Dec 13 02:34:26.656992 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Dec 12 23:50:37 -00 2024 Dec 13 02:34:26.657009 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:34:26.657015 kernel: Disabled fast string operations Dec 13 02:34:26.657019 kernel: BIOS-provided physical RAM map: Dec 13 02:34:26.657023 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ebff] usable Dec 13 02:34:26.657027 kernel: BIOS-e820: [mem 0x000000000009ec00-0x000000000009ffff] reserved Dec 13 02:34:26.657033 kernel: BIOS-e820: [mem 0x00000000000dc000-0x00000000000fffff] reserved Dec 13 02:34:26.657037 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007fedffff] usable Dec 13 02:34:26.657042 kernel: BIOS-e820: [mem 0x000000007fee0000-0x000000007fefefff] ACPI data Dec 13 02:34:26.657046 kernel: BIOS-e820: [mem 0x000000007feff000-0x000000007fefffff] ACPI NVS Dec 13 02:34:26.657050 kernel: BIOS-e820: [mem 0x000000007ff00000-0x000000007fffffff] usable Dec 13 02:34:26.657054 kernel: BIOS-e820: [mem 0x00000000f0000000-0x00000000f7ffffff] reserved Dec 13 02:34:26.657058 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec0ffff] reserved Dec 13 02:34:26.657062 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Dec 13 02:34:26.657068 kernel: BIOS-e820: [mem 0x00000000fffe0000-0x00000000ffffffff] reserved Dec 13 02:34:26.657073 kernel: NX (Execute Disable) protection: active Dec 13 02:34:26.657078 kernel: SMBIOS 2.7 present. Dec 13 02:34:26.657082 kernel: DMI: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/28/2020 Dec 13 02:34:26.657087 kernel: vmware: hypercall mode: 0x00 Dec 13 02:34:26.657091 kernel: Hypervisor detected: VMware Dec 13 02:34:26.657097 kernel: vmware: TSC freq read from hypervisor : 3408.000 MHz Dec 13 02:34:26.657101 kernel: vmware: Host bus clock speed read from hypervisor : 66000000 Hz Dec 13 02:34:26.657106 kernel: vmware: using clock offset of 4187767048 ns Dec 13 02:34:26.657110 kernel: tsc: Detected 3408.000 MHz processor Dec 13 02:34:26.657115 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 02:34:26.657121 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 02:34:26.657125 kernel: last_pfn = 0x80000 max_arch_pfn = 0x400000000 Dec 13 02:34:26.657130 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 02:34:26.657135 kernel: total RAM covered: 3072M Dec 13 02:34:26.657140 kernel: Found optimal setting for mtrr clean up Dec 13 02:34:26.657146 kernel: gran_size: 64K chunk_size: 64K num_reg: 2 lose cover RAM: 0G Dec 13 02:34:26.657150 kernel: Using GB pages for direct mapping Dec 13 02:34:26.657155 kernel: ACPI: Early table checksum verification disabled Dec 13 02:34:26.657159 kernel: ACPI: RSDP 0x00000000000F6A00 000024 (v02 PTLTD ) Dec 13 02:34:26.657164 kernel: ACPI: XSDT 0x000000007FEE965B 00005C (v01 INTEL 440BX 06040000 VMW 01324272) Dec 13 02:34:26.657169 kernel: ACPI: FACP 0x000000007FEFEE73 0000F4 (v04 INTEL 440BX 06040000 PTL 000F4240) Dec 13 02:34:26.657174 kernel: ACPI: DSDT 0x000000007FEEAD55 01411E (v01 PTLTD Custom 06040000 MSFT 03000001) Dec 13 02:34:26.657178 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Dec 13 02:34:26.657182 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Dec 13 02:34:26.657188 kernel: ACPI: BOOT 0x000000007FEEAD2D 000028 (v01 PTLTD $SBFTBL$ 06040000 LTP 00000001) Dec 13 02:34:26.657195 kernel: ACPI: APIC 0x000000007FEEA5EB 000742 (v01 PTLTD ? APIC 06040000 LTP 00000000) Dec 13 02:34:26.657200 kernel: ACPI: MCFG 0x000000007FEEA5AF 00003C (v01 PTLTD $PCITBL$ 06040000 LTP 00000001) Dec 13 02:34:26.657205 kernel: ACPI: SRAT 0x000000007FEE9757 0008A8 (v02 VMWARE MEMPLUG 06040000 VMW 00000001) Dec 13 02:34:26.657210 kernel: ACPI: HPET 0x000000007FEE971F 000038 (v01 VMWARE VMW HPET 06040000 VMW 00000001) Dec 13 02:34:26.657216 kernel: ACPI: WAET 0x000000007FEE96F7 000028 (v01 VMWARE VMW WAET 06040000 VMW 00000001) Dec 13 02:34:26.657221 kernel: ACPI: Reserving FACP table memory at [mem 0x7fefee73-0x7fefef66] Dec 13 02:34:26.657226 kernel: ACPI: Reserving DSDT table memory at [mem 0x7feead55-0x7fefee72] Dec 13 02:34:26.657231 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Dec 13 02:34:26.657236 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Dec 13 02:34:26.657241 kernel: ACPI: Reserving BOOT table memory at [mem 0x7feead2d-0x7feead54] Dec 13 02:34:26.657246 kernel: ACPI: Reserving APIC table memory at [mem 0x7feea5eb-0x7feead2c] Dec 13 02:34:26.657251 kernel: ACPI: Reserving MCFG table memory at [mem 0x7feea5af-0x7feea5ea] Dec 13 02:34:26.657256 kernel: ACPI: Reserving SRAT table memory at [mem 0x7fee9757-0x7fee9ffe] Dec 13 02:34:26.657262 kernel: ACPI: Reserving HPET table memory at [mem 0x7fee971f-0x7fee9756] Dec 13 02:34:26.657267 kernel: ACPI: Reserving WAET table memory at [mem 0x7fee96f7-0x7fee971e] Dec 13 02:34:26.657272 kernel: system APIC only can use physical flat Dec 13 02:34:26.657277 kernel: Setting APIC routing to physical flat. Dec 13 02:34:26.657282 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 02:34:26.657287 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Dec 13 02:34:26.657292 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Dec 13 02:34:26.657297 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Dec 13 02:34:26.657302 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Dec 13 02:34:26.657307 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Dec 13 02:34:26.657313 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Dec 13 02:34:26.657317 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Dec 13 02:34:26.657322 kernel: SRAT: PXM 0 -> APIC 0x10 -> Node 0 Dec 13 02:34:26.657327 kernel: SRAT: PXM 0 -> APIC 0x12 -> Node 0 Dec 13 02:34:26.657332 kernel: SRAT: PXM 0 -> APIC 0x14 -> Node 0 Dec 13 02:34:26.657337 kernel: SRAT: PXM 0 -> APIC 0x16 -> Node 0 Dec 13 02:34:26.657341 kernel: SRAT: PXM 0 -> APIC 0x18 -> Node 0 Dec 13 02:34:26.657346 kernel: SRAT: PXM 0 -> APIC 0x1a -> Node 0 Dec 13 02:34:26.657351 kernel: SRAT: PXM 0 -> APIC 0x1c -> Node 0 Dec 13 02:34:26.657357 kernel: SRAT: PXM 0 -> APIC 0x1e -> Node 0 Dec 