]: 2024-12-13 15:52:16.293 [INFO][5696] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" Dec 13 15:52:16.312209 env[1570]: 2024-12-13 15:52:16.305 [INFO][5707] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" HandleID="k8s-pod-network.4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" Workload="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--7c7rz-eth0" Dec 13 15:52:16.312209 env[1570]: 2024-12-13 15:52:16.305 [INFO][5707] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:52:16.312209 env[1570]: 2024-12-13 15:52:16.305 [INFO][5707] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:52:16.312209 env[1570]: 2024-12-13 15:52:16.309 [WARNING][5707] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" HandleID="k8s-pod-network.4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" Workload="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--7c7rz-eth0" Dec 13 15:52:16.312209 env[1570]: 2024-12-13 15:52:16.309 [INFO][5707] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" HandleID="k8s-pod-network.4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" Workload="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--7c7rz-eth0" Dec 13 15:52:16.312209 env[1570]: 2024-12-13 15:52:16.310 [INFO][5707] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:52:16.312209 env[1570]: 2024-12-13 15:52:16.311 [INFO][5696] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" Dec 13 15:52:16.312627 env[1570]: time="2024-12-13T15:52:16.312228518Z" level=info msg="TearDown network for sandbox \"4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6\" successfully" Dec 13 15:52:16.312627 env[1570]: time="2024-12-13T15:52:16.312249976Z" level=info msg="StopPodSandbox for \"4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6\" returns successfully" Dec 13 15:52:16.312627 env[1570]: time="2024-12-13T15:52:16.312549649Z" level=info msg="RemovePodSandbox for \"4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6\"" Dec 13 15:52:16.312627 env[1570]: time="2024-12-13T15:52:16.312572290Z" level=info msg="Forcibly stopping sandbox \"4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6\"" Dec 13 15:52:16.352060 env[1570]: 2024-12-13 15:52:16.333 [WARNING][5734] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--7c7rz-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"80f5e21a-43ec-4c77-ad94-1aa18626856c", ResourceVersion:"751", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 51, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-a4f471fe95", ContainerID:"a1a9959c2ed3d13c5e593f3667813b47b8b2141b068a0d41123b488935a36913", Pod:"coredns-7db6d8ff4d-7c7rz", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1e3a840f7d0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:52:16.352060 env[1570]: 2024-12-13 15:52:16.333 [INFO][5734] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" Dec 13 15:52:16.352060 env[1570]: 2024-12-13 15:52:16.333 [INFO][5734] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" iface="eth0" netns="" Dec 13 15:52:16.352060 env[1570]: 2024-12-13 15:52:16.333 [INFO][5734] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" Dec 13 15:52:16.352060 env[1570]: 2024-12-13 15:52:16.333 [INFO][5734] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" Dec 13 15:52:16.352060 env[1570]: 2024-12-13 15:52:16.345 [INFO][5748] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" HandleID="k8s-pod-network.4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" Workload="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--7c7rz-eth0" Dec 13 15:52:16.352060 env[1570]: 2024-12-13 15:52:16.345 [INFO][5748] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:52:16.352060 env[1570]: 2024-12-13 15:52:16.345 [INFO][5748] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:52:16.352060 env[1570]: 2024-12-13 15:52:16.349 [WARNING][5748] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" HandleID="k8s-pod-network.4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" Workload="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--7c7rz-eth0" Dec 13 15:52:16.352060 env[1570]: 2024-12-13 15:52:16.349 [INFO][5748] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" HandleID="k8s-pod-network.4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" Workload="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--7c7rz-eth0" Dec 13 15:52:16.352060 env[1570]: 2024-12-13 15:52:16.350 [INFO][5748] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:52:16.352060 env[1570]: 2024-12-13 15:52:16.351 [INFO][5734] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6" Dec 13 15:52:16.352410 env[1570]: time="2024-12-13T15:52:16.352075741Z" level=info msg="TearDown network for sandbox \"4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6\" successfully" Dec 13 15:52:16.353437 env[1570]: time="2024-12-13T15:52:16.353424152Z" level=info msg="RemovePodSandbox \"4cb1d0e7371df769d0b9fb58d439bd69ac4ec2f2f226a2aad6c8332d09586ae6\" returns successfully" Dec 13 15:52:16.353668 env[1570]: time="2024-12-13T15:52:16.353655391Z" level=info msg="StopPodSandbox for \"2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b\"" Dec 13 15:52:16.389862 env[1570]: 2024-12-13 15:52:16.372 [WARNING][5782] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--a4f471fe95-k8s-csi--node--driver--jxftf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"11d81f55-fe60-46f8-9d77-159b021295c1", ResourceVersion:"848", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 51, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-a4f471fe95", ContainerID:"702df471a209ee1a3f2a6ad084ccbc63a5b84d2e7e3efddc4430e1bda81d0844", Pod:"csi-node-driver-jxftf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.110.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali29cce53f656", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:52:16.389862 env[1570]: 2024-12-13 15:52:16.372 [INFO][5782] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" Dec 13 15:52:16.389862 env[1570]: 2024-12-13 15:52:16.372 [INFO][5782] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" iface="eth0" netns="" Dec 13 15:52:16.389862 env[1570]: 2024-12-13 15:52:16.372 [INFO][5782] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" Dec 13 15:52:16.389862 env[1570]: 2024-12-13 15:52:16.372 [INFO][5782] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" Dec 13 15:52:16.389862 env[1570]: 2024-12-13 15:52:16.383 [INFO][5795] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" HandleID="k8s-pod-network.2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" Workload="ci--3510.3.6--a--a4f471fe95-k8s-csi--node--driver--jxftf-eth0" Dec 13 15:52:16.389862 env[1570]: 2024-12-13 15:52:16.383 [INFO][5795] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:52:16.389862 env[1570]: 2024-12-13 15:52:16.383 [INFO][5795] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:52:16.389862 env[1570]: 2024-12-13 15:52:16.387 [WARNING][5795] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" HandleID="k8s-pod-network.2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" Workload="ci--3510.3.6--a--a4f471fe95-k8s-csi--node--driver--jxftf-eth0" Dec 13 15:52:16.389862 env[1570]: 2024-12-13 15:52:16.387 [INFO][5795] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" HandleID="k8s-pod-network.2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" Workload="ci--3510.3.6--a--a4f471fe95-k8s-csi--node--driver--jxftf-eth0" Dec 13 15:52:16.389862 env[1570]: 2024-12-13 15:52:16.388 [INFO][5795] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:52:16.389862 env[1570]: 2024-12-13 15:52:16.389 [INFO][5782] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" Dec 13 15:52:16.390342 env[1570]: time="2024-12-13T15:52:16.389870941Z" level=info msg="TearDown network for sandbox \"2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b\" successfully" Dec 13 15:52:16.390342 env[1570]: time="2024-12-13T15:52:16.389890086Z" level=info msg="StopPodSandbox for \"2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b\" returns successfully" Dec 13 15:52:16.390342 env[1570]: time="2024-12-13T15:52:16.390166126Z" level=info msg="RemovePodSandbox for \"2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b\"" Dec 13 15:52:16.390342 env[1570]: time="2024-12-13T15:52:16.390191831Z" level=info msg="Forcibly stopping sandbox \"2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b\"" Dec 13 15:52:16.426044 env[1570]: 2024-12-13 15:52:16.409 [WARNING][5820] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--a4f471fe95-k8s-csi--node--driver--jxftf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"11d81f55-fe60-46f8-9d77-159b021295c1", ResourceVersion:"848", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 51, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-a4f471fe95", ContainerID:"702df471a209ee1a3f2a6ad084ccbc63a5b84d2e7e3efddc4430e1bda81d0844", Pod:"csi-node-driver-jxftf", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.110.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali29cce53f656", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:52:16.426044 env[1570]: 2024-12-13 15:52:16.409 [INFO][5820] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" Dec 13 15:52:16.426044 env[1570]: 2024-12-13 15:52:16.409 [INFO][5820] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" iface="eth0" netns="" Dec 13 15:52:16.426044 env[1570]: 2024-12-13 15:52:16.409 [INFO][5820] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" Dec 13 15:52:16.426044 env[1570]: 2024-12-13 15:52:16.409 [INFO][5820] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" Dec 13 15:52:16.426044 env[1570]: 2024-12-13 15:52:16.419 [INFO][5832] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" HandleID="k8s-pod-network.2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" Workload="ci--3510.3.6--a--a4f471fe95-k8s-csi--node--driver--jxftf-eth0" Dec 13 15:52:16.426044 env[1570]: 2024-12-13 15:52:16.419 [INFO][5832] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:52:16.426044 env[1570]: 2024-12-13 15:52:16.419 [INFO][5832] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:52:16.426044 env[1570]: 2024-12-13 15:52:16.423 [WARNING][5832] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" HandleID="k8s-pod-network.2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" Workload="ci--3510.3.6--a--a4f471fe95-k8s-csi--node--driver--jxftf-eth0" Dec 13 15:52:16.426044 env[1570]: 2024-12-13 15:52:16.423 [INFO][5832] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" HandleID="k8s-pod-network.2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" Workload="ci--3510.3.6--a--a4f471fe95-k8s-csi--node--driver--jxftf-eth0" Dec 13 15:52:16.426044 env[1570]: 2024-12-13 15:52:16.424 [INFO][5832] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:52:16.426044 env[1570]: 2024-12-13 15:52:16.425 [INFO][5820] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b" Dec 13 15:52:16.426371 env[1570]: time="2024-12-13T15:52:16.426055260Z" level=info msg="TearDown network for sandbox \"2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b\" successfully" Dec 13 15:52:16.427464 env[1570]: time="2024-12-13T15:52:16.427428442Z" level=info msg="RemovePodSandbox \"2386029bda788974325fdc53c2eec16fca5bb1b649d3990c9170ce08a760ef8b\" returns successfully" Dec 13 15:52:16.427700 env[1570]: time="2024-12-13T15:52:16.427681826Z" level=info msg="StopPodSandbox for \"c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57\"" Dec 13 15:52:16.463004 env[1570]: 2024-12-13 15:52:16.446 [WARNING][5859] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--9rnvx-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"bdd6c047-a986-425d-afa8-7e18fd8918ce", ResourceVersion:"792", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 51, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-a4f471fe95", ContainerID:"427ebc1662455ff35ae09379d804197ab1d4c5be00cdfa0d2c4fbe890ef04219", Pod:"coredns-7db6d8ff4d-9rnvx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie158c05817b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:52:16.463004 env[1570]: 2024-12-13 15:52:16.446 [INFO][5859] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" Dec 13 15:52:16.463004 env[1570]: 2024-12-13 15:52:16.446 [INFO][5859] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" iface="eth0" netns="" Dec 13 15:52:16.463004 env[1570]: 2024-12-13 15:52:16.446 [INFO][5859] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" Dec 13 15:52:16.463004 env[1570]: 2024-12-13 15:52:16.446 [INFO][5859] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" Dec 13 15:52:16.463004 env[1570]: 2024-12-13 15:52:16.456 [INFO][5871] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" HandleID="k8s-pod-network.c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" Workload="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--9rnvx-eth0" Dec 13 15:52:16.463004 env[1570]: 2024-12-13 15:52:16.456 [INFO][5871] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:52:16.463004 env[1570]: 2024-12-13 15:52:16.456 [INFO][5871] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:52:16.463004 env[1570]: 2024-12-13 15:52:16.460 [WARNING][5871] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" HandleID="k8s-pod-network.c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" Workload="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--9rnvx-eth0" Dec 13 15:52:16.463004 env[1570]: 2024-12-13 15:52:16.460 [INFO][5871] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" HandleID="k8s-pod-network.c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" Workload="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--9rnvx-eth0" Dec 13 15:52:16.463004 env[1570]: 2024-12-13 15:52:16.461 [INFO][5871] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:52:16.463004 env[1570]: 2024-12-13 15:52:16.462 [INFO][5859] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" Dec 13 15:52:16.463370 env[1570]: time="2024-12-13T15:52:16.463023203Z" level=info msg="TearDown network for sandbox \"c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57\" successfully" Dec 13 15:52:16.463370 env[1570]: time="2024-12-13T15:52:16.463043610Z" level=info msg="StopPodSandbox for \"c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57\" returns successfully" Dec 13 15:52:16.463370 env[1570]: time="2024-12-13T15:52:16.463332485Z" level=info msg="RemovePodSandbox for \"c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57\"" Dec 13 15:52:16.463370 env[1570]: time="2024-12-13T15:52:16.463352881Z" level=info msg="Forcibly stopping sandbox \"c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57\"" Dec 13 15:52:16.505866 env[1570]: 2024-12-13 15:52:16.485 [WARNING][5899] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--9rnvx-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"bdd6c047-a986-425d-afa8-7e18fd8918ce", ResourceVersion:"792", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 51, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-a4f471fe95", ContainerID:"427ebc1662455ff35ae09379d804197ab1d4c5be00cdfa0d2c4fbe890ef04219", Pod:"coredns-7db6d8ff4d-9rnvx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie158c05817b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:52:16.505866 env[1570]: 2024-12-13 15:52:16.485 [INFO][5899] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" Dec 13 15:52:16.505866 env[1570]: 2024-12-13 15:52:16.485 [INFO][5899] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" iface="eth0" netns="" Dec 13 15:52:16.505866 env[1570]: 2024-12-13 15:52:16.485 [INFO][5899] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" Dec 13 15:52:16.505866 env[1570]: 2024-12-13 15:52:16.485 [INFO][5899] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" Dec 13 15:52:16.505866 env[1570]: 2024-12-13 15:52:16.498 [INFO][5913] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" HandleID="k8s-pod-network.c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" Workload="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--9rnvx-eth0" Dec 13 15:52:16.505866 env[1570]: 2024-12-13 15:52:16.498 [INFO][5913] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:52:16.505866 env[1570]: 2024-12-13 15:52:16.498 [INFO][5913] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:52:16.505866 env[1570]: 2024-12-13 15:52:16.502 [WARNING][5913] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" HandleID="k8s-pod-network.c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" Workload="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--9rnvx-eth0" Dec 13 15:52:16.505866 env[1570]: 2024-12-13 15:52:16.502 [INFO][5913] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" HandleID="k8s-pod-network.c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" Workload="ci--3510.3.6--a--a4f471fe95-k8s-coredns--7db6d8ff4d--9rnvx-eth0" Dec 13 15:52:16.505866 env[1570]: 2024-12-13 15:52:16.504 [INFO][5913] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:52:16.505866 env[1570]: 2024-12-13 15:52:16.505 [INFO][5899] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57" Dec 13 15:52:16.505866 env[1570]: time="2024-12-13T15:52:16.505824456Z" level=info msg="TearDown network for sandbox \"c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57\" successfully" Dec 13 15:52:16.515284 env[1570]: time="2024-12-13T15:52:16.515257354Z" level=info msg="RemovePodSandbox \"c7f34972e43941d27c9f65c6f72ccf6c68a35860794a22e5d131cbaf3a784b57\" returns successfully" Dec 13 15:52:16.515588 env[1570]: time="2024-12-13T15:52:16.515571589Z" level=info msg="StopPodSandbox for \"7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99\"" Dec 13 15:52:16.559860 env[1570]: 2024-12-13 15:52:16.538 [WARNING][5944] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--lxqwx-eth0", GenerateName:"calico-apiserver-5fc856f8c8-", Namespace:"calico-apiserver", SelfLink:"", UID:"f8f4d6d7-9983-47ab-aeca-6edc82b7ad2b", ResourceVersion:"826", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 51, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5fc856f8c8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-a4f471fe95", ContainerID:"3809a76cdd6f4c0d5fddc67dffda192b36016307706528db74f4e3d589b6fd86", Pod:"calico-apiserver-5fc856f8c8-lxqwx", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie03fa54f359", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:52:16.559860 env[1570]: 2024-12-13 15:52:16.538 [INFO][5944] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" Dec 13 15:52:16.559860 env[1570]: 2024-12-13 15:52:16.538 [INFO][5944] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" iface="eth0" netns="" Dec 13 15:52:16.559860 env[1570]: 2024-12-13 15:52:16.538 [INFO][5944] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" Dec 13 15:52:16.559860 env[1570]: 2024-12-13 15:52:16.538 [INFO][5944] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" Dec 13 15:52:16.559860 env[1570]: 2024-12-13 15:52:16.552 [INFO][5960] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" HandleID="k8s-pod-network.7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" Workload="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--lxqwx-eth0" Dec 13 15:52:16.559860 env[1570]: 2024-12-13 15:52:16.552 [INFO][5960] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:52:16.559860 env[1570]: 2024-12-13 15:52:16.552 [INFO][5960] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:52:16.559860 env[1570]: 2024-12-13 15:52:16.556 [WARNING][5960] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" HandleID="k8s-pod-network.7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" Workload="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--lxqwx-eth0" Dec 13 15:52:16.559860 env[1570]: 2024-12-13 15:52:16.556 [INFO][5960] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" HandleID="k8s-pod-network.7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" Workload="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--lxqwx-eth0" Dec 13 15:52:16.559860 env[1570]: 2024-12-13 15:52:16.558 [INFO][5960] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:52:16.559860 env[1570]: 2024-12-13 15:52:16.559 [INFO][5944] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" Dec 13 15:52:16.559860 env[1570]: time="2024-12-13T15:52:16.559849799Z" level=info msg="TearDown network for sandbox \"7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99\" successfully" Dec 13 15:52:16.560295 env[1570]: time="2024-12-13T15:52:16.559874240Z" level=info msg="StopPodSandbox for \"7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99\" returns successfully" Dec 13 15:52:16.560295 env[1570]: time="2024-12-13T15:52:16.560210993Z" level=info msg="RemovePodSandbox for \"7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99\"" Dec 13 15:52:16.560295 env[1570]: time="2024-12-13T15:52:16.560232843Z" level=info msg="Forcibly stopping sandbox \"7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99\"" Dec 13 15:52:16.603726 env[1570]: 2024-12-13 15:52:16.583 [WARNING][5990] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--lxqwx-eth0", GenerateName:"calico-apiserver-5fc856f8c8-", Namespace:"calico-apiserver", SelfLink:"", UID:"f8f4d6d7-9983-47ab-aeca-6edc82b7ad2b", ResourceVersion:"826", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 51, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5fc856f8c8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-a4f471fe95", ContainerID:"3809a76cdd6f4c0d5fddc67dffda192b36016307706528db74f4e3d589b6fd86", Pod:"calico-apiserver-5fc856f8c8-lxqwx", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie03fa54f359", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:52:16.603726 env[1570]: 2024-12-13 15:52:16.583 [INFO][5990] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" Dec 13 15:52:16.603726 env[1570]: 2024-12-13 15:52:16.583 [INFO][5990] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" iface="eth0" netns="" Dec 13 15:52:16.603726 env[1570]: 2024-12-13 15:52:16.583 [INFO][5990] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" Dec 13 15:52:16.603726 env[1570]: 2024-12-13 15:52:16.583 [INFO][5990] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" Dec 13 15:52:16.603726 env[1570]: 2024-12-13 15:52:16.596 [INFO][6007] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" HandleID="k8s-pod-network.7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" Workload="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--lxqwx-eth0" Dec 13 15:52:16.603726 env[1570]: 2024-12-13 15:52:16.597 [INFO][6007] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:52:16.603726 env[1570]: 2024-12-13 15:52:16.597 [INFO][6007] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:52:16.603726 env[1570]: 2024-12-13 15:52:16.600 [WARNING][6007] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" HandleID="k8s-pod-network.7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" Workload="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--lxqwx-eth0" Dec 13 15:52:16.603726 env[1570]: 2024-12-13 15:52:16.601 [INFO][6007] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" HandleID="k8s-pod-network.7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" Workload="ci--3510.3.6--a--a4f471fe95-k8s-calico--apiserver--5fc856f8c8--lxqwx-eth0" Dec 13 15:52:16.603726 env[1570]: 2024-12-13 15:52:16.602 [INFO][6007] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:52:16.603726 env[1570]: 2024-12-13 15:52:16.603 [INFO][5990] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99" Dec 13 15:52:16.604138 env[1570]: time="2024-12-13T15:52:16.603757407Z" level=info msg="TearDown network for sandbox \"7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99\" successfully" Dec 13 15:52:16.605819 env[1570]: time="2024-12-13T15:52:16.605773355Z" level=info msg="RemovePodSandbox \"7f267d0d75b17548c13a64704edad4d0d3208159a538844a355df033a0077c99\" returns successfully" Dec 13 15:52:16.606145 env[1570]: time="2024-12-13T15:52:16.606126969Z" level=info msg="StopPodSandbox for \"e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce\"" Dec 13 15:52:16.649911 env[1570]: 2024-12-13 15:52:16.628 [WARNING][6038] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--a4f471fe95-k8s-calico--kube--controllers--656bc8f995--2lkj6-eth0", GenerateName:"calico-kube-controllers-656bc8f995-", Namespace:"calico-system", SelfLink:"", UID:"b97ba304-f837-40f1-b3de-a9b43217ec78", ResourceVersion:"809", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 51, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"656bc8f995", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-a4f471fe95", ContainerID:"187127ace754a8cdbd1a8a5380439ee44098b2243f2a1bd476221b94edb59100", Pod:"calico-kube-controllers-656bc8f995-2lkj6", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.110.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali9dcd0562887", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:52:16.649911 env[1570]: 2024-12-13 15:52:16.629 [INFO][6038] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" Dec 13 15:52:16.649911 env[1570]: 2024-12-13 15:52:16.629 [INFO][6038] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" iface="eth0" netns="" Dec 13 15:52:16.649911 env[1570]: 2024-12-13 15:52:16.629 [INFO][6038] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" Dec 13 15:52:16.649911 env[1570]: 2024-12-13 15:52:16.629 [INFO][6038] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" Dec 13 15:52:16.649911 env[1570]: 2024-12-13 15:52:16.642 [INFO][6055] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" HandleID="k8s-pod-network.e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" Workload="ci--3510.3.6--a--a4f471fe95-k8s-calico--kube--controllers--656bc8f995--2lkj6-eth0" Dec 13 15:52:16.649911 env[1570]: 2024-12-13 15:52:16.642 [INFO][6055] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:52:16.649911 env[1570]: 2024-12-13 15:52:16.642 [INFO][6055] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:52:16.649911 env[1570]: 2024-12-13 15:52:16.647 [WARNING][6055] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" HandleID="k8s-pod-network.e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" Workload="ci--3510.3.6--a--a4f471fe95-k8s-calico--kube--controllers--656bc8f995--2lkj6-eth0" Dec 13 15:52:16.649911 env[1570]: 2024-12-13 15:52:16.647 [INFO][6055] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" HandleID="k8s-pod-network.e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" Workload="ci--3510.3.6--a--a4f471fe95-k8s-calico--kube--controllers--656bc8f995--2lkj6-eth0" Dec 13 15:52:16.649911 env[1570]: 2024-12-13 15:52:16.648 [INFO][6055] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:52:16.649911 env[1570]: 2024-12-13 15:52:16.649 [INFO][6038] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" Dec 13 15:52:16.650329 env[1570]: time="2024-12-13T15:52:16.649927500Z" level=info msg="TearDown network for sandbox \"e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce\" successfully" Dec 13 15:52:16.650329 env[1570]: time="2024-12-13T15:52:16.649949583Z" level=info msg="StopPodSandbox for \"e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce\" returns successfully" Dec 13 15:52:16.650329 env[1570]: time="2024-12-13T15:52:16.650223820Z" level=info msg="RemovePodSandbox for \"e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce\"" Dec 13 15:52:16.650329 env[1570]: time="2024-12-13T15:52:16.650244847Z" level=info msg="Forcibly stopping sandbox \"e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce\"" Dec 13 15:52:16.694051 env[1570]: 2024-12-13 15:52:16.673 [WARNING][6085] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--a4f471fe95-k8s-calico--kube--controllers--656bc8f995--2lkj6-eth0", GenerateName:"calico-kube-controllers-656bc8f995-", Namespace:"calico-system", SelfLink:"", UID:"b97ba304-f837-40f1-b3de-a9b43217ec78", ResourceVersion:"809", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 15, 51, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"656bc8f995", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-a4f471fe95", ContainerID:"187127ace754a8cdbd1a8a5380439ee44098b2243f2a1bd476221b94edb59100", Pod:"calico-kube-controllers-656bc8f995-2lkj6", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.110.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali9dcd0562887", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 15:52:16.694051 env[1570]: 2024-12-13 15:52:16.673 [INFO][6085] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" Dec 13 15:52:16.694051 env[1570]: 2024-12-13 15:52:16.673 [INFO][6085] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" iface="eth0" netns="" Dec 13 15:52:16.694051 env[1570]: 2024-12-13 15:52:16.673 [INFO][6085] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" Dec 13 15:52:16.694051 env[1570]: 2024-12-13 15:52:16.673 [INFO][6085] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" Dec 13 15:52:16.694051 env[1570]: 2024-12-13 15:52:16.687 [INFO][6101] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" HandleID="k8s-pod-network.e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" Workload="ci--3510.3.6--a--a4f471fe95-k8s-calico--kube--controllers--656bc8f995--2lkj6-eth0" Dec 13 15:52:16.694051 env[1570]: 2024-12-13 15:52:16.687 [INFO][6101] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 15:52:16.694051 env[1570]: 2024-12-13 15:52:16.687 [INFO][6101] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 15:52:16.694051 env[1570]: 2024-12-13 15:52:16.691 [WARNING][6101] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" HandleID="k8s-pod-network.e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" Workload="ci--3510.3.6--a--a4f471fe95-k8s-calico--kube--controllers--656bc8f995--2lkj6-eth0" Dec 13 15:52:16.694051 env[1570]: 2024-12-13 15:52:16.691 [INFO][6101] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" HandleID="k8s-pod-network.e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" Workload="ci--3510.3.6--a--a4f471fe95-k8s-calico--kube--controllers--656bc8f995--2lkj6-eth0" Dec 13 15:52:16.694051 env[1570]: 2024-12-13 15:52:16.692 [INFO][6101] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 15:52:16.694051 env[1570]: 2024-12-13 15:52:16.693 [INFO][6085] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce" Dec 13 15:52:16.694498 env[1570]: time="2024-12-13T15:52:16.694070434Z" level=info msg="TearDown network for sandbox \"e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce\" successfully" Dec 13 15:52:16.695697 env[1570]: time="2024-12-13T15:52:16.695678788Z" level=info msg="RemovePodSandbox \"e92274950f314296671fa2ff75a6304980b217d82cfe5880b4af0b64eef094ce\" returns successfully" Dec 13 15:52:34.960811 kubelet[2644]: I1213 15:52:34.960689 2644 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 15:52:34.991892 kubelet[2644]: I1213 15:52:34.991868 2644 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 15:52:34.994000 audit[6151]: NETFILTER_CFG table=filter:116 family=2 entries=9 op=nft_register_rule pid=6151 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:52:35.023593 kernel: kauditd_printk_skb: 26 callbacks suppressed Dec 13 15:52:35.023684 kernel: audit: type=1325 audit(1734105154.994:1346): table=filter:116 family=2 entries=9 op=nft_register_rule pid=6151 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:52:34.994000 audit[6151]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc31c9d4e0 a2=0 a3=7ffc31c9d4cc items=0 ppid=2919 pid=6151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:35.181508 kernel: audit: type=1300 audit(1734105154.994:1346): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc31c9d4e0 a2=0 a3=7ffc31c9d4cc items=0 ppid=2919 pid=6151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:35.181541 kernel: audit: type=1327 audit(1734105154.994:1346): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:52:34.994000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:52:35.248000 audit[6151]: NETFILTER_CFG table=nat:117 family=2 entries=27 op=nft_register_chain pid=6151 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:52:35.248000 audit[6151]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc31c9d4e0 a2=0 a3=7ffc31c9d4cc items=0 ppid=2919 pid=6151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:35.406615 kernel: audit: type=1325 audit(1734105155.248:1347): table=nat:117 family=2 entries=27 op=nft_register_chain pid=6151 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:52:35.406648 kernel: audit: type=1300 audit(1734105155.248:1347): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc31c9d4e0 a2=0 a3=7ffc31c9d4cc items=0 ppid=2919 pid=6151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:35.406665 kernel: audit: type=1327 audit(1734105155.248:1347): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:52:35.248000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:52:35.472000 audit[6153]: NETFILTER_CFG table=filter:118 family=2 entries=8 op=nft_register_rule pid=6153 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:52:35.472000 audit[6153]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc1aa1d450 a2=0 a3=7ffc1aa1d43c items=0 ppid=2919 pid=6153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:35.633351 kernel: audit: type=1325 audit(1734105155.472:1348): table=filter:118 family=2 entries=8 op=nft_register_rule pid=6153 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:52:35.633424 kernel: audit: type=1300 audit(1734105155.472:1348): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc1aa1d450 a2=0 a3=7ffc1aa1d43c items=0 ppid=2919 pid=6153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:35.633443 kernel: audit: type=1327 audit(1734105155.472:1348): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:52:35.472000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:52:35.704000 audit[6153]: NETFILTER_CFG table=nat:119 family=2 entries=34 op=nft_register_chain pid=6153 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:52:35.704000 audit[6153]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffc1aa1d450 a2=0 a3=7ffc1aa1d43c