13 02:34:26.657362 kernel: SRAT: PXM 0 -> APIC 0x20 -> Node 0 Dec 13 02:34:26.657367 kernel: SRAT: PXM 0 -> APIC 0x22 -> Node 0 Dec 13 02:34:26.657372 kernel: SRAT: PXM 0 -> APIC 0x24 -> Node 0 Dec 13 02:34:26.657377 kernel: SRAT: PXM 0 -> APIC 0x26 -> Node 0 Dec 13 02:34:26.657382 kernel: SRAT: PXM 0 -> APIC 0x28 -> Node 0 Dec 13 02:34:26.657386 kernel: SRAT: PXM 0 -> APIC 0x2a -> Node 0 Dec 13 02:34:26.657391 kernel: SRAT: PXM 0 -> APIC 0x2c -> Node 0 Dec 13 02:34:26.657396 kernel: SRAT: PXM 0 -> APIC 0x2e -> Node 0 Dec 13 02:34:26.657401 kernel: SRAT: PXM 0 -> APIC 0x30 -> Node 0 Dec 13 02:34:26.657407 kernel: SRAT: PXM 0 -> APIC 0x32 -> Node 0 Dec 13 02:34:26.657412 kernel: SRAT: PXM 0 -> APIC 0x34 -> Node 0 Dec 13 02:34:26.657417 kernel: SRAT: PXM 0 -> APIC 0x36 -> Node 0 Dec 13 02:34:26.657422 kernel: SRAT: PXM 0 -> APIC 0x38 -> Node 0 Dec 13 02:34:26.657427 kernel: SRAT: PXM 0 -> APIC 0x3a -> Node 0 Dec 13 02:34:26.657432 kernel: SRAT: PXM 0 -> APIC 0x3c -> Node 0 Dec 13 02:34:26.657437 kernel: SRAT: PXM 0 -> APIC 0x3e -> Node 0 Dec 13 02:34:26.657441 kernel: SRAT: PXM 0 -> APIC 0x40 -> Node 0 Dec 13 02:34:26.657446 kernel: SRAT: PXM 0 -> APIC 0x42 -> Node 0 Dec 13 02:34:26.657451 kernel: SRAT: PXM 0 -> APIC 0x44 -> Node 0 Dec 13 02:34:26.657457 kernel: SRAT: PXM 0 -> APIC 0x46 -> Node 0 Dec 13 02:34:26.657462 kernel: SRAT: PXM 0 -> APIC 0x48 -> Node 0 Dec 13 02:34:26.657467 kernel: SRAT: PXM 0 -> APIC 0x4a -> Node 0 Dec 13 02:34:26.657472 kernel: SRAT: PXM 0 -> APIC 0x4c -> Node 0 Dec 13 02:34:26.657477 kernel: SRAT: PXM 0 -> APIC 0x4e -> Node 0 Dec 13 02:34:26.657482 kernel: SRAT: PXM 0 -> APIC 0x50 -> Node 0 Dec 13 02:34:26.657487 kernel: SRAT: PXM 0 -> APIC 0x52 -> Node 0 Dec 13 02:34:26.657491 kernel: SRAT: PXM 0 -> APIC 0x54 -> Node 0 Dec 13 02:34:26.657497 kernel: SRAT: PXM 0 -> APIC 0x56 -> Node 0 Dec 13 02:34:26.657501 kernel: SRAT: PXM 0 -> APIC 0x58 -> Node 0 Dec 13 02:34:26.657508 kernel: SRAT: PXM 0 -> APIC 0x5a -> Node 0 Dec 13 02:34:26.657512 kernel: SRAT: PXM 0 -> APIC 0x5c -> Node 0 Dec 13 02:34:26.657517 kernel: SRAT: PXM 0 -> APIC 0x5e -> Node 0 Dec 13 02:34:26.657522 kernel: SRAT: PXM 0 -> APIC 0x60 -> Node 0 Dec 13 02:34:26.657527 kernel: SRAT: PXM 0 -> APIC 0x62 -> Node 0 Dec 13 02:34:26.657532 kernel: SRAT: PXM 0 -> APIC 0x64 -> Node 0 Dec 13 02:34:26.657537 kernel: SRAT: PXM 0 -> APIC 0x66 -> Node 0 Dec 13 02:34:26.657541 kernel: SRAT: PXM 0 -> APIC 0x68 -> Node 0 Dec 13 02:34:26.657546 kernel: SRAT: PXM 0 -> APIC 0x6a -> Node 0 Dec 13 02:34:26.657551 kernel: SRAT: PXM 0 -> APIC 0x6c -> Node 0 Dec 13 02:34:26.657556 kernel: SRAT: PXM 0 -> APIC 0x6e -> Node 0 Dec 13 02:34:26.657561 kernel: SRAT: PXM 0 -> APIC 0x70 -> Node 0 Dec 13 02:34:26.657566 kernel: SRAT: PXM 0 -> APIC 0x72 -> Node 0 Dec 13 02:34:26.657571 kernel: SRAT: PXM 0 -> APIC 0x74 -> Node 0 Dec 13 02:34:26.657576 kernel: SRAT: PXM 0 -> APIC 0x76 -> Node 0 Dec 13 02:34:26.657581 kernel: SRAT: PXM 0 -> APIC 0x78 -> Node 0 Dec 13 02:34:26.657590 kernel: SRAT: PXM 0 -> APIC 0x7a -> Node 0 Dec 13 02:34:26.657595 kernel: SRAT: PXM 0 -> APIC 0x7c -> Node 0 Dec 13 02:34:26.657600 kernel: SRAT: PXM 0 -> APIC 0x7e -> Node 0 Dec 13 02:34:26.657605 kernel: SRAT: PXM 0 -> APIC 0x80 -> Node 0 Dec 13 02:34:26.657611 kernel: SRAT: PXM 0 -> APIC 0x82 -> Node 0 Dec 13 02:34:26.657617 kernel: SRAT: PXM 0 -> APIC 0x84 -> Node 0 Dec 13 02:34:26.657622 kernel: SRAT: PXM 0 -> APIC 0x86 -> Node 0 Dec 13 02:34:26.657627 kernel: SRAT: PXM 0 -> APIC 0x88 -> Node 0 Dec 13 02:34:26.657632 kernel: SRAT: PXM 0 -> APIC 0x8a -> Node 0 Dec 13 02:34:26.657637 kernel: SRAT: PXM 0 -> APIC 0x8c -> Node 0 Dec 13 02:34:26.657642 kernel: SRAT: PXM 0 -> APIC 0x8e -> Node 0 Dec 13 02:34:26.657648 kernel: SRAT: PXM 0 -> APIC 0x90 -> Node 0 Dec 13 02:34:26.657654 kernel: SRAT: PXM 0 -> APIC 0x92 -> Node 0 Dec 13 02:34:26.657659 kernel: SRAT: PXM 0 -> APIC 0x94 -> Node 0 Dec 13 02:34:26.657664 kernel: SRAT: PXM 0 -> APIC 0x96 -> Node 0 Dec 13 02:34:26.657669 kernel: SRAT: PXM 0 -> APIC 0x98 -> Node 0 Dec 13 02:34:26.657675 kernel: SRAT: PXM 0 -> APIC 0x9a -> Node 0 Dec 13 02:34:26.657680 kernel: SRAT: PXM 0 -> APIC 0x9c -> Node 0 Dec 13 02:34:26.657685 kernel: SRAT: PXM 0 -> APIC 0x9e -> Node 0 Dec 13 02:34:26.657690 kernel: SRAT: PXM 0 -> APIC 0xa0 -> Node 0 Dec 13 02:34:26.657695 kernel: SRAT: PXM 0 -> APIC 0xa2 -> Node 0 Dec 13 02:34:26.657701 kernel: SRAT: PXM 0 -> APIC 0xa4 -> Node 0 Dec 13 02:34:26.657707 kernel: SRAT: PXM 0 -> APIC 0xa6 -> Node 0 Dec 13 02:34:26.657712 kernel: SRAT: PXM 0 -> APIC 0xa8 -> Node 0 Dec 13 02:34:26.657717 kernel: SRAT: PXM 0 -> APIC 0xaa -> Node 0 Dec 13 02:34:26.657722 kernel: SRAT: PXM 0 -> APIC 0xac -> Node 0 Dec 13 02:34:26.657728 kernel: SRAT: PXM 0 -> APIC 0xae -> Node 0 Dec 13 02:34:26.657733 kernel: SRAT: PXM 0 -> APIC 0xb0 -> Node 0 Dec 13 02:34:26.657738 kernel: SRAT: PXM 0 -> APIC 0xb2 -> Node 0 Dec 13 02:34:26.657743 kernel: SRAT: PXM 0 -> APIC 0xb4 -> Node 0 Dec 13 02:34:26.657748 kernel: SRAT: PXM 0 -> APIC 0xb6 -> Node 0 Dec 13 02:34:26.657754 kernel: SRAT: PXM 0 -> APIC 0xb8 -> Node 0 Dec 13 02:34:26.657759 kernel: SRAT: PXM 0 -> APIC 0xba -> Node 0 Dec 13 02:34:26.657765 kernel: SRAT: PXM 0 -> APIC 0xbc -> Node 0 Dec 13 02:34:26.657770 kernel: SRAT: PXM 0 -> APIC 0xbe -> Node 0 Dec 13 02:34:26.657775 kernel: SRAT: PXM 0 -> APIC 0xc0 -> Node 0 Dec 13 02:34:26.657780 kernel: SRAT: PXM 0 -> APIC 0xc2 -> Node 0 Dec 13 02:34:26.657785 kernel: SRAT: PXM 0 -> APIC 0xc4 -> Node 0 Dec 13 02:34:26.657790 kernel: SRAT: PXM 0 -> APIC 0xc6 -> Node 0 Dec 13 02:34:26.657795 kernel: SRAT: PXM 0 -> APIC 0xc8 -> Node 0 Dec 13 02:34:26.657801 kernel: SRAT: PXM 0 -> APIC 0xca -> Node 0 Dec 13 02:34:26.657807 kernel: SRAT: PXM 0 -> APIC 0xcc -> Node 0 Dec 13 02:34:26.657812 kernel: SRAT: PXM 0 -> APIC 0xce -> Node 0 Dec 13 02:34:26.657817 kernel: SRAT: PXM 0 -> APIC 0xd0 -> Node 0 Dec 13 02:34:26.657822 kernel: SRAT: PXM 0 -> APIC 0xd2 -> Node 0 Dec 13 02:34:26.657827 kernel: SRAT: PXM 0 -> APIC 0xd4 -> Node 0 Dec 13 02:34:26.657833 kernel: SRAT: PXM 0 -> APIC 0xd6 -> Node 0 Dec 13 02:34:26.657838 kernel: SRAT: PXM 0 -> APIC 0xd8 -> Node 0 Dec 13 02:34:26.657843 kernel: SRAT: PXM 0 -> APIC 0xda -> Node 0 Dec 13 02:34:26.657848 kernel: SRAT: PXM 0 -> APIC 0xdc -> Node 0 Dec 13 02:34:26.657853 kernel: SRAT: PXM 0 -> APIC 0xde -> Node 0 Dec 13 02:34:26.657859 kernel: SRAT: PXM 0 -> APIC 0xe0 -> Node 0 Dec 13 02:34:26.657865 kernel: SRAT: PXM 0 -> APIC 0xe2 -> Node 0 Dec 13 02:34:26.657870 kernel: SRAT: PXM 0 -> APIC 0xe4 -> Node 0 Dec 13 02:34:26.657875 kernel: SRAT: PXM 0 -> APIC 0xe6 -> Node 0 Dec 13 02:34:26.657880 kernel: SRAT: PXM 0 -> APIC 0xe8 -> Node 0 Dec 13 02:34:26.657885 kernel: SRAT: PXM 0 -> APIC 0xea -> Node 0 Dec 13 02:34:26.657890 kernel: SRAT: PXM 0 -> APIC 0xec -> Node 0 Dec 13 02:34:26.657896 kernel: SRAT: PXM 0 -> APIC 0xee -> Node 0 Dec 13 02:34:26.657901 kernel: SRAT: PXM 0 -> APIC 0xf0 -> Node 0 Dec 13 02:34:26.657906 kernel: SRAT: PXM 0 -> APIC 0xf2 -> Node 0 Dec 13 02:34:26.657912 kernel: SRAT: PXM 0 -> APIC 0xf4 -> Node 0 Dec 13 02:34:26.657917 kernel: SRAT: PXM 0 -> APIC 0xf6 -> Node 0 Dec 13 02:34:26.657923 kernel: SRAT: PXM 0 -> APIC 0xf8 -> Node 0 Dec 13 02:34:26.657936 kernel: SRAT: PXM 0 -> APIC 0xfa -> Node 0 Dec 13 02:34:26.657941 kernel: SRAT: PXM 0 -> APIC 0xfc -> Node 0 Dec 13 02:34:26.657946 kernel: SRAT: PXM 0 -> APIC 0xfe -> Node 0 Dec 13 02:34:26.657952 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Dec 13 02:34:26.657957 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Dec 13 02:34:26.657963 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000-0xbfffffff] hotplug Dec 13 02:34:26.657968 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7fffffff] -> [mem 0x00000000-0x7fffffff] Dec 13 02:34:26.657975 kernel: NODE_DATA(0) allocated [mem 0x7fffa000-0x7fffffff] Dec 13 02:34:26.657980 kernel: Zone ranges: Dec 13 02:34:26.657986 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 02:34:26.657991 kernel: DMA32 [mem 0x0000000001000000-0x000000007fffffff] Dec 13 02:34:26.657996 kernel: Normal empty Dec 13 02:34:26.658002 kernel: Movable zone start for each node Dec 13 02:34:26.658007 kernel: Early memory node ranges Dec 13 02:34:26.658012 kernel: node 0: [mem 0x0000000000001000-0x000000000009dfff] Dec 13 02:34:26.658018 kernel: node 0: [mem 0x0000000000100000-0x000000007fedffff] Dec 13 02:34:26.658024 kernel: node 0: [mem 0x000000007ff00000-0x000000007fffffff] Dec 13 02:34:26.658029 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007fffffff] Dec 13 02:34:26.658034 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 02:34:26.658040 kernel: On node 0, zone DMA: 98 pages in unavailable ranges Dec 13 02:34:26.658045 kernel: On node 0, zone DMA32: 32 pages in unavailable ranges Dec 13 02:34:26.658051 kernel: ACPI: PM-Timer IO Port: 0x1008 Dec 13 02:34:26.658056 kernel: system APIC only can use physical flat Dec 13 02:34:26.658061 kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) Dec 13 02:34:26.658067 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Dec 13 02:34:26.658073 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Dec 13 02:34:26.658079 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Dec 13 02:34:26.658084 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Dec 13 02:34:26.658089 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Dec 13 02:34:26.658094 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Dec 13 02:34:26.658100 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Dec 13 02:34:26.658105 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Dec 13 02:34:26.658111 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Dec 13 02:34:26.658116 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Dec 13 02:34:26.658121 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Dec 13 02:34:26.658127 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Dec 13 02:34:26.658132 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Dec 13 02:34:26.658138 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Dec 13 02:34:26.658143 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Dec 13 02:34:26.658148 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Dec 13 02:34:26.658153 kernel: ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1]) Dec 13 02:34:26.658158 kernel: ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1]) Dec 13 02:34:26.658164 kernel: ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1]) Dec 13 02:34:26.658169 kernel: ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1]) Dec 13 02:34:26.658175 kernel: ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1]) Dec 13 02:34:26.658180 kernel: ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1]) Dec 13 02:34:26.658186 kernel: ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1]) Dec 13 02:34:26.658191 kernel: ACPI: LAPIC_NMI (acpi_id[0x18] high edge lint[0x1]) Dec 13 02:34:26.658196 kernel: ACPI: LAPIC_NMI (acpi_id[0x19] high edge lint[0x1]) Dec 13 02:34:26.658202 kernel: ACPI: LAPIC_NMI (acpi_id[0x1a] high edge lint[0x1]) Dec 13 02:34:26.658207 kernel: ACPI: LAPIC_NMI (acpi_id[0x1b] high edge lint[0x1]) Dec 13 02:34:26.658212 kernel: ACPI: LAPIC_NMI (acpi_id[0x1c] high edge lint[0x1]) Dec 13 02:34:26.658217 kernel: ACPI: LAPIC_NMI (acpi_id[0x1d] high edge lint[0x1]) Dec 13 02:34:26.658223 kernel: ACPI: LAPIC_NMI (acpi_id[0x1e] high edge lint[0x1]) Dec 13 02:34:26.658229 kernel: ACPI: LAPIC_NMI (acpi_id[0x1f] high edge lint[0x1]) Dec 13 02:34:26.658234 kernel: ACPI: LAPIC_NMI (acpi_id[0x20] high edge lint[0x1]) Dec 13 02:34:26.658239 kernel: ACPI: LAPIC_NMI (acpi_id[0x21] high edge lint[0x1]) Dec 13 02:34:26.658244 kernel: ACPI: LAPIC_NMI (acpi_id[0x22] high edge lint[0x1]) Dec 13 02:34:26.658250 kernel: ACPI: LAPIC_NMI (acpi_id[0x23] high edge lint[0x1]) Dec 13 02:34:26.658255 kernel: ACPI: LAPIC_NMI (acpi_id[0x24] high edge lint[0x1]) Dec 13 02:34:26.658260 kernel: ACPI: LAPIC_NMI (acpi_id[0x25] high edge lint[0x1]) Dec 13 02:34:26.658265 kernel: ACPI: LAPIC_NMI (acpi_id[0x26] high edge lint[0x1]) Dec 13 02:34:26.658270 kernel: ACPI: LAPIC_NMI (acpi_id[0x27] high edge lint[0x1]) Dec 13 02:34:26.658277 kernel: ACPI: LAPIC_NMI (acpi_id[0x28] high edge lint[0x1]) Dec 13 02:34:26.658282 kernel: ACPI: LAPIC_NMI (acpi_id[0x29] high edge lint[0x1]) Dec 13 02:34:26.658287 kernel: ACPI: LAPIC_NMI (acpi_id[0x2a] high edge lint[0x1]) Dec 13 02:34:26.658292 kernel: ACPI: LAPIC_NMI (acpi_id[0x2b] high edge lint[0x1]) Dec 13 02:34:26.658298 kernel: ACPI: LAPIC_NMI (acpi_id[0x2c] high edge lint[0x1]) Dec 13 02:34:26.658303 kernel: ACPI: LAPIC_NMI (acpi_id[0x2d] high edge lint[0x1]) Dec 13 02:34:26.658308 kernel: ACPI: LAPIC_NMI (acpi_id[0x2e] high edge lint[0x1]) Dec 13 02:34:26.658313 kernel: ACPI: LAPIC_NMI (acpi_id[0x2f] high edge lint[0x1]) Dec 13 02:34:26.658318 kernel: ACPI: LAPIC_NMI (acpi_id[0x30] high edge lint[0x1]) Dec 13 02:34:26.658324 kernel: ACPI: LAPIC_NMI (acpi_id[0x31] high edge lint[0x1]) Dec 13 02:34:26.658330 kernel: ACPI: LAPIC_NMI (acpi_id[0x32] high edge lint[0x1]) Dec 13 02:34:26.658335 kernel: ACPI: LAPIC_NMI (acpi_id[0x33] high edge lint[0x1]) Dec 13 02:34:26.658340 kernel: ACPI: LAPIC_NMI (acpi_id[0x34] high edge lint[0x1]) Dec 13 02:34:26.658345 kernel: ACPI: LAPIC_NMI (acpi_id[0x35] high edge lint[0x1]) Dec 13 02:34:26.658351 kernel: ACPI: LAPIC_NMI (acpi_id[0x36] high edge lint[0x1]) Dec 13 02:34:26.658356 kernel: ACPI: LAPIC_NMI (acpi_id[0x37] high edge lint[0x1]) Dec 13 02:34:26.658361 kernel: ACPI: LAPIC_NMI (acpi_id[0x38] high edge lint[0x1]) Dec 13 02:34:26.658367 kernel: ACPI: LAPIC_NMI (acpi_id[0x39] high edge lint[0x1]) Dec 13 02:34:26.658372 kernel: ACPI: LAPIC_NMI (acpi_id[0x3a] high edge lint[0x1]) Dec 13 02:34:26.658378 kernel: ACPI: LAPIC_NMI (acpi_id[0x3b] high edge lint[0x1]) Dec 13 02:34:26.658383 kernel: ACPI: LAPIC_NMI (acpi_id[0x3c] high edge lint[0x1]) Dec 13 02:34:26.658389 kernel: ACPI: LAPIC_NMI (acpi_id[0x3d] high edge lint[0x1]) Dec 13 02:34:26.658394 kernel: ACPI: LAPIC_NMI (acpi_id[0x3e] high edge lint[0x1]) Dec 13 02:34:26.658399 kernel: ACPI: LAPIC_NMI (acpi_id[0x3f] high edge lint[0x1]) Dec 13 02:34:26.658404 kernel: ACPI: LAPIC_NMI (acpi_id[0x40] high edge lint[0x1]) Dec 13 02:34:26.658409 kernel: ACPI: LAPIC_NMI (acpi_id[0x41] high edge lint[0x1]) Dec 13 02:34:26.658415 kernel: ACPI: LAPIC_NMI (acpi_id[0x42] high edge lint[0x1]) Dec 13 02:34:26.658420 kernel: ACPI: LAPIC_NMI (acpi_id[0x43] high edge lint[0x1]) Dec 13 02:34:26.658426 kernel: ACPI: LAPIC_NMI (acpi_id[0x44] high edge lint[0x1]) Dec 13 02:34:26.658432 kernel: ACPI: LAPIC_NMI (acpi_id[0x45] high edge lint[0x1]) Dec 13 02:34:26.658437 kernel: ACPI: LAPIC_NMI (acpi_id[0x46] high edge lint[0x1]) Dec 13 02:34:26.658442 kernel: ACPI: LAPIC_NMI (acpi_id[0x47] high edge lint[0x1]) Dec 13 02:34:26.658448 kernel: ACPI: LAPIC_NMI (acpi_id[0x48] high edge lint[0x1]) Dec 13 02:34:26.658453 kernel: ACPI: LAPIC_NMI (acpi_id[0x49] high edge lint[0x1]) Dec 13 02:34:26.658458 kernel: ACPI: LAPIC_NMI (acpi_id[0x4a] high edge lint[0x1]) Dec 13 02:34:26.658463 kernel: ACPI: LAPIC_NMI (acpi_id[0x4b] high edge lint[0x1]) Dec 13 02:34:26.658468 kernel: ACPI: LAPIC_NMI (acpi_id[0x4c] high edge lint[0x1]) Dec 13 02:34:26.658474 kernel: ACPI: LAPIC_NMI (acpi_id[0x4d] high edge lint[0x1]) Dec 13 02:34:26.658480 kernel: ACPI: LAPIC_NMI (acpi_id[0x4e] high edge lint[0x1]) Dec 13 02:34:26.658485 kernel: ACPI: LAPIC_NMI (acpi_id[0x4f] high edge lint[0x1]) Dec 13 02:34:26.658490 kernel: ACPI: LAPIC_NMI (acpi_id[0x50] high edge lint[0x1]) Dec 13 02:34:26.658496 kernel: ACPI: LAPIC_NMI (acpi_id[0x51] high edge lint[0x1]) Dec 13 02:34:26.658501 kernel: ACPI: LAPIC_NMI (acpi_id[0x52] high edge lint[0x1]) Dec 13 02:34:26.658506 kernel: ACPI: LAPIC_NMI (acpi_id[0x53] high edge lint[0x1]) Dec 13 02:34:26.658511 kernel: ACPI: LAPIC_NMI (acpi_id[0x54] high edge lint[0x1]) Dec 13 02:34:26.658516 kernel: ACPI: LAPIC_NMI (acpi_id[0x55] high edge lint[0x1]) Dec 13 02:34:26.658522 kernel: ACPI: LAPIC_NMI (acpi_id[0x56] high edge lint[0x1]) Dec 13 02:34:26.658527 kernel: ACPI: LAPIC_NMI (acpi_id[0x57] high edge lint[0x1]) Dec 13 02:34:26.658533 kernel: ACPI: LAPIC_NMI (acpi_id[0x58] high edge lint[0x1]) Dec 13 02:34:26.658539 kernel: ACPI: LAPIC_NMI (acpi_id[0x59] high edge lint[0x1]) Dec 13 02:34:26.658544 kernel: ACPI: LAPIC_NMI (acpi_id[0x5a] high edge lint[0x1]) Dec 13 02:34:26.658549 kernel: ACPI: LAPIC_NMI (acpi_id[0x5b] high edge lint[0x1]) Dec 13 02:34:26.658554 kernel: ACPI: LAPIC_NMI (acpi_id[0x5c] high edge lint[0x1]) Dec 13 02:34:26.658559 kernel: ACPI: LAPIC_NMI (acpi_id[0x5d] high edge lint[0x1]) Dec 13 02:34:26.658565 kernel: ACPI: LAPIC_NMI (acpi_id[0x5e] high edge lint[0x1]) Dec 13 02:34:26.658570 kernel: ACPI: LAPIC_NMI (acpi_id[0x5f] high edge lint[0x1]) Dec 13 02:34:26.658575 kernel: ACPI: LAPIC_NMI (acpi_id[0x60] high edge lint[0x1]) Dec 13 02:34:26.658581 kernel: ACPI: LAPIC_NMI (acpi_id[0x61] high edge lint[0x1]) Dec 13 02:34:26.658586 kernel: ACPI: LAPIC_NMI (acpi_id[0x62] high edge lint[0x1]) Dec 13 02:34:26.658592 kernel: ACPI: LAPIC_NMI (acpi_id[0x63] high edge lint[0x1]) Dec 13 02:34:26.658597 kernel: ACPI: LAPIC_NMI (acpi_id[0x64] high edge lint[0x1]) Dec 13 02:34:26.658602 kernel: ACPI: LAPIC_NMI (acpi_id[0x65] high edge lint[0x1]) Dec 13 02:34:26.658608 kernel: ACPI: LAPIC_NMI (acpi_id[0x66] high edge lint[0x1]) Dec 13 02:34:26.658613 kernel: ACPI: LAPIC_NMI (acpi_id[0x67] high edge lint[0x1]) Dec 13 02:34:26.658618 kernel: ACPI: LAPIC_NMI (acpi_id[0x68] high edge lint[0x1]) Dec 13 02:34:26.658623 kernel: ACPI: LAPIC_NMI (acpi_id[0x69] high edge lint[0x1]) Dec 13 02:34:26.658629 kernel: ACPI: LAPIC_NMI (acpi_id[0x6a] high edge lint[0x1]) Dec 13 02:34:26.658635 kernel: ACPI: LAPIC_NMI (acpi_id[0x6b] high edge lint[0x1]) Dec 13 02:34:26.658640 kernel: ACPI: LAPIC_NMI (acpi_id[0x6c] high edge lint[0x1]) Dec 13 02:34:26.658645 kernel: ACPI: LAPIC_NMI (acpi_id[0x6d] high edge lint[0x1]) Dec 13 02:34:26.658650 kernel: ACPI: LAPIC_NMI (acpi_id[0x6e] high edge lint[0x1]) Dec 13 02:34:26.658655 kernel: ACPI: LAPIC_NMI (acpi_id[0x6f] high edge lint[0x1]) Dec 