items=0 ppid=2919 pid=6153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:52:35.765600 kernel: audit: type=1325 audit(1734105155.704:1349): table=nat:119 family=2 entries=34 op=nft_register_chain pid=6153 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:52:35.704000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:53:08.245000 audit[5389]: AVC avc: denied { watch } for pid=5389 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_51_46.2152576997/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c754 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c3,c754 tclass=file permissive=0 Dec 13 15:53:08.273148 kernel: kauditd_printk_skb: 2 callbacks suppressed Dec 13 15:53:08.273196 kernel: audit: type=1400 audit(1734105188.245:1350): avc: denied { watch } for pid=5389 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_51_46.2152576997/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c754 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c3,c754 tclass=file permissive=0 Dec 13 15:53:08.245000 audit[5389]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c002683080 a2=fc6 a3=0 items=0 ppid=5016 pid=5389 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c754 key=(null) Dec 13 15:53:08.490859 kernel: audit: type=1300 audit(1734105188.245:1350): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c002683080 a2=fc6 a3=0 items=0 ppid=5016 pid=5389 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c754 key=(null) Dec 13 15:53:08.490896 kernel: audit: type=1327 audit(1734105188.245:1350): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:53:08.245000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:53:08.583508 kernel: audit: type=1400 audit(1734105188.395:1351): avc: denied { watch } for pid=5417 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_51_46.403036532/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c782,c860 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c782,c860 tclass=file permissive=0 Dec 13 15:53:08.395000 audit[5417]: AVC avc: denied { watch } for pid=5417 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_51_46.403036532/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c782,c860 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c782,c860 tclass=file permissive=0 Dec 13 15:53:08.395000 audit[5417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001516ca0 a2=fc6 a3=0 items=0 ppid=5008 pid=5417 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c782,c860 key=(null) Dec 13 15:53:08.797417 kernel: audit: type=1300 audit(1734105188.395:1351): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001516ca0 a2=fc6 a3=0 items=0 ppid=5008 pid=5417 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c782,c860 key=(null) Dec 13 15:53:08.797455 kernel: audit: type=1327 audit(1734105188.395:1351): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:53:08.395000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:53:12.566000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:53:12.566000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:53:12.750831 kernel: audit: type=1400 audit(1734105192.566:1352): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:53:12.750877 kernel: audit: type=1400 audit(1734105192.566:1353): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:53:12.750897 kernel: audit: type=1300 audit(1734105192.566:1352): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0032e2d50 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:53:12.566000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0032e2d50 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:53:12.871562 kernel: audit: type=1300 audit(1734105192.566:1353): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002b2bc00 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:53:12.566000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002b2bc00 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:53:12.566000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:53:12.566000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:53:12.575000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:53:12.575000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00f309710 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:53:12.575000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:53:12.575000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:53:12.575000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00f766120 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:53:12.575000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:53:12.575000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:53:12.575000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00e1c45a0 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:53:12.575000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:53:12.575000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:53:12.575000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c010196630 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:53:12.575000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:53:12.576000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:53:12.576000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c006c0af80 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:53:12.576000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:53:12.577000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:53:12.577000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00f766270 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:53:12.577000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:53:15.962000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:53:16.007420 kernel: kauditd_printk_skb: 20 callbacks suppressed Dec 13 15:53:16.007525 kernel: audit: type=1400 audit(1734105195.962:1360): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:53:15.962000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001234a00 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:53:16.099559 kernel: audit: type=1300 audit(1734105195.962:1360): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001234a00 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:53:15.962000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:53:16.310808 kernel: audit: type=1327 audit(1734105195.962:1360): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:53:16.310853 kernel: audit: type=1400 audit(1734105195.962:1361): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:53:15.962000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:53:16.400622 kernel: audit: type=1300 audit(1734105195.962:1361): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00340ae60 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:53:15.962000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00340ae60 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:53:16.521162 kernel: audit: type=1327 audit(1734105195.962:1361): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:53:15.962000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:53:16.614462 kernel: audit: type=1400 audit(1734105195.962:1362): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:53:15.962000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:53:16.704655 kernel: audit: type=1300 audit(1734105195.962:1362): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c00079b140 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:53:15.962000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c00079b140 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:53:16.825272 kernel: audit: type=1327 audit(1734105195.962:1362): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:53:15.962000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:53:15.963000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:53:17.009071 kernel: audit: type=1400 audit(1734105195.963:1363): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:53:15.963000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00340ae80 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:53:15.963000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:54:08.246000 audit[5389]: AVC avc: denied { watch } for pid=5389 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_51_46.2152576997/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c754 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c3,c754 tclass=file permissive=0 Dec 13 15:54:08.273770 kernel: kauditd_printk_skb: 2 callbacks suppressed Dec 13 15:54:08.273815 kernel: audit: type=1400 audit(1734105248.246:1364): avc: denied { watch } for pid=5389 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_51_46.2152576997/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c754 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c3,c754 tclass=file permissive=0 Dec 13 15:54:08.246000 audit[5389]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0018dee00 a2=fc6 a3=0 items=0 ppid=5016 pid=5389 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c754 key=(null) Dec 13 15:54:08.488023 kernel: audit: type=1300 audit(1734105248.246:1364): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0018dee00 a2=fc6 a3=0 items=0 ppid=5016 pid=5389 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c754 key=(null) Dec 13 15:54:08.488119 kernel: audit: type=1327 audit(1734105248.246:1364): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:54:08.246000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:54:08.582074 kernel: audit: type=1400 audit(1734105248.395:1365): avc: denied { watch } for pid=5417 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_51_46.403036532/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c782,c860 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c782,c860 tclass=file permissive=0 Dec 13 15:54:08.395000 audit[5417]: AVC avc: denied { watch } for pid=5417 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_51_46.403036532/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c782,c860 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c782,c860 tclass=file permissive=0 Dec 13 15:54:08.677065 kernel: audit: type=1300 audit(1734105248.395:1365): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0020aad00 a2=fc6 a3=0 items=0 ppid=5008 pid=5417 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c782,c860 key=(null) Dec 13 15:54:08.395000 audit[5417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0020aad00 a2=fc6 a3=0 items=0 ppid=5008 pid=5417 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c782,c860 key=(null) Dec 13 15:54:08.797558 kernel: audit: type=1327 audit(1734105248.395:1365): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:54:08.395000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:54:12.567000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:54:12.567000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ab5f80 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:54:12.779295 kernel: audit: type=1400 audit(1734105252.567:1366): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:54:12.779340 kernel: audit: type=1300 audit(1734105252.567:1366): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ab5f80 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:54:12.779357 kernel: audit: type=1327 audit(1734105252.567:1366): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:54:12.567000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:54:12.872260 kernel: audit: type=1400 audit(1734105252.567:1367): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:54:12.567000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:54:12.567000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002bbc2d0 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:54:12.567000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:54:12.638000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:54:12.638000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00756c030 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:54:12.638000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:54:12.638000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:54:12.638000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c008ac0240 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:54:12.638000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:54:12.638000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:54:12.638000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00756c0c0 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:54:12.638000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:54:12.638000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:54:12.638000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c007650540 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:54:12.638000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:54:12.638000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:54:12.638000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c008414b00 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:54:12.638000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:54:12.638000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:54:12.638000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c0037a40e0 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:54:12.638000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:54:15.963000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:54:15.990876 kernel: kauditd_printk_skb: 20 callbacks suppressed Dec 13 15:54:15.990964 kernel: audit: type=1400 audit(1734105255.963:1374): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:54:15.963000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0036b6280 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:54:16.201815 kernel: audit: type=1300 audit(1734105255.963:1374): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0036b6280 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:54:16.201850 kernel: audit: type=1327 audit(1734105255.963:1374): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:54:15.963000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:54:16.296203 kernel: audit: type=1400 audit(1734105255.963:1375): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:54:15.963000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:54:16.385444 kernel: audit: type=1300 audit(1734105255.963:1375): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c003141b80 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:54:15.963000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c003141b80 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:54:16.506103 kernel: audit: type=1327 audit(1734105255.963:1375): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:54:15.963000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:54:16.601048 kernel: audit: type=1400 audit(1734105255.963:1376): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:54:15.963000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:54:16.690941 kernel: audit: type=1300 audit(1734105255.963:1376): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001ab5fa0 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:54:15.963000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c001ab5fa0 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:54:16.811267 kernel: audit: type=1327 audit(1734105255.963:1376): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:54:15.963000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:54:15.963000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:54:16.994298 kernel: audit: type=1400 audit(1734105255.963:1377): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:54:15.963000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003141ba0 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:54:15.963000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:54:48.367935 systemd[1]: Started sshd@9-147.28.180.221:22-139.59.212.127:47504.service. Dec 13 15:54:48.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.28.180.221:22-139.59.212.127:47504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:54:48.394978 kernel: kauditd_printk_skb: 2 callbacks suppressed Dec 13 15:54:48.395062 kernel: audit: type=1130 audit(1734105288.366:1378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.28.180.221:22-139.59.212.127:47504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:54:48.979175 sshd[6507]: Invalid user vyos from 139.59.212.127 port 47504 Dec 13 15:54:49.132826 sshd[6507]: pam_faillock(sshd:auth): User unknown Dec 13 15:54:49.134042 sshd[6507]: pam_unix(sshd:auth): check pass; user unknown Dec 13 15:54:49.134197 sshd[6507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.212.127 Dec 13 15:54:49.135278 sshd[6507]: pam_faillock(sshd:auth): User unknown Dec 13 15:54:49.134000 audit[6507]: USER_AUTH pid=6507 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="vyos" exe="/usr/sbin/sshd" hostname=139.59.212.127 addr=139.59.212.127 terminal=ssh res=failed' Dec 13 15:54:49.226578 kernel: audit: type=1100 audit(1734105289.134:1379): pid=6507 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="vyos" exe="/usr/sbin/sshd" hostname=139.59.212.127 addr=139.59.212.127 terminal=ssh res=failed' Dec 13 15:54:51.306699 sshd[6507]: Failed password for invalid user vyos from 139.59.212.127 port 47504 ssh2 Dec 13 15:54:53.276515 sshd[6507]: Connection closed by invalid user vyos 139.59.212.127 port 47504 [preauth] Dec 13 15:54:53.279176 systemd[1]: sshd@9-147.28.180.221:22-139.59.212.127:47504.service: Deactivated successfully. Dec 13 15:54:53.