13 02:34:26.658661 kernel: ACPI: LAPIC_NMI (acpi_id[0x70] high edge lint[0x1]) Dec 13 02:34:26.658666 kernel: ACPI: LAPIC_NMI (acpi_id[0x71] high edge lint[0x1]) Dec 13 02:34:26.658671 kernel: ACPI: LAPIC_NMI (acpi_id[0x72] high edge lint[0x1]) Dec 13 02:34:26.658676 kernel: ACPI: LAPIC_NMI (acpi_id[0x73] high edge lint[0x1]) Dec 13 02:34:26.658682 kernel: ACPI: LAPIC_NMI (acpi_id[0x74] high edge lint[0x1]) Dec 13 02:34:26.658688 kernel: ACPI: LAPIC_NMI (acpi_id[0x75] high edge lint[0x1]) Dec 13 02:34:26.658693 kernel: ACPI: LAPIC_NMI (acpi_id[0x76] high edge lint[0x1]) Dec 13 02:34:26.658698 kernel: ACPI: LAPIC_NMI (acpi_id[0x77] high edge lint[0x1]) Dec 13 02:34:26.658703 kernel: ACPI: LAPIC_NMI (acpi_id[0x78] high edge lint[0x1]) Dec 13 02:34:26.658709 kernel: ACPI: LAPIC_NMI (acpi_id[0x79] high edge lint[0x1]) Dec 13 02:34:26.658714 kernel: ACPI: LAPIC_NMI (acpi_id[0x7a] high edge lint[0x1]) Dec 13 02:34:26.658719 kernel: ACPI: LAPIC_NMI (acpi_id[0x7b] high edge lint[0x1]) Dec 13 02:34:26.658724 kernel: ACPI: LAPIC_NMI (acpi_id[0x7c] high edge lint[0x1]) Dec 13 02:34:26.658731 kernel: ACPI: LAPIC_NMI (acpi_id[0x7d] high edge lint[0x1]) Dec 13 02:34:26.658736 kernel: ACPI: LAPIC_NMI (acpi_id[0x7e] high edge lint[0x1]) Dec 13 02:34:26.658742 kernel: ACPI: LAPIC_NMI (acpi_id[0x7f] high edge lint[0x1]) Dec 13 02:34:26.658747 kernel: IOAPIC[0]: apic_id 1, version 17, address 0xfec00000, GSI 0-23 Dec 13 02:34:26.658752 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 high edge) Dec 13 02:34:26.658758 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 02:34:26.658763 kernel: ACPI: HPET id: 0x8086af01 base: 0xfed00000 Dec 13 02:34:26.658768 kernel: TSC deadline timer available Dec 13 02:34:26.658774 kernel: smpboot: Allowing 128 CPUs, 126 hotplug CPUs Dec 13 02:34:26.658779 kernel: [mem 0x80000000-0xefffffff] available for PCI devices Dec 13 02:34:26.658785 kernel: Booting paravirtualized kernel on VMware hypervisor Dec 13 02:34:26.658791 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 02:34:26.658796 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:128 nr_node_ids:1 Dec 13 02:34:26.658803 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Dec 13 02:34:26.658809 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Dec 13 02:34:26.658815 kernel: pcpu-alloc: [0] 000 001 002 003 004 005 006 007 Dec 13 02:34:26.658820 kernel: pcpu-alloc: [0] 008 009 010 011 012 013 014 015 Dec 13 02:34:26.658825 kernel: pcpu-alloc: [0] 016 017 018 019 020 021 022 023 Dec 13 02:34:26.658831 kernel: pcpu-alloc: [0] 024 025 026 027 028 029 030 031 Dec 13 02:34:26.658836 kernel: pcpu-alloc: [0] 032 033 034 035 036 037 038 039 Dec 13 02:34:26.658842 kernel: pcpu-alloc: [0] 040 041 042 043 044 045 046 047 Dec 13 02:34:26.658847 kernel: pcpu-alloc: [0] 048 049 050 051 052 053 054 055 Dec 13 02:34:26.658859 kernel: pcpu-alloc: [0] 056 057 058 059 060 061 062 063 Dec 13 02:34:26.658866 kernel: pcpu-alloc: [0] 064 065 066 067 068 069 070 071 Dec 13 02:34:26.658871 kernel: pcpu-alloc: [0] 072 073 074 075 076 077 078 079 Dec 13 02:34:26.658877 kernel: pcpu-alloc: [0] 080 081 082 083 084 085 086 087 Dec 13 02:34:26.658882 kernel: pcpu-alloc: [0] 088 089 090 091 092 093 094 095 Dec 13 02:34:26.658889 kernel: pcpu-alloc: [0] 096 097 098 099 100 101 102 103 Dec 13 02:34:26.658894 kernel: pcpu-alloc: [0] 104 105 106 107 108 109 110 111 Dec 13 02:34:26.658900 kernel: pcpu-alloc: [0] 112 113 114 115 116 117 118 119 Dec 13 02:34:26.658905 kernel: pcpu-alloc: [0] 120 121 122 123 124 125 126 127 Dec 13 02:34:26.658911 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515808 Dec 13 02:34:26.658916 kernel: Policy zone: DMA32 Dec 13 02:34:26.658922 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:34:26.658939 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 02:34:26.658945 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes Dec 13 02:34:26.663649 kernel: printk: log_buf_len total cpu_extra contributions: 520192 bytes Dec 13 02:34:26.663662 kernel: printk: log_buf_len min size: 262144 bytes Dec 13 02:34:26.663669 kernel: printk: log_buf_len: 1048576 bytes Dec 13 02:34:26.663675 kernel: printk: early log buf free: 239728(91%) Dec 13 02:34:26.663681 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 02:34:26.663687 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 02:34:26.663692 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 02:34:26.663698 kernel: Memory: 1940392K/2096628K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47476K init, 4108K bss, 155976K reserved, 0K cma-reserved) Dec 13 02:34:26.663707 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=128, Nodes=1 Dec 13 02:34:26.663714 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 02:34:26.663720 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 02:34:26.663727 kernel: rcu: Hierarchical RCU implementation. Dec 13 02:34:26.663733 kernel: rcu: RCU event tracing is enabled. Dec 13 02:34:26.663739 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=128. Dec 13 02:34:26.663746 kernel: Rude variant of Tasks RCU enabled. Dec 13 02:34:26.663752 kernel: Tracing variant of Tasks RCU enabled. Dec 13 02:34:26.663758 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 02:34:26.663764 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=128 Dec 13 02:34:26.663769 kernel: NR_IRQS: 33024, nr_irqs: 1448, preallocated irqs: 16 Dec 13 02:34:26.663775 kernel: random: crng init done Dec 13 02:34:26.663781 kernel: Console: colour VGA+ 80x25 Dec 13 02:34:26.663786 kernel: printk: console [tty0] enabled Dec 13 02:34:26.663792 kernel: printk: console [ttyS0] enabled Dec 13 02:34:26.663799 kernel: ACPI: Core revision 20210730 Dec 13 02:34:26.663805 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns Dec 13 02:34:26.663811 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 02:34:26.663817 kernel: x2apic enabled Dec 13 02:34:26.663823 kernel: Switched APIC routing to physical x2apic. Dec 13 02:34:26.663829 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Dec 13 02:34:26.663835 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Dec 13 02:34:26.663841 kernel: Calibrating delay loop (skipped) preset value.. 6816.00 BogoMIPS (lpj=3408000) Dec 13 02:34:26.663847 kernel: Disabled fast string operations Dec 13 02:34:26.663853 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Dec 13 02:34:26.663859 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Dec 13 02:34:26.663865 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 02:34:26.663871 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Dec 13 02:34:26.663877 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Dec 13 02:34:26.663883 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Dec 13 02:34:26.663889 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Dec 13 02:34:26.663895 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 02:34:26.663901 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Dec 13 02:34:26.663907 kernel: RETBleed: Mitigation: Enhanced IBRS Dec 13 02:34:26.663914 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 02:34:26.663920 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 02:34:26.663931 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 02:34:26.663937 kernel: SRBDS: Unknown: Dependent on hypervisor status Dec 13 02:34:26.663943 kernel: GDS: Unknown: Dependent on hypervisor status Dec 13 02:34:26.663949 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 02:34:26.663955 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 02:34:26.663960 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 02:34:26.663967 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 02:34:26.663973 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Dec 13 02:34:26.663979 kernel: Freeing SMP alternatives memory: 32K Dec 13 02:34:26.663985 kernel: pid_max: default: 131072 minimum: 1024 Dec 13 02:34:26.663991 kernel: LSM: Security Framework initializing Dec 13 02:34:26.663996 kernel: SELinux: Initializing. Dec 13 02:34:26.664002 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 02:34:26.664008 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 02:34:26.664014 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Dec 13 02:34:26.664020 kernel: Performance Events: Skylake events, core PMU driver. Dec 13 02:34:26.664026 kernel: core: CPUID marked event: 'cpu cycles' unavailable Dec 13 02:34:26.664032 kernel: core: CPUID marked event: 'instructions' unavailable Dec 13 02:34:26.664037 kernel: core: CPUID marked event: 'bus cycles' unavailable Dec 13 02:34:26.664043 kernel: core: CPUID marked event: 'cache references' unavailable Dec 13 02:34:26.664049 kernel: core: CPUID marked event: 'cache misses' unavailable Dec 13 02:34:26.664054 kernel: core: CPUID marked event: 'branch instructions' unavailable Dec 13 02:34:26.664060 kernel: core: CPUID marked event: 'branch misses' unavailable Dec 13 02:34:26.664066 kernel: ... version: 1 Dec 13 02:34:26.664072 kernel: ... bit width: 48 Dec 13 02:34:26.664078 kernel: ... generic registers: 4 Dec 13 02:34:26.664083 kernel: ... value mask: 0000ffffffffffff Dec 13 02:34:26.664089 kernel: ... max period: 000000007fffffff Dec 13 02:34:26.664095 kernel: ... fixed-purpose events: 0 Dec 13 02:34:26.664101 kernel: ... event mask: 000000000000000f Dec 13 02:34:26.664107 kernel: signal: max sigframe size: 1776 Dec 13 02:34:26.664112 kernel: rcu: Hierarchical SRCU implementation. Dec 13 02:34:26.664120 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 02:34:26.664126 kernel: smp: Bringing up secondary CPUs ... Dec 13 02:34:26.664132 kernel: x86: Booting SMP configuration: Dec 13 02:34:26.664137 kernel: .... node #0, CPUs: #1 Dec 13 02:34:26.664143 kernel: Disabled fast string operations Dec 13 02:34:26.664149 kernel: smpboot: CPU 1 Converting physical 2 to logical package 1 Dec 13 02:34:26.664154 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Dec 13 02:34:26.664160 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 02:34:26.664166 kernel: smpboot: Max logical packages: 128 Dec 13 02:34:26.664172 kernel: smpboot: Total of 2 processors activated (13632.00 BogoMIPS) Dec 13 02:34:26.664178 kernel: devtmpfs: initialized Dec 13 02:34:26.664184 kernel: x86/mm: Memory block size: 128MB Dec 13 02:34:26.664190 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7feff000-0x7fefffff] (4096 bytes) Dec 13 02:34:26.664196 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 02:34:26.664201 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) Dec 13 02:34:26.664207 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 02:34:26.664213 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 02:34:26.664219 kernel: audit: initializing netlink subsys (disabled) Dec 13 02:34:26.664225 kernel: audit: type=2000 audit(1734057265.059:1): state=initialized audit_enabled=0 res=1 Dec 13 02:34:26.664231 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 02:34:26.664237 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 02:34:26.664243 kernel: cpuidle: using governor menu Dec 13 02:34:26.664248 kernel: Simple Boot Flag at 0x36 set to 0x80 Dec 13 02:34:26.664254 kernel: ACPI: bus type PCI registered Dec 13 02:34:26.664260 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 02:34:26.664266 kernel: dca service started, version 1.12.1 Dec 13 02:34:26.664272 kernel: PCI: MMCONFIG for domain 0000 [bus 00-7f] at [mem 0xf0000000-0xf7ffffff] (base 0xf0000000) Dec 13 02:34:26.664277 kernel: PCI: MMCONFIG at [mem 0xf0000000-0xf7ffffff] reserved in E820 Dec 13 02:34:26.664284 kernel: PCI: Using configuration type 1 for base access Dec 13 02:34:26.664290 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 02:34:26.664296 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 02:34:26.664301 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 02:34:26.664307 kernel: ACPI: Added _OSI(Module Device) Dec 13 02:34:26.664313 kernel: ACPI: Added _OSI(Processor Device) Dec 13 02:34:26.664319 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 02:34:26.664325 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 