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.28.180.221:22-139.59.212.127:47504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:54:53.370695 kernel: audit: type=1131 audit(1734105293.278:1380): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.28.180.221:22-139.59.212.127:47504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:55:08.247000 audit[5389]: AVC avc: denied { watch } for pid=5389 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_51_46.2152576997/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c754 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c3,c754 tclass=file permissive=0 Dec 13 15:55:08.247000 audit[5389]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0018de000 a2=fc6 a3=0 items=0 ppid=5016 pid=5389 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c754 key=(null) Dec 13 15:55:08.470013 kernel: audit: type=1400 audit(1734105308.247:1381): avc: denied { watch } for pid=5389 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_51_46.2152576997/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c754 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c3,c754 tclass=file permissive=0 Dec 13 15:55:08.470051 kernel: audit: type=1300 audit(1734105308.247:1381): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0018de000 a2=fc6 a3=0 items=0 ppid=5016 pid=5389 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c754 key=(null) Dec 13 15:55:08.470069 kernel: audit: type=1327 audit(1734105308.247:1381): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:55:08.247000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:55:08.563217 kernel: audit: type=1400 audit(1734105308.396:1382): avc: denied { watch } for pid=5417 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_51_46.403036532/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c782,c860 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c782,c860 tclass=file permissive=0 Dec 13 15:55:08.396000 audit[5417]: AVC avc: denied { watch } for pid=5417 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_51_46.403036532/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c782,c860 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c782,c860 tclass=file permissive=0 Dec 13 15:55:08.657573 kernel: audit: type=1300 audit(1734105308.396:1382): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0020aa060 a2=fc6 a3=0 items=0 ppid=5008 pid=5417 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c782,c860 key=(null) Dec 13 15:55:08.396000 audit[5417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0020aa060 a2=fc6 a3=0 items=0 ppid=5008 pid=5417 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c782,c860 key=(null) Dec 13 15:55:08.778311 kernel: audit: type=1327 audit(1734105308.396:1382): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:55:08.396000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:55:12.568000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:55:12.568000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003140da0 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:55:12.780926 kernel: audit: type=1400 audit(1734105312.568:1383): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:55:12.780983 kernel: audit: type=1300 audit(1734105312.568:1383): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003140da0 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:55:12.781005 kernel: audit: type=1327 audit(1734105312.568:1383): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:55:12.568000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:55:12.568000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:55:12.874553 kernel: audit: type=1400 audit(1734105312.568:1384): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:55:12.568000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c341e0 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:55:12.568000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:55:12.639000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:55:12.639000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00180f0c0 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:55:12.639000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:55:12.639000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:55:12.639000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00fe20a50 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:55:12.639000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:55:12.639000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:55:12.639000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:55:12.639000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0075fd500 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:55:12.639000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c010aac3c0 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:55:12.639000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:55:12.639000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:55:12.639000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:55:12.639000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00acc13c0 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:55:12.639000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:55:12.639000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:55:12.639000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c010aac3f0 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:55:12.639000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:55:15.964000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:55:16.007544 kernel: kauditd_printk_skb: 20 callbacks suppressed Dec 13 15:55:16.007627 kernel: audit: type=1400 audit(1734105315.964:1391): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:55:15.964000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a54380 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:55:16.220355 kernel: audit: type=1300 audit(1734105315.964:1391): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a54380 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:55:16.220439 kernel: audit: type=1327 audit(1734105315.964:1391): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:55:15.964000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:55:16.315095 kernel: audit: type=1400 audit(1734105315.964:1392): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:55:15.964000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:55:16.404948 kernel: audit: type=1300 audit(1734105315.964:1392): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001390fc0 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:55:15.964000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001390fc0 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:55:16.525152 kernel: audit: type=1327 audit(1734105315.964:1392): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:55:15.964000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:55:16.618166 kernel: audit: type=1400 audit(1734105315.964:1393): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:55:15.964000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:55:16.707960 kernel: audit: type=1300 audit(1734105315.964:1393): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c003140dc0 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:55:15.964000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c003140dc0 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:55:16.828206 kernel: audit: type=1327 audit(1734105315.964:1393): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:55:15.964000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:55:16.921230 kernel: audit: type=1400 audit(1734105315.964:1394): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:55:15.964000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:55:15.964000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001390fe0 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:55:15.964000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:56:08.248000 audit[5389]: AVC avc: denied { watch } for pid=5389 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_51_46.2152576997/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c754 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c3,c754 tclass=file permissive=0 Dec 13 15:56:08.276886 kernel: kauditd_printk_skb: 2 callbacks suppressed Dec 13 15:56:08.276952 kernel: audit: type=1400 audit(1734105368.248:1395): avc: denied { watch } for pid=5389 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_51_46.2152576997/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c754 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c3,c754 tclass=file permissive=0 Dec 13 15:56:08.248000 audit[5389]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0018dea60 a2=fc6 a3=0 items=0 ppid=5016 pid=5389 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c754 key=(null) Dec 13 15:56:08.493758 kernel: audit: type=1300 audit(1734105368.248:1395): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0018dea60 a2=fc6 a3=0 items=0 ppid=5016 pid=5389 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c754 key=(null) Dec 13 15:56:08.493810 kernel: audit: type=1327 audit(1734105368.248:1395): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:56:08.248000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:56:08.585957 kernel: audit: type=1400 audit(1734105368.397:1396): avc: denied { watch } for pid=5417 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_51_46.403036532/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c782,c860 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c782,c860 tclass=file permissive=0 Dec 13 15:56:08.397000 audit[5417]: AVC avc: denied { watch } for pid=5417 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_51_46.403036532/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c782,c860 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c782,c860 tclass=file permissive=0 Dec 13 15:56:08.679672 kernel: audit: type=1300 audit(1734105368.397:1396): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b6c0e0 a2=fc6 a3=0 items=0 ppid=5008 pid=5417 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c782,c860 key=(null) Dec 13 15:56:08.397000 audit[5417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b6c0e0 a2=fc6 a3=0 items=0 ppid=5008 pid=5417 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c782,c860 key=(null) Dec 13 15:56:08.800104 kernel: audit: type=1327 audit(1734105368.397:1396): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:56:08.397000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:56:12.569000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:56:12.569000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003839620 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:56:12.782288 kernel: audit: type=1400 audit(1734105372.569:1397): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:56:12.782324 kernel: audit: type=1300 audit(1734105372.569:1397): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003839620 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:56:12.782340 kernel: audit: type=1327 audit(1734105372.569:1397): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:56:12.569000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:56:12.875234 kernel: audit: type=1400 audit(1734105372.569:1398): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:56:12.569000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:56:12.569000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b16510 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:56:12.569000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:56:12.640000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:56:12.640000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c009f8a810 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:56:12.640000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:56:12.640000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:56:12.640000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c004d19620 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:56:12.640000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:56:12.640000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:56:12.640000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:56:12.640000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c009f8a870 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:56:12.640000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:56:12.640000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c007a1cab0 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:56:12.640000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:56:12.640000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:56:12.640000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:56:12.640000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c004d19680 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:56:12.640000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:56:12.640000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c0032b8090 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:56:12.640000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:56:15.964000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:56:15.992721 kernel: kauditd_printk_skb: 20 callbacks suppressed Dec 13 15:56:15.992774 kernel: audit: type=1400 audit(1734105375.964:1405): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:56:15.964000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013f78e0 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:56:16.202950 kernel: audit: type=1300 audit(1734105375.964:1405): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013f78e0 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:56:16.202987 kernel: audit: type=1327 audit(1734105375.964:1405): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:56:15.964000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:56:16.295240 kernel: audit: type=1400 audit(1734105375.964:1407): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:56:15.964000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:56:16.384514 kernel: audit: type=1400 audit(1734105375.964:1406): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:56:15.964000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:56:16.474436 kernel: audit: type=1300 audit(1734105375.964:1407): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c003839640 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:56:15.964000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c003839640 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:56:16.594697 kernel: audit: type=1327 audit(1734105375.964:1407): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:56:15.964000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:56:16.687852 kernel: audit: type=1300 audit(1734105375.964:1406): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c1ae20 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:56:15.964000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001c1ae20 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:56:16.808170 kernel: audit: type=1327 audit(1734105375.964:1406): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:56:15.964000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:56:16.901331 kernel: audit: type=1400 audit(1734105375.964:1408): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:56:15.964000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:56:15.964000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c003140de0 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:56:15.964000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:57:08.248000 audit[5389]: AVC avc: denied { watch } for pid=5389 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_51_46.2152576997/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c754 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c3,c754 tclass=file permissive=0 Dec 13 15:57:08.277444 kernel: kauditd_printk_skb: 2 callbacks suppressed Dec 13 15:57:08.277525 kernel: audit: type=1400 audit(1734105428.248:1409): avc: denied { watch } for pid=5389 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_51_46.2152576997/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c754 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c3,c754 tclass=file permissive=0 Dec 13 15:57:08.248000 