02:34:26.664330 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 02:34:26.664337 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 02:34:26.664342 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 02:34:26.664348 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 02:34:26.664354 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Dec 13 02:34:26.664360 kernel: ACPI: Interpreter enabled Dec 13 02:34:26.664366 kernel: ACPI: PM: (supports S0 S1 S5) Dec 13 02:34:26.664371 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 02:34:26.664377 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 02:34:26.664383 kernel: ACPI: Enabled 4 GPEs in block 00 to 0F Dec 13 02:34:26.664389 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-7f]) Dec 13 02:34:26.664471 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 02:34:26.664521 kernel: acpi PNP0A03:00: _OSC: platform does not support [AER LTR] Dec 13 02:34:26.664567 kernel: acpi PNP0A03:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] Dec 13 02:34:26.664575 kernel: PCI host bridge to bus 0000:00 Dec 13 02:34:26.664622 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 02:34:26.664665 kernel: pci_bus 0000:00: root bus resource [mem 0x000cc000-0x000cffff window] Dec 13 02:34:26.664707 kernel: pci_bus 0000:00: root bus resource [mem 0x000d0000-0x000d3fff window] Dec 13 02:34:26.664746 kernel: pci_bus 0000:00: root bus resource [mem 0x000d4000-0x000d7fff window] Dec 13 02:34:26.664786 kernel: pci_bus 0000:00: root bus resource [mem 0x000d8000-0x000dbfff window] Dec 13 02:34:26.664825 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 13 02:34:26.664866 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 02:34:26.664905 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xfeff window] Dec 13 02:34:26.664954 kernel: pci_bus 0000:00: root bus resource [bus 00-7f] Dec 13 02:34:26.665011 kernel: pci 0000:00:00.0: [8086:7190] type 00 class 0x060000 Dec 13 02:34:26.665064 kernel: pci 0000:00:01.0: [8086:7191] type 01 class 0x060400 Dec 13 02:34:26.665119 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100 Dec 13 02:34:26.665170 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x01018a Dec 13 02:34:26.665218 kernel: pci 0000:00:07.1: reg 0x20: [io 0x1060-0x106f] Dec 13 02:34:26.665264 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Dec 13 02:34:26.665313 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Dec 13 02:34:26.665358 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Dec 13 02:34:26.665404 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Dec 13 02:34:26.665455 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000 Dec 13 02:34:26.665502 kernel: pci 0000:00:07.3: quirk: [io 0x1000-0x103f] claimed by PIIX4 ACPI Dec 13 02:34:26.665548 kernel: pci 0000:00:07.3: quirk: [io 0x1040-0x104f] claimed by PIIX4 SMB Dec 13 02:34:26.665599 kernel: pci 0000:00:07.7: [15ad:0740] type 00 class 0x088000 Dec 13 02:34:26.665648 kernel: pci 0000:00:07.7: reg 0x10: [io 0x1080-0x10bf] Dec 13 02:34:26.665693 kernel: pci 0000:00:07.7: reg 0x14: [mem 0xfebfe000-0xfebfffff 64bit] Dec 13 02:34:26.665743 kernel: pci 0000:00:0f.0: [15ad:0405] type 00 class 0x030000 Dec 13 02:34:26.665789 kernel: pci 0000:00:0f.0: reg 0x10: [io 0x1070-0x107f] Dec 13 02:34:26.665839 kernel: pci 0000:00:0f.0: reg 0x14: [mem 0xe8000000-0xefffffff pref] Dec 13 02:34:26.665885 kernel: pci 0000:00:0f.0: reg 0x18: [mem 0xfe000000-0xfe7fffff] Dec 13 02:34:26.665944 kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x00007fff pref] Dec 13 02:34:26.665994 kernel: pci 0000:00:0f.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 02:34:26.666045 kernel: pci 0000:00:11.0: [15ad:0790] type 01 class 0x060401 Dec 13 02:34:26.666116 kernel: pci 0000:00:15.0: [15ad:07a0] type 01 class 0x060400 Dec 13 02:34:26.666166 kernel: pci 0000:00:15.0: PME# supported from D0 D3hot D3cold Dec 13 02:34:26.666216 kernel: pci 0000:00:15.1: [15ad:07a0] type 01 class 0x060400 Dec 13 02:34:26.666263 kernel: pci 0000:00:15.1: PME# supported from D0 D3hot D3cold Dec 13 02:34:26.666317 kernel: pci 0000:00:15.2: [15ad:07a0] type 01 class 0x060400 Dec 13 02:34:26.666364 kernel: pci 0000:00:15.2: PME# supported from D0 D3hot D3cold Dec 13 02:34:26.666414 kernel: pci 0000:00:15.3: [15ad:07a0] type 01 class 0x060400 Dec 13 02:34:26.666461 kernel: pci 0000:00:15.3: PME# supported from D0 D3hot D3cold Dec 13 02:34:26.668488 kernel: pci 0000:00:15.4: [15ad:07a0] type 01 class 0x060400 Dec 13 02:34:26.668552 kernel: pci 0000:00:15.4: PME# supported from D0 D3hot D3cold Dec 13 02:34:26.668611 kernel: pci 0000:00:15.5: [15ad:07a0] type 01 class 0x060400 Dec 13 02:34:26.668661 kernel: pci 0000:00:15.5: PME# supported from D0 D3hot D3cold Dec 13 02:34:26.668713 kernel: pci 0000:00:15.6: [15ad:07a0] type 01 class 0x060400 Dec 13 02:34:26.668763 kernel: pci 0000:00:15.6: PME# supported from D0 D3hot D3cold Dec 13 02:34:26.668812 kernel: pci 0000:00:15.7: [15ad:07a0] type 01 class 0x060400 Dec 13 02:34:26.668859 kernel: pci 0000:00:15.7: PME# supported from D0 D3hot D3cold Dec 13 02:34:26.668912 kernel: pci 0000:00:16.0: [15ad:07a0] type 01 class 0x060400 Dec 13 02:34:26.673493 kernel: pci 0000:00:16.0: PME# supported from D0 D3hot D3cold Dec 13 02:34:26.673556 kernel: pci 0000:00:16.1: [15ad:07a0] type 01 class 0x060400 Dec 13 02:34:26.673613 kernel: pci 0000:00:16.1: PME# supported from D0 D3hot D3cold Dec 13 02:34:26.673664 kernel: pci 0000:00:16.2: [15ad:07a0] type 01 class 0x060400 Dec 13 02:34:26.673716 kernel: pci 0000:00:16.2: PME# supported from D0 D3hot D3cold Dec 13 02:34:26.673766 kernel: pci 0000:00:16.3: [15ad:07a0] type 01 class 0x060400 Dec 13 02:34:26.673814 kernel: pci 0000:00:16.3: PME# supported from D0 D3hot D3cold Dec 13 02:34:26.673866 kernel: pci 0000:00:16.4: [15ad:07a0] type 01 class 0x060400 Dec 13 02:34:26.673913 kernel: pci 0000:00:16.4: PME# supported from D0 D3hot D3cold Dec 13 02:34:26.673979 kernel: pci 0000:00:16.5: [15ad:07a0] type 01 class 0x060400 Dec 13 02:34:26.674027 kernel: pci 