audit[5389]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00280c000 a2=fc6 a3=0 items=0 ppid=5016 pid=5389 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c754 key=(null) Dec 13 15:57:08.492806 kernel: audit: type=1300 audit(1734105428.248:1409): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00280c000 a2=fc6 a3=0 items=0 ppid=5016 pid=5389 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c754 key=(null) Dec 13 15:57:08.492874 kernel: audit: type=1327 audit(1734105428.248:1409): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:57:08.248000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:57:08.586413 kernel: audit: type=1400 audit(1734105428.396:1410): avc: denied { watch } for pid=5417 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_51_46.403036532/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c782,c860 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c782,c860 tclass=file permissive=0 Dec 13 15:57:08.396000 audit[5417]: AVC avc: denied { watch } for pid=5417 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_51_46.403036532/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c782,c860 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c782,c860 tclass=file permissive=0 Dec 13 15:57:08.681961 kernel: audit: type=1300 audit(1734105428.396:1410): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000f28000 a2=fc6 a3=0 items=0 ppid=5008 pid=5417 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c782,c860 key=(null) Dec 13 15:57:08.396000 audit[5417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000f28000 a2=fc6 a3=0 items=0 ppid=5008 pid=5417 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c782,c860 key=(null) Dec 13 15:57:08.804774 kernel: audit: type=1327 audit(1734105428.396:1410): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:57:08.396000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:57:12.569000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:57:12.569000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0032e28a0 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:57:12.788391 kernel: audit: type=1400 audit(1734105432.569:1411): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:57:12.788434 kernel: audit: type=1300 audit(1734105432.569:1411): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0032e28a0 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:57:12.788451 kernel: audit: type=1327 audit(1734105432.569:1411): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:57:12.569000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:57:12.881403 kernel: audit: type=1400 audit(1734105432.569:1412): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:57:12.569000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:57:12.569000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003838800 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:57:12.569000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:57:12.639000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:57:12.639000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00f4cdb30 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:57:12.639000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:57:12.639000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:57:12.639000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c003b8d440 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:57:12.639000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:57:12.639000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:57:12.639000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:57:12.639000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0081d7bc0 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:57:12.639000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:57:12.639000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00f4cdb90 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:57:12.639000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:57:12.639000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:57:12.639000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:57:12.639000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0099bc700 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:57:12.639000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c010678040 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:57:12.639000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:57:12.639000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:57:15.965000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:57:15.993802 kernel: kauditd_printk_skb: 20 callbacks suppressed Dec 13 15:57:15.993953 kernel: audit: type=1400 audit(1734105435.965:1419): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:57:15.965000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003140440 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:57:16.203967 kernel: audit: type=1300 audit(1734105435.965:1419): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003140440 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:57:16.204000 kernel: audit: type=1327 audit(1734105435.965:1419): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:57:15.965000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:57:16.296313 kernel: audit: type=1400 audit(1734105435.965:1420): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:57:15.965000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:57:16.385568 kernel: audit: type=1300 audit(1734105435.965:1420): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001c1a000 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:57:15.965000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001c1a000 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:57:16.505796 kernel: audit: type=1327 audit(1734105435.965:1420): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:57:15.965000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:57:16.598839 kernel: audit: type=1400 audit(1734105435.965:1421): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:57:15.965000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:57:16.688663 kernel: audit: type=1300 audit(1734105435.965:1421): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c003228560 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:57:15.965000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c003228560 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:57:16.808962 kernel: audit: type=1327 audit(1734105435.965:1421): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:57:15.965000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:57:16.902025 kernel: audit: type=1400 audit(1734105435.965:1422): avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:57:15.965000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:57:15.965000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002b2a000 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:57:15.965000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:57:21.523797 systemd[1]: Started sshd@10-147.28.180.221:22-139.178.89.65:52766.service. Dec 13 15:57:21.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.28.180.221:22-139.178.89.65:52766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:21.564039 kernel: kauditd_printk_skb: 2 callbacks suppressed Dec 13 15:57:21.564137 kernel: audit: type=1130 audit(1734105441.522:1423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.28.180.221:22-139.178.89.65:52766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:21.683000 audit[6846]: USER_ACCT pid=6846 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:21.685075 sshd[6846]: Accepted publickey for core from 139.178.89.65 port 52766 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:57:21.686790 sshd[6846]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:57:21.689226 systemd-logind[1562]: New session 12 of user core. Dec 13 15:57:21.690843 systemd[1]: Started session-12.scope. Dec 13 15:57:21.773979 sshd[6846]: pam_unix(sshd:session): session closed for user core Dec 13 15:57:21.775241 systemd[1]: sshd@10-147.28.180.221:22-139.178.89.65:52766.service: Deactivated successfully. Dec 13 15:57:21.775702 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 15:57:21.776104 systemd-logind[1562]: Session 12 logged out. Waiting for processes to exit. Dec 13 15:57:21.685000 audit[6846]: CRED_ACQ pid=6846 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:21.776549 systemd-logind[1562]: Removed session 12. Dec 13 15:57:21.866569 kernel: audit: type=1101 audit(1734105441.683:1424): pid=6846 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:21.866605 kernel: audit: type=1103 audit(1734105441.685:1425): pid=6846 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:21.866621 kernel: audit: type=1006 audit(1734105441.685:1426): pid=6846 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Dec 13 15:57:21.924989 kernel: audit: type=1300 audit(1734105441.685:1426): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeaa45d240 a2=3 a3=0 items=0 ppid=1 pid=6846 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:21.685000 audit[6846]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeaa45d240 a2=3 a3=0 items=0 ppid=1 pid=6846 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:22.017385 kernel: audit: type=1327 audit(1734105441.685:1426): proctitle=737368643A20636F7265205B707269765D Dec 13 15:57:21.685000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:57:22.048157 kernel: audit: type=1105 audit(1734105441.691:1427): pid=6846 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:21.691000 audit[6846]: USER_START pid=6846 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:22.143272 kernel: audit: type=1103 audit(1734105441.692:1428): pid=6848 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:21.692000 audit[6848]: CRED_ACQ pid=6848 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:22.232269 kernel: audit: type=1106 audit(1734105441.773:1429): pid=6846 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:21.773000 audit[6846]: USER_END pid=6846 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:22.327754 kernel: audit: type=1104 audit(1734105441.773:1430): pid=6846 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:21.773000 audit[6846]: CRED_DISP pid=6846 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:21.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.28.180.221:22-139.178.89.65:52766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:26.782836 systemd[1]: Started sshd@11-147.28.180.221:22-139.178.89.65:52780.service. Dec 13 15:57:26.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.28.180.221:22-139.178.89.65:52780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:26.817176 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 15:57:26.817286 kernel: audit: type=1130 audit(1734105446.781:1432): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.28.180.221:22-139.178.89.65:52780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:26.936000 audit[6875]: USER_ACCT pid=6875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:26.938097 sshd[6875]: Accepted publickey for core from 139.178.89.65 port 52780 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:57:26.938735 sshd[6875]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:57:26.941158 systemd-logind[1562]: New session 13 of user core. Dec 13 15:57:26.941623 systemd[1]: Started session-13.scope. Dec 13 15:57:27.021665 sshd[6875]: pam_unix(sshd:session): session closed for user core Dec 13 15:57:27.022990 systemd[1]: sshd@11-147.28.180.221:22-139.178.89.65:52780.service: Deactivated successfully. Dec 13 15:57:27.023428 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 15:57:27.023798 systemd-logind[1562]: Session 13 logged out. Waiting for processes to exit. Dec 13 15:57:27.024324 systemd-logind[1562]: Removed session 13. Dec 13 15:57:26.937000 audit[6875]: CRED_ACQ pid=6875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:27.119711 kernel: audit: type=1101 audit(1734105446.936:1433): pid=6875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:27.119770 kernel: audit: type=1103 audit(1734105446.937:1434): pid=6875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:27.119788 kernel: audit: type=1006 audit(1734105446.937:1435): pid=6875 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Dec 13 15:57:27.178263 kernel: audit: type=1300 audit(1734105446.937:1435): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0aa37e10 a2=3 a3=0 items=0 ppid=1 pid=6875 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:26.937000 audit[6875]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0aa37e10 a2=3 a3=0 items=0 ppid=1 pid=6875 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:26.937000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:57:27.300564 kernel: audit: type=1327 audit(1734105446.937:1435): proctitle=737368643A20636F7265205B707269765D Dec 13 15:57:27.300603 kernel: audit: type=1105 audit(1734105446.942:1436): pid=6875 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:26.942000 audit[6875]: USER_START pid=6875 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:27.394994 kernel: audit: type=1103 audit(1734105446.943:1437): pid=6877 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:26.943000 audit[6877]: CRED_ACQ pid=6877 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:27.484235 kernel: audit: type=1106 audit(1734105447.020:1438): pid=6875 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:27.020000 audit[6875]: USER_END pid=6875 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:27.579619 kernel: audit: type=1104 audit(1734105447.020:1439): pid=6875 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:27.020000 audit[6875]: CRED_DISP pid=6875 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:27.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.28.180.221:22-139.178.89.65:52780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:32.031816 systemd[1]: Started sshd@12-147.28.180.221:22-139.178.89.65:59934.service. Dec 13 15:57:32.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.28.180.221:22-139.178.89.65:59934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:32.058301 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 15:57:32.058340 kernel: audit: type=1130 audit(1734105452.030:1441): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.28.180.221:22-139.178.89.65:59934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:32.179000 audit[6904]: USER_ACCT pid=6904 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:32.181842 sshd[6904]: Accepted publickey for core from 139.178.89.65 port 59934 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:57:32.185995 sshd[6904]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:57:32.190974 systemd-logind[1562]: New session 14 of user core. Dec 13 15:57:32.191417 systemd[1]: Started session-14.scope. Dec 13 15:57:32.269072 sshd[6904]: pam_unix(sshd:session): session closed for user core Dec 13 15:57:32.270552 systemd[1]: sshd@12-147.28.180.221:22-139.178.89.65:59934.service: Deactivated successfully. Dec 13 15:57:32.270974 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 15:57:32.271292 systemd-logind[1562]: Session 14 logged out. Waiting for processes to exit. Dec 13 15:57:32.271742 systemd-logind[1562]: Removed session 14. Dec 13 15:57:32.183000 audit[6904]: CRED_ACQ pid=6904 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:32.363090 kernel: audit: type=1101 audit(1734105452.179:1442): pid=6904 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:32.363132 kernel: audit: type=1103 audit(1734105452.183:1443): pid=6904 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:32.363148 kernel: audit: type=1006 audit(1734105452.183:1444): pid=6904 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Dec 13 15:57:32.421698 kernel: audit: type=1300 audit(1734105452.183:1444): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6d035500 a2=3 a3=0 items=0 ppid=1 pid=6904 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:32.183000 audit[6904]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6d035500 a2=3 a3=0 items=0 ppid=1 pid=6904 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:32.513689 kernel: audit: type=1327 audit(1734105452.183:1444): proctitle=737368643A20636F7265205B707269765D Dec 13 15:57:32.183000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:57:32.544198 kernel: audit: type=1105 audit(1734105452.192:1445): pid=6904 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:32.192000 audit[6904]: USER_START pid=6904 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:32.638512 kernel: audit: type=1103 audit(1734105452.192:1446): pid=6906 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:32.192000 audit[6906]: CRED_ACQ pid=6906 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:32.727702 kernel: audit: type=1106 audit(1734105452.268:1447): pid=6904 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:32.268000 audit[6904]: USER_END pid=6904 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:32.823138 kernel: audit: type=1104 audit(1734105452.268:1448): pid=6904 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:32.268000 audit[6904]: CRED_DISP pid=6904 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:32.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.28.180.221:22-139.178.89.65:59934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:37.280908 systemd[1]: Started sshd@13-147.28.180.221:22-139.178.89.65:59938.service. Dec 13 15:57:37.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.28.180.221:22-139.178.89.65:59938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:37.308325 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 15:57:37.308363 kernel: audit: type=1130 audit(1734105457.279:1450): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.28.180.221:22-139.178.89.65:59938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:37.430000 audit[6929]: USER_ACCT pid=6929 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:37.432269 sshd[6929]: Accepted publickey for core from 139.178.89.65 port 59938 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:57:37.434692 sshd[6929]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:57:37.442531 systemd-logind[1562]: New session 15 of user core. Dec 13 15:57:37.444387 systemd[1]: Started session-15.scope. Dec 13 15:57:37.432000 audit[6929]: CRED_ACQ pid=6929 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:37.533003 sshd[6929]: pam_unix(sshd:session): session closed for user core Dec 13 15:57:37.534489 systemd[1]: sshd@13-147.28.180.221:22-139.178.89.65:59938.service: Deactivated successfully. Dec 13 15:57:37.534923 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 15:57:37.535268 systemd-logind[1562]: Session 15 logged out. Waiting for processes to exit. Dec 13 15:57:37.535782 systemd-logind[1562]: Removed session 15. Dec 13 15:57:37.613901 kernel: audit: type=1101 audit(1734105457.430:1451): pid=6929 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:37.613951 kernel: audit: type=1103 audit(1734105457.432:1452): pid=6929 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:37.613971 kernel: audit: type=1006 audit(1734105457.432:1453): pid=6929 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 15:57:37.672664 kernel: audit: type=1300 audit(1734105457.432:1453): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef6b93440 a2=3 a3=0 items=0 ppid=1 pid=6929 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:37.432000 audit[6929]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef6b93440 a2=3 a3=0 items=0 ppid=1 pid=6929 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:37.674894 systemd[1]: Started sshd@14-147.28.180.221:22-139.178.89.65:59942.service. Dec 13 15:57:37.764671 kernel: audit: type=1327 audit(1734105457.432:1453): proctitle=737368643A20636F7265205B707269765D Dec 13 15:57:37.432000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:57:37.795202 kernel: audit: type=1105 audit(1734105457.453:1454): pid=6929 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:37.453000 audit[6929]: USER_START pid=6929 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:37.889519 kernel: audit: type=1103 audit(1734105457.455:1455): pid=6931 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:37.455000 audit[6931]: CRED_ACQ pid=6931 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:37.978560 kernel: audit: type=1106 audit(1734105457.532:1456): pid=6929 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:37.532000 audit[6929]: USER_END pid=6929 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:38.073919 kernel: audit: type=1104 audit(1734105457.532:1457): pid=6929 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:37.532000 audit[6929]: CRED_DISP pid=6929 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:37.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.28.180.221:22-139.178.89.65:59938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:37.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.28.180.221:22-139.178.89.65:59942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:38.180000 audit[6955]: USER_ACCT pid=6955 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:38.182580 sshd[6955]: Accepted publickey for core from 139.178.89.65 port 59942 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:57:38.182000 audit[6955]: CRED_ACQ pid=6955 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:38.182000 audit[6955]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfc948ad0 a2=3 a3=0 items=0 ppid=1 pid=6955 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:38.182000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:57:38.184381 sshd[6955]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:57:38.190158 systemd-logind[1562]: New session 16 of user core. Dec 13 15:57:38.191471 systemd[1]: Started session-16.scope. Dec 13 15:57:38.197000 audit[6955]: USER_START pid=6955 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:38.198000 audit[6957]: CRED_ACQ pid=6957 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:38.301092 sshd[6955]: pam_unix(sshd:session): session closed for user core Dec 13 15:57:38.300000 audit[6955]: USER_END pid=6955 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:38.300000 audit[6955]: CRED_DISP pid=6955 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:38.303057 systemd[1]: sshd@14-147.28.180.221:22-139.178.89.65:59942.service: Deactivated successfully. Dec 13 15:57:38.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.28.180.221:22-139.178.89.65:59942 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:38.303459 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 15:57:38.303898 systemd-logind[1562]: Session 16 logged out. Waiting for processes to exit. Dec 13 15:57:38.304721 systemd[1]: Started sshd@15-147.28.180.221:22-139.178.89.65:50934.service. Dec 13 15:57:38.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.28.180.221:22-139.178.89.65:50934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:38.305284 systemd-logind[1562]: Removed session 16. Dec 13 15:57:38.344000 audit[6978]: USER_ACCT pid=6978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:38.346309 sshd[6978]: Accepted publickey for core from 139.178.89.65 port 50934 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:57:38.347000 audit[6978]: CRED_ACQ pid=6978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:38.347000 audit[6978]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe70a15d10 a2=3 a3=0 items=0 ppid=1 pid=6978 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:38.347000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:57:38.349626 sshd[6978]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:57:38.359354 systemd-logind[1562]: New session 17 of user core. Dec 13 15:57:38.361702 systemd[1]: Started session-17.scope. Dec 13 15:57:38.374000 audit[6978]: USER_START pid=6978 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:38.377000 audit[6982]: CRED_ACQ pid=6982 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:38.500928 sshd[6978]: pam_unix(sshd:session): session closed for user core Dec 13 15:57:38.500000 audit[6978]: USER_END pid=6978 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:38.500000 audit[6978]: CRED_DISP pid=6978 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:38.502307 systemd[1]: sshd@15-147.28.180.221:22-139.178.89.65:50934.service: Deactivated successfully. Dec 13 15:57:38.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.28.180.221:22-139.178.89.65:50934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:38.502791 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 15:57:38.503186 systemd-logind[1562]: Session 17 logged out. Waiting for processes to exit. Dec 13 15:57:38.503641 systemd-logind[1562]: Removed session 17. Dec 13 15:57:43.510756 systemd[1]: Started sshd@16-147.28.180.221:22-139.178.89.65:50944.service. Dec 13 15:57:43.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.28.180.221:22-139.178.89.65:50944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:43.537932 kernel: kauditd_printk_skb: 23 callbacks suppressed Dec 13 15:57:43.537995 kernel: audit: type=1130 audit(1734105463.509:1477): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.28.180.221:22-139.178.89.65:50944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:43.658000 audit[7030]: USER_ACCT pid=7030 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:43.660856 sshd[7030]: Accepted publickey for core from 139.178.89.65 port 50944 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:57:43.665035 sshd[7030]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:57:43.669932 systemd-logind[1562]: New session 18 of user core. Dec 13 15:57:43.670561 systemd[1]: Started session-18.scope. Dec 13 15:57:43.749646 sshd[7030]: pam_unix(sshd:session): session closed for user core Dec 13 15:57:43.751133 systemd[1]: sshd@16-147.28.180.221:22-139.178.89.65:50944.service: Deactivated successfully. Dec 13 15:57:43.751569 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 15:57:43.662000 audit[7030]: CRED_ACQ pid=7030 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:43.751993 systemd-logind[1562]: Session 18 logged out. Waiting for processes to exit. Dec 13 15:57:43.752383 systemd-logind[1562]: Removed session 18. Dec 13 15:57:43.842173 kernel: audit: type=1101 audit(1734105463.658:1478): pid=7030 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:43.842240 kernel: audit: type=1103 audit(1734105463.662:1479): pid=7030 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:43.842262 kernel: audit: type=1006 audit(1734105463.662:1480): pid=7030 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Dec 13 15:57:43.900889 kernel: audit: type=1300 audit(1734105463.662:1480): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd00da8270 a2=3 a3=0 items=0 ppid=1 pid=7030 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:43.662000 audit[7030]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd00da8270 a2=3 a3=0 items=0 ppid=1 pid=7030 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:43.992887 kernel: audit: type=1327 audit(1734105463.662:1480): proctitle=737368643A20636F7265205B707269765D Dec 13 15:57:43.662000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:57:44.023392 kernel: audit: type=1105 audit(1734105463.671:1481): pid=7030 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:43.671000 audit[7030]: USER_START pid=7030 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:44.117639 kernel: audit: type=1103 audit(1734105463.672:1482): pid=7032 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:43.672000 audit[7032]: CRED_ACQ pid=7032 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:44.206686 kernel: audit: type=1106 audit(1734105463.748:1483): pid=7030 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:43.748000 audit[7030]: USER_END pid=7030 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:44.302000 kernel: audit: type=1104 audit(1734105463.748:1484): pid=7030 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:43.748000 audit[7030]: CRED_DISP pid=7030 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:43.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.28.180.221:22-139.178.89.65:50944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:48.759158 systemd[1]: Started sshd@17-147.28.180.221:22-139.178.89.65:35196.service. Dec 13 15:57:48.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.28.180.221:22-139.178.89.65:35196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:48.785562 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 15:57:48.785598 kernel: audit: type=1130 audit(1734105468.757:1486): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.28.180.221:22-139.178.89.65:35196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:48.906000 audit[7102]: USER_ACCT pid=7102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:48.908877 sshd[7102]: Accepted publickey for core from 139.178.89.65 port 35196 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:57:48.913042 sshd[7102]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:57:48.917478 systemd-logind[1562]: New session 19 of user core. Dec 13 15:57:48.917999 systemd[1]: Started session-19.scope. Dec 13 15:57:48.910000 audit[7102]: CRED_ACQ pid=7102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:49.090379 kernel: audit: type=1101 audit(1734105468.906:1487): pid=7102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:49.090425 kernel: audit: type=1103 audit(1734105468.910:1488): pid=7102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:49.090442 kernel: audit: type=1006 audit(1734105468.910:1489): pid=7102 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Dec 13 15:57:49.148974 kernel: audit: type=1300 audit(1734105468.910:1489): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0d4d0120 a2=3 a3=0 items=0 ppid=1 pid=7102 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:48.910000 audit[7102]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0d4d0120 a2=3 a3=0 items=0 ppid=1 pid=7102 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:48.910000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:57:49.241233 sshd[7102]: pam_unix(sshd:session): session closed for user core Dec 13 15:57:49.242598 systemd[1]: sshd@17-147.28.180.221:22-139.178.89.65:35196.service: Deactivated successfully. Dec 13 15:57:49.243016 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 15:57:49.243379 systemd-logind[1562]: Session 19 logged out. Waiting for processes to exit. Dec 13 15:57:49.244025 systemd-logind[1562]: Removed session 19. Dec 13 15:57:49.271517 kernel: audit: type=1327 audit(1734105468.910:1489): proctitle=737368643A20636F7265205B707269765D Dec 13 15:57:49.271550 kernel: audit: type=1105 audit(1734105468.918:1490): pid=7102 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:48.918000 audit[7102]: USER_START pid=7102 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:49.365821 kernel: audit: type=1103 audit(1734105468.919:1491): pid=7104 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:48.919000 audit[7104]: CRED_ACQ pid=7104 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:49.454854 kernel: audit: type=1106 audit(1734105469.240:1492): pid=7102 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:49.240000 audit[7102]: USER_END pid=7102 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:49.550150 kernel: audit: type=1104 audit(1734105469.240:1493): pid=7102 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:49.240000 audit[7102]: CRED_DISP pid=7102 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:49.241000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.28.180.221:22-139.178.89.65:35196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:54.194206 systemd[1]: Started sshd@18-147.28.180.221:22-139.178.89.65:35200.service. Dec 13 15:57:54.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.28.180.221:22-139.178.89.65:35200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:54.221270 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 15:57:54.221353 kernel: audit: type=1130 audit(1734105474.192:1495): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.28.180.221:22-139.178.89.65:35200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:54.342000 audit[7128]: USER_ACCT pid=7128 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:54.343998 sshd[7128]: Accepted publickey for core from 139.178.89.65 port 35200 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:57:54.344797 sshd[7128]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:57:54.347201 systemd-logind[1562]: New session 20 of user core. Dec 13 15:57:54.347715 systemd[1]: Started session-20.scope. Dec 13 15:57:54.425960 sshd[7128]: pam_unix(sshd:session): session closed for user core Dec 13 15:57:54.427351 systemd[1]: sshd@18-147.28.180.221:22-139.178.89.65:35200.service: Deactivated successfully. Dec 13 15:57:54.427784 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 15:57:54.428146 systemd-logind[1562]: Session 20 logged out. Waiting for processes to exit. Dec 13 15:57:54.428688 systemd-logind[1562]: Removed session 20. Dec 13 15:57:54.343000 audit[7128]: CRED_ACQ pid=7128 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:54.525686 kernel: audit: type=1101 audit(1734105474.342:1496): pid=7128 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:54.525741 kernel: audit: type=1103 audit(1734105474.343:1497): pid=7128 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:54.525762 kernel: audit: type=1006 audit(1734105474.343:1498): pid=7128 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Dec 13 15:57:54.343000 audit[7128]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd54ccb350 a2=3 a3=0 items=0 ppid=1 pid=7128 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:54.676309 kernel: audit: type=1300 audit(1734105474.343:1498): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd54ccb350 a2=3 a3=0 items=0 ppid=1 pid=7128 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:54.676377 kernel: audit: type=1327 audit(1734105474.343:1498): proctitle=737368643A20636F7265205B707269765D Dec 13 15:57:54.343000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:57:54.706828 kernel: audit: type=1105 audit(1734105474.348:1499): pid=7128 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:54.348000 audit[7128]: USER_START pid=7128 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:54.801137 kernel: audit: type=1103 audit(1734105474.349:1500): pid=7130 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:54.349000 audit[7130]: CRED_ACQ pid=7130 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:54.890235 kernel: audit: type=1106 audit(1734105474.425:1501): pid=7128 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:54.425000 audit[7128]: USER_END pid=7128 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:54.985571 kernel: audit: type=1104 audit(1734105474.425:1502): pid=7128 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:54.425000 audit[7128]: CRED_DISP pid=7128 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:54.425000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.28.180.221:22-139.178.89.65:35200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:59.435773 systemd[1]: Started sshd@19-147.28.180.221:22-139.178.89.65:53450.service. Dec 13 15:57:59.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.28.180.221:22-139.178.89.65:53450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:59.462899 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 15:57:59.462993 kernel: audit: type=1130 audit(1734105479.434:1504): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.28.180.221:22-139.178.89.65:53450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:59.582000 audit[7153]: USER_ACCT pid=7153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:59.584270 sshd[7153]: Accepted publickey for core from 139.178.89.65 port 53450 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:57:59.585963 sshd[7153]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:57:59.590006 systemd-logind[1562]: New session 21 of user core. Dec 13 15:57:59.590926 systemd[1]: Started session-21.scope. Dec 13 15:57:59.673470 sshd[7153]: pam_unix(sshd:session): session closed for user core Dec 13 15:57:59.675223 systemd[1]: sshd@19-147.28.180.221:22-139.178.89.65:53450.service: Deactivated successfully. Dec 13 15:57:59.584000 audit[7153]: CRED_ACQ pid=7153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:59.675564 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 15:57:59.675950 systemd-logind[1562]: Session 21 logged out. Waiting for processes to exit. Dec 13 15:57:59.676514 systemd[1]: Started sshd@20-147.28.180.221:22-139.178.89.65:53452.service. Dec 13 15:57:59.676942 systemd-logind[1562]: Removed session 21. Dec 13 15:57:59.765675 kernel: audit: type=1101 audit(1734105479.582:1505): pid=7153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:59.765712 kernel: audit: type=1103 audit(1734105479.584:1506): pid=7153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:59.765730 kernel: audit: type=1006 audit(1734105479.584:1507): pid=7153 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Dec 13 15:57:59.824276 kernel: audit: type=1300 audit(1734105479.584:1507): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed5473070 a2=3 a3=0 items=0 ppid=1 pid=7153 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:59.584000 audit[7153]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed5473070 a2=3 a3=0 items=0 ppid=1 pid=7153 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:59.856829 sshd[7178]: Accepted publickey for core from 139.178.89.65 port 53452 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:57:59.858205 sshd[7178]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:57:59.860964 systemd-logind[1562]: New session 22 of user core. Dec 13 15:57:59.861549 systemd[1]: Started session-22.scope. Dec 13 15:57:59.916303 kernel: audit: type=1327 audit(1734105479.584:1507): proctitle=737368643A20636F7265205B707269765D Dec 13 15:57:59.584000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:57:59.946830 kernel: audit: type=1105 audit(1734105479.594:1508): pid=7153 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:59.594000 audit[7153]: USER_START pid=7153 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:00.041086 kernel: audit: type=1103 audit(1734105479.595:1509): pid=7155 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:59.595000 audit[7155]: CRED_ACQ pid=7155 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:00.117842 sshd[7178]: pam_unix(sshd:session): session closed for user core Dec 13 15:58:00.119659 systemd[1]: sshd@20-147.28.180.221:22-139.178.89.65:53452.service: Deactivated successfully. Dec 13 15:58:00.120015 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 15:58:00.120326 systemd-logind[1562]: Session 22 logged out. Waiting for processes to exit. Dec 13 15:58:00.121022 systemd[1]: Started sshd@21-147.28.180.221:22-139.178.89.65:53458.service. Dec 13 15:58:00.121423 systemd-logind[1562]: Removed session 22. Dec 13 15:58:00.130143 kernel: audit: type=1106 audit(1734105479.672:1510): pid=7153 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:59.672000 audit[7153]: USER_END pid=7153 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:00.225555 kernel: audit: type=1104 audit(1734105479.672:1511): pid=7153 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:59.672000 audit[7153]: CRED_DISP pid=7153 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:00.258099 sshd[7200]: Accepted publickey for core from 139.178.89.65 port 53458 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:58:00.259834 sshd[7200]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:58:00.262772 systemd-logind[1562]: New session 23 of user core. Dec 13 15:58:00.263249 systemd[1]: Started session-23.scope. Dec 13 15:57:59.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.28.180.221:22-139.178.89.65:53450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:59.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.28.180.221:22-139.178.89.65:53452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:57:59.855000 audit[7178]: USER_ACCT pid=7178 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:59.856000 audit[7178]: CRED_ACQ pid=7178 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:59.856000 audit[7178]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8e3e00e0 a2=3 a3=0 items=0 ppid=1 pid=7178 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:57:59.856000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:57:59.862000 audit[7178]: USER_START pid=7178 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:57:59.863000 audit[7180]: CRED_ACQ pid=7180 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:00.116000 audit[7178]: USER_END pid=7178 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:00.117000 audit[7178]: CRED_DISP pid=7178 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:00.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.28.180.221:22-139.178.89.65:53452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:00.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.28.180.221:22-139.178.89.65:53458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:00.256000 audit[7200]: USER_ACCT pid=7200 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:00.258000 audit[7200]: CRED_ACQ pid=7200 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:00.258000 audit[7200]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe937c0cc0 a2=3 a3=0 items=0 ppid=1 pid=7200 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:00.258000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:58:00.263000 audit[7200]: USER_START pid=7200 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:00.264000 audit[7202]: CRED_ACQ pid=7202 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:01.427000 audit[7228]: NETFILTER_CFG table=filter:120 family=2 entries=20 op=nft_register_rule pid=7228 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:58:01.427000 audit[7228]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff76df9730 a2=0 a3=7fff76df971c items=0 ppid=2919 pid=7228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:01.427000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:58:01.435000 audit[7228]: NETFILTER_CFG table=nat:121 family=2 entries=22 op=nft_register_rule pid=7228 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:58:01.435000 audit[7228]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff76df9730 a2=0 a3=0 items=0 ppid=2919 pid=7228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:01.435000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:58:01.437323 sshd[7200]: pam_unix(sshd:session): session closed for user core Dec 13 15:58:01.436000 audit[7200]: USER_END pid=7200 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:01.436000 audit[7200]: CRED_DISP pid=7200 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:01.439582 systemd[1]: sshd@21-147.28.180.221:22-139.178.89.65:53458.service: Deactivated successfully. Dec 13 15:58:01.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.28.180.221:22-139.178.89.65:53458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:01.440039 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 15:58:01.440471 systemd-logind[1562]: Session 23 logged out. Waiting for processes to exit. Dec 13 15:58:01.441440 systemd[1]: Started sshd@22-147.28.180.221:22-139.178.89.65:53460.service. Dec 13 15:58:01.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.28.180.221:22-139.178.89.65:53460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:01.442042 systemd-logind[1562]: Removed session 23. Dec 13 15:58:01.450000 audit[7235]: NETFILTER_CFG table=filter:122 family=2 entries=32 op=nft_register_rule pid=7235 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:58:01.450000 audit[7235]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fffd6073c80 a2=0 a3=7fffd6073c6c items=0 ppid=2919 pid=7235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:01.450000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:58:01.463000 audit[7235]: NETFILTER_CFG table=nat:123 family=2 entries=22 op=nft_register_rule pid=7235 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:58:01.463000 audit[7235]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffd6073c80 a2=0 a3=0 items=0 ppid=2919 pid=7235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:01.463000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:58:01.483000 audit[7232]: USER_ACCT pid=7232 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:01.485210 sshd[7232]: Accepted publickey for core from 139.178.89.65 port 53460 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:58:01.485000 audit[7232]: CRED_ACQ pid=7232 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:01.486000 audit[7232]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1ba51960 a2=3 a3=0 items=0 ppid=1 pid=7232 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:01.486000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:58:01.488362 sshd[7232]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:58:01.498785 systemd-logind[1562]: New session 24 of user core. Dec 13 15:58:01.502098 systemd[1]: Started session-24.scope. Dec 13 15:58:01.516000 audit[7232]: USER_START pid=7232 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:01.519000 audit[7239]: CRED_ACQ pid=7239 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:01.697765 sshd[7232]: pam_unix(sshd:session): session closed for user core Dec 13 15:58:01.696000 audit[7232]: USER_END pid=7232 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:01.696000 audit[7232]: CRED_DISP pid=7232 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:01.699711 systemd[1]: sshd@22-147.28.180.221:22-139.178.89.65:53460.service: Deactivated successfully. Dec 13 15:58:01.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.28.180.221:22-139.178.89.65:53460 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:01.700077 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 15:58:01.700374 systemd-logind[1562]: Session 24 logged out. Waiting for processes to exit. Dec 13 15:58:01.700974 systemd[1]: Started sshd@23-147.28.180.221:22-139.178.89.65:53472.service. Dec 13 15:58:01.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.28.180.221:22-139.178.89.65:53472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:01.701354 systemd-logind[1562]: Removed session 24. Dec 13 15:58:01.737000 audit[7261]: USER_ACCT pid=7261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:01.739772 sshd[7261]: Accepted publickey for core from 139.178.89.65 port 53472 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:58:01.740000 audit[7261]: CRED_ACQ pid=7261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:01.740000 audit[7261]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff04b5db00 a2=3 a3=0 items=0 ppid=1 pid=7261 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:01.740000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:58:01.743178 sshd[7261]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:58:01.753720 systemd-logind[1562]: New session 25 of user core. Dec 13 15:58:01.756317 systemd[1]: Started session-25.scope. Dec 13 15:58:01.769000 audit[7261]: USER_START pid=7261 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:01.772000 audit[7263]: CRED_ACQ pid=7263 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:01.907795 sshd[7261]: pam_unix(sshd:session): session closed for user core Dec 13 15:58:01.907000 audit[7261]: USER_END pid=7261 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:01.907000 audit[7261]: CRED_DISP pid=7261 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:01.909729 systemd[1]: sshd@23-147.28.180.221:22-139.178.89.65:53472.service: Deactivated successfully. Dec 13 15:58:01.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.28.180.221:22-139.178.89.65:53472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:01.910365 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 15:58:01.910874 systemd-logind[1562]: Session 25 logged out. Waiting for processes to exit. Dec 13 15:58:01.911435 systemd-logind[1562]: Removed session 25. Dec 13 15:58:06.916625 systemd[1]: Started sshd@24-147.28.180.221:22-139.178.89.65:53476.service. Dec 13 15:58:06.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.28.180.221:22-139.178.89.65:53476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:06.943579 kernel: kauditd_printk_skb: 57 callbacks suppressed Dec 13 15:58:06.943678 kernel: audit: type=1130 audit(1734105486.916:1553): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.28.180.221:22-139.178.89.65:53476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:07.064000 audit[7286]: USER_ACCT pid=7286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:07.065456 sshd[7286]: Accepted publickey for core from 139.178.89.65 port 53476 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:58:07.066644 sshd[7286]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:58:07.068837 systemd-logind[1562]: New session 26 of user core. Dec 13 15:58:07.069461 systemd[1]: Started session-26.scope. Dec 13 15:58:07.148912 sshd[7286]: pam_unix(sshd:session): session closed for user core Dec 13 15:58:07.150276 systemd[1]: sshd@24-147.28.180.221:22-139.178.89.65:53476.service: Deactivated successfully. Dec 13 15:58:07.150767 systemd[1]: session-26.scope: Deactivated successfully. Dec 13 15:58:07.151165 systemd-logind[1562]: Session 26 logged out. Waiting for processes to exit. Dec 13 15:58:07.151665 systemd-logind[1562]: Removed session 26. Dec 13 15:58:07.065000 audit[7286]: CRED_ACQ pid=7286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:07.249102 kernel: audit: type=1101 audit(1734105487.064:1554): pid=7286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:07.249147 kernel: audit: type=1103 audit(1734105487.065:1555): pid=7286 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:07.249166 kernel: audit: type=1006 audit(1734105487.065:1556): pid=7286 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Dec 13 15:58:07.307633 kernel: audit: type=1300 audit(1734105487.065:1556): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2b418390 a2=3 a3=0 items=0 ppid=1 pid=7286 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:07.065000 audit[7286]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2b418390 a2=3 a3=0 items=0 ppid=1 pid=7286 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:07.399713 kernel: audit: type=1327 audit(1734105487.065:1556): proctitle=737368643A20636F7265205B707269765D Dec 13 15:58:07.065000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:58:07.430200 kernel: audit: type=1105 audit(1734105487.071:1557): pid=7286 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:07.071000 audit[7286]: USER_START pid=7286 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:07.524444 kernel: audit: type=1103 audit(1734105487.071:1558): pid=7288 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:07.071000 audit[7288]: CRED_ACQ pid=7288 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:07.613562 kernel: audit: type=1106 audit(1734105487.149:1559): pid=7286 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:07.149000 audit[7286]: USER_END pid=7286 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:07.708893 kernel: audit: type=1104 audit(1734105487.149:1560): pid=7286 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:07.149000 audit[7286]: CRED_DISP pid=7286 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:07.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.28.180.221:22-139.178.89.65:53476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:07.538000 audit[7310]: NETFILTER_CFG table=filter:124 family=2 entries=20 op=nft_register_rule pid=7310 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:58:07.538000 audit[7310]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc5a461460 a2=0 a3=7ffc5a46144c items=0 ppid=2919 pid=7310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:07.538000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:58:07.809000 audit[7310]: NETFILTER_CFG table=nat:125 family=2 entries=106 op=nft_register_chain pid=7310 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 15:58:07.809000 audit[7310]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffc5a461460 a2=0 a3=7ffc5a46144c items=0 ppid=2919 pid=7310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:07.809000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 15:58:08.250000 audit[5389]: AVC avc: denied { watch } for pid=5389 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_51_46.2152576997/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c3,c754 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c3,c754 tclass=file permissive=0 Dec 13 15:58:08.250000 audit[5389]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00280d600 a2=fc6 a3=0 items=0 ppid=5016 pid=5389 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c3,c754 key=(null) Dec 13 15:58:08.250000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:58:08.398000 audit[5417]: AVC avc: denied { watch } for pid=5417 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_15_51_46.403036532/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c782,c860 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c782,c860 tclass=file permissive=0 Dec 13 15:58:08.398000 audit[5417]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0015165e0 a2=fc6 a3=0 items=0 ppid=5008 pid=5417 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c782,c860 key=(null) Dec 13 15:58:08.398000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 15:58:12.160252 systemd[1]: Started sshd@25-147.28.180.221:22-139.178.89.65:46652.service. Dec 13 15:58:12.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.28.180.221:22-139.178.89.65:46652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:12.187822 kernel: kauditd_printk_skb: 13 callbacks suppressed Dec 13 15:58:12.187892 kernel: audit: type=1130 audit(1734105492.160:1566): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.28.180.221:22-139.178.89.65:46652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:12.309000 audit[7314]: USER_ACCT pid=7314 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:12.309714 sshd[7314]: Accepted publickey for core from 139.178.89.65 port 46652 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:58:12.311042 sshd[7314]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:58:12.313427 systemd-logind[1562]: New session 27 of user core. Dec 13 15:58:12.313995 systemd[1]: Started session-27.scope. Dec 13 15:58:12.391210 sshd[7314]: pam_unix(sshd:session): session closed for user core Dec 13 15:58:12.392796 systemd[1]: sshd@25-147.28.180.221:22-139.178.89.65:46652.service: Deactivated successfully. Dec 13 15:58:12.393267 systemd[1]: session-27.scope: Deactivated successfully. Dec 13 15:58:12.393703 systemd-logind[1562]: Session 27 logged out. Waiting for processes to exit. Dec 13 15:58:12.394301 systemd-logind[1562]: Removed session 27. Dec 13 15:58:12.310000 audit[7314]: CRED_ACQ pid=7314 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:12.493252 kernel: audit: type=1101 audit(1734105492.309:1567): pid=7314 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:12.493289 kernel: audit: type=1103 audit(1734105492.310:1568): pid=7314 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:12.493306 kernel: audit: type=1006 audit(1734105492.310:1569): pid=7314 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Dec 13 15:58:12.551794 kernel: audit: type=1300 audit(1734105492.310:1569): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7d8799b0 a2=3 a3=0 items=0 ppid=1 pid=7314 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:12.310000 audit[7314]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7d8799b0 a2=3 a3=0 items=0 ppid=1 pid=7314 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:12.643764 kernel: audit: type=1327 audit(1734105492.310:1569): proctitle=737368643A20636F7265205B707269765D Dec 13 15:58:12.310000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:58:12.674259 kernel: audit: type=1105 audit(1734105492.315:1570): pid=7314 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:12.315000 audit[7314]: USER_START pid=7314 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:12.769143 kernel: audit: type=1103 audit(1734105492.316:1571): pid=7316 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:12.316000 audit[7316]: CRED_ACQ pid=7316 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:12.858310 kernel: audit: type=1106 audit(1734105492.391:1572): pid=7314 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:12.391000 audit[7314]: USER_END pid=7314 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:12.953650 kernel: audit: type=1104 audit(1734105492.391:1573): pid=7314 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:12.391000 audit[7314]: CRED_DISP pid=7314 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:12.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.28.180.221:22-139.178.89.65:46652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:12.571000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:58:12.571000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003563280 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:58:12.571000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:58:12.571000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:58:12.571000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0034d7c50 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:58:12.571000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:58:12.640000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:58:12.640000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c017497860 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:58:12.640000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:58:12.640000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:58:12.640000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c017219140 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:58:12.640000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:58:12.640000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8247 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:58:12.640000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8245 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:58:12.640000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c0178f9ce0 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:58:12.640000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:58:12.640000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c0161112f0 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:58:12.640000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:58:12.640000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:58:12.640000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c017908e80 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:58:12.640000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:58:12.640000 audit[2469]: AVC avc: denied { watch } for pid=2469 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:58:12.640000 audit[2469]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c0174876e0 a2=fc6 a3=0 items=0 ppid=2316 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c33,c250 key=(null) Dec 13 15:58:12.640000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E32382E3138302E323231002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 15:58:15.967000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:58:15.967000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000dfbf80 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:58:15.967000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:58:15.967000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:58:15.967000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002b2bb00 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:58:15.967000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:58:15.967000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:58:15.967000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00187ed60 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:58:15.967000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:58:15.967000 audit[2463]: AVC avc: denied { watch } for pid=2463 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 15:58:15.967000 audit[2463]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000dfbfc0 a2=fc6 a3=0 items=0 ppid=2300 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c569,c922 key=(null) Dec 13 15:58:15.967000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 15:58:17.399326 systemd[1]: Started sshd@26-147.28.180.221:22-139.178.89.65:46660.service. Dec 13 15:58:17.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.28.180.221:22-139.178.89.65:46660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:17.426129 kernel: kauditd_printk_skb: 37 callbacks suppressed Dec 13 15:58:17.426194 kernel: audit: type=1130 audit(1734105497.398:1587): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.28.180.221:22-139.178.89.65:46660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:17.547000 audit[7387]: USER_ACCT pid=7387 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:17.548459 sshd[7387]: Accepted publickey for core from 139.178.89.65 port 46660 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:58:17.549814 sshd[7387]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:58:17.552195 systemd-logind[1562]: New session 28 of user core. Dec 13 15:58:17.552760 systemd[1]: Started session-28.scope. Dec 13 15:58:17.628456 sshd[7387]: pam_unix(sshd:session): session closed for user core Dec 13 15:58:17.629922 systemd[1]: sshd@26-147.28.180.221:22-139.178.89.65:46660.service: Deactivated successfully. Dec 13 15:58:17.630360 systemd[1]: session-28.scope: Deactivated successfully. Dec 13 15:58:17.630702 systemd-logind[1562]: Session 28 logged out. Waiting for processes to exit. Dec 13 15:58:17.631181 systemd-logind[1562]: Removed session 28. Dec 13 15:58:17.549000 audit[7387]: CRED_ACQ pid=7387 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:17.729993 kernel: audit: type=1101 audit(1734105497.547:1588): pid=7387 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:17.730043 kernel: audit: type=1103 audit(1734105497.549:1589): pid=7387 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:17.730063 kernel: audit: type=1006 audit(1734105497.549:1590): pid=7387 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Dec 13 15:58:17.788562 kernel: audit: type=1300 audit(1734105497.549:1590): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffad399db0 a2=3 a3=0 items=0 ppid=1 pid=7387 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:17.549000 audit[7387]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffad399db0 a2=3 a3=0 items=0 ppid=1 pid=7387 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:17.880549 kernel: audit: type=1327 audit(1734105497.549:1590): proctitle=737368643A20636F7265205B707269765D Dec 13 15:58:17.549000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:58:17.554000 audit[7387]: USER_START pid=7387 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:18.005455 kernel: audit: type=1105 audit(1734105497.554:1591): pid=7387 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:18.005491 kernel: audit: type=1103 audit(1734105497.555:1592): pid=7389 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:17.555000 audit[7389]: CRED_ACQ pid=7389 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:18.094502 kernel: audit: type=1106 audit(1734105497.628:1593): pid=7387 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:17.628000 audit[7387]: USER_END pid=7387 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:18.189777 kernel: audit: type=1104 audit(1734105497.628:1594): pid=7387 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:17.628000 audit[7387]: CRED_DISP pid=7387 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:17.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.28.180.221:22-139.178.89.65:46660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:22.638488 systemd[1]: Started sshd@27-147.28.180.221:22-139.178.89.65:47304.service. Dec 13 15:58:22.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-147.28.180.221:22-139.178.89.65:47304 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:22.665914 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 15:58:22.666019 kernel: audit: type=1130 audit(1734105502.638:1596): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-147.28.180.221:22-139.178.89.65:47304 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 15:58:22.786000 audit[7433]: USER_ACCT pid=7433 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:22.786860 sshd[7433]: Accepted publickey for core from 139.178.89.65 port 47304 ssh2: RSA SHA256:izw9nsjJfNoYQ+ckx4ezJW8umjt8Ms6p+cEtPdzXVWQ Dec 13 15:58:22.787794 sshd[7433]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 15:58:22.790048 systemd-logind[1562]: New session 29 of user core. Dec 13 15:58:22.790571 systemd[1]: Started session-29.scope. Dec 13 15:58:22.866680 sshd[7433]: pam_unix(sshd:session): session closed for user core Dec 13 15:58:22.868081 systemd[1]: sshd@27-147.28.180.221:22-139.178.89.65:47304.service: Deactivated successfully. Dec 13 15:58:22.868517 systemd[1]: session-29.scope: Deactivated successfully. Dec 13 15:58:22.868892 systemd-logind[1562]: Session 29 logged out. Waiting for processes to exit. Dec 13 15:58:22.869303 systemd-logind[1562]: Removed session 29. Dec 13 15:58:22.787000 audit[7433]: CRED_ACQ pid=7433 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:22.968378 kernel: audit: type=1101 audit(1734105502.786:1597): pid=7433 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:22.968419 kernel: audit: type=1103 audit(1734105502.787:1598): pid=7433 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:22.968438 kernel: audit: type=1006 audit(1734105502.787:1599): pid=7433 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Dec 13 15:58:23.026931 kernel: audit: type=1300 audit(1734105502.787:1599): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee7e8c9a0 a2=3 a3=0 items=0 ppid=1 pid=7433 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:22.787000 audit[7433]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee7e8c9a0 a2=3 a3=0 items=0 ppid=1 pid=7433 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 15:58:23.118880 kernel: audit: type=1327 audit(1734105502.787:1599): proctitle=737368643A20636F7265205B707269765D Dec 13 15:58:22.787000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 15:58:23.149375 kernel: audit: type=1105 audit(1734105502.792:1600): pid=7433 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:22.792000 audit[7433]: USER_START pid=7433 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:23.243638 kernel: audit: type=1103 audit(1734105502.793:1601): pid=7435 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:22.793000 audit[7435]: CRED_ACQ pid=7435 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:23.332663 kernel: audit: type=1106 audit(1734105502.866:1602): pid=7433 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:22.866000 audit[7433]: USER_END pid=7433 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:23.427947 kernel: audit: type=1104 audit(1734105502.866:1603): pid=7433 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:22.866000 audit[7433]: CRED_DISP pid=7433 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 15:58:22.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-147.28.180.221:22-139.178.89.65:47304 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'