0000:00:16.5: PME# supported from D0 D3hot D3cold Dec 13 02:34:26.674080 kernel: pci 0000:00:16.6: [15ad:07a0] type 01 class 0x060400 Dec 13 02:34:26.674129 kernel: pci 0000:00:16.6: PME# supported from D0 D3hot D3cold Dec 13 02:34:26.674178 kernel: pci 0000:00:16.7: [15ad:07a0] type 01 class 0x060400 Dec 13 02:34:26.674226 kernel: pci 0000:00:16.7: PME# supported from D0 D3hot D3cold Dec 13 02:34:26.674275 kernel: pci 0000:00:17.0: [15ad:07a0] type 01 class 0x060400 Dec 13 02:34:26.674323 kernel: pci 0000:00:17.0: PME# supported from D0 D3hot D3cold Dec 13 02:34:26.674375 kernel: pci 0000:00:17.1: [15ad:07a0] type 01 class 0x060400 Dec 13 02:34:26.674421 kernel: pci 0000:00:17.1: PME# supported from D0 D3hot D3cold Dec 13 02:34:26.674470 kernel: pci 0000:00:17.2: [15ad:07a0] type 01 class 0x060400 Dec 13 02:34:26.674516 kernel: pci 0000:00:17.2: PME# supported from D0 D3hot D3cold Dec 13 02:34:26.674565 kernel: pci 0000:00:17.3: [15ad:07a0] type 01 class 0x060400 Dec 13 02:34:26.674612 kernel: pci 0000:00:17.3: PME# supported from D0 D3hot D3cold Dec 13 02:34:26.674665 kernel: pci 0000:00:17.4: [15ad:07a0] type 01 class 0x060400 Dec 13 02:34:26.674712 kernel: pci 0000:00:17.4: PME# supported from D0 D3hot D3cold Dec 13 02:34:26.674764 kernel: pci 0000:00:17.5: [15ad:07a0] type 01 class 0x060400 Dec 13 02:34:26.674812 kernel: pci 0000:00:17.5: PME# supported from D0 D3hot D3cold Dec 13 02:34:26.674862 kernel: pci 0000:00:17.6: [15ad:07a0] type 01 class 0x060400 Dec 13 02:34:26.674908 kernel: pci 0000:00:17.6: PME# supported from D0 D3hot D3cold Dec 13 02:34:26.675078 kernel: pci 0000:00:17.7: [15ad:07a0] type 01 class 0x060400 Dec 13 02:34:26.675130 kernel: pci 0000:00:17.7: PME# supported from D0 D3hot D3cold Dec 13 02:34:26.675180 kernel: pci 0000:00:18.0: [15ad:07a0] type 01 class 0x060400 Dec 13 02:34:26.675227 kernel: pci 0000:00:18.0: PME# supported from D0 D3hot D3cold Dec 13 02:34:26.675277 kernel: pci 0000:00:18.1: [15ad:07a0] type 01 class 0x060400 Dec 13 02:34:26.675324 kernel: pci 0000:00:18.1: PME# supported from D0 D3hot D3cold Dec 13 02:34:26.675374 kernel: pci 0000:00:18.2: [15ad:07a0] type 01 class 0x060400 Dec 13 02:34:26.675423 kernel: pci 0000:00:18.2: PME# supported from D0 D3hot D3cold Dec 13 02:34:26.675472 kernel: pci 0000:00:18.3: [15ad:07a0] type 01 class 0x060400 Dec 13 02:34:26.675519 kernel: pci 0000:00:18.3: PME# supported from D0 D3hot D3cold Dec 13 02:34:26.675569 kernel: pci 0000:00:18.4: [15ad:07a0] type 01 class 0x060400 Dec 13 02:34:26.675615 kernel: pci 0000:00:18.4: PME# supported from D0 D3hot D3cold Dec 13 02:34:26.675667 kernel: pci 0000:00:18.5: [15ad:07a0] type 01 class 0x060400 Dec 13 02:34:26.675921 kernel: pci 0000:00:18.5: PME# supported from D0 D3hot D3cold Dec 13 02:34:26.675990 kernel: pci 0000:00:18.6: [15ad:07a0] type 01 class 0x060400 Dec 13 02:34:26.676040 kernel: pci 0000:00:18.6: PME# supported from D0 D3hot D3cold Dec 13 02:34:26.676090 kernel: pci 0000:00:18.7: [15ad:07a0] type 01 class 0x060400 Dec 13 02:34:26.676138 kernel: pci 0000:00:18.7: PME# supported from D0 D3hot D3cold Dec 13 02:34:26.676204 kernel: pci_bus 0000:01: extended config space not accessible Dec 13 02:34:26.676262 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Dec 13 02:34:26.676313 kernel: pci_bus 0000:02: extended config space not accessible Dec 13 02:34:26.676321 kernel: acpiphp: Slot [32] registered Dec 13 02:34:26.676328 kernel: acpiphp: Slot [33] registered Dec 13 02:34:26.676334 kernel: acpiphp: Slot [34] registered Dec 13 02:34:26.676339 kernel: acpiphp: Slot [35] registered Dec 13 02:34:26.676345 kernel: acpiphp: Slot [36] registered Dec 13 02:34:26.676351 kernel: acpiphp: Slot [37] registered Dec 13 02:34:26.676358 kernel: acpiphp: Slot [38] registered Dec 13 02:34:26.676364 kernel: acpiphp: Slot [39] registered Dec 13 02:34:26.676370 kernel: acpiphp: Slot [40] registered Dec 13 02:34:26.676376 kernel: acpiphp: Slot [41] registered Dec 13 02:34:26.676381 kernel: acpiphp: Slot [42] registered Dec 13 02:34:26.676387 kernel: acpiphp: Slot [43] registered Dec 13 02:34:26.676393 kernel: acpiphp: Slot [44] registered Dec 13 02:34:26.676399 kernel: acpiphp: Slot [45] registered Dec 13 02:34:26.676404 kernel: acpiphp: Slot [46] registered Dec 13 02:34:26.676410 kernel: acpiphp: Slot [47] registered Dec 13 02:34:26.676417 kernel: acpiphp: Slot [48] registered Dec 13 02:34:26.676423 kernel: acpiphp: Slot [49] registered Dec 13 02:34:26.676429 kernel: acpiphp: Slot [50] registered Dec 13 02:34:26.676434 kernel: acpiphp: Slot [51] registered Dec 13 02:34:26.676440 kernel: acpiphp: Slot [52] registered Dec 13 02:34:26.676446 kernel: acpiphp: Slot [53] registered Dec 13 02:34:26.676452 kernel: acpiphp: Slot [54] registered Dec 13 02:34:26.676457 kernel: acpiphp: Slot [55] registered Dec 13 02:34:26.676463 kernel: acpiphp: Slot [56] registered Dec 13 02:34:26.676470 kernel: acpiphp: Slot [57] registered Dec 13 02:34:26.676475 kernel: acpiphp: Slot [58] registered Dec 13 02:34:26.676481 kernel: acpiphp: Slot [59] registered Dec 13 02:34:26.676487 kernel: acpiphp: Slot [60] registered Dec 13 02:34:26.676492 kernel: acpiphp: Slot [61] registered Dec 13 02:34:26.676498 kernel: acpiphp: Slot [62] registered Dec 13 02:34:26.676504 kernel: acpiphp: Slot [63] registered Dec 13 02:34:26.676552 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] (subtractive decode) Dec 13 02:34:26.676599 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Dec 13 02:34:26.676647 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Dec 13 02:34:26.676694 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Dec 13 02:34:26.676739 kernel: pci 0000:00:11.0: bridge window [mem 0x000a0000-0x000bffff window] (subtractive decode) Dec 13 02:34:26.676786 kernel: pci 0000:00:11.0: bridge window [mem 0x000cc000-0x000cffff window] (subtractive decode) Dec 13 02:34:26.676843 kernel: pci 0000:00:11.0: bridge window [mem 0x000d0000-0x000d3fff window] (subtractive decode) Dec 13 02:34:26.676890 kernel: pci 0000:00:11.0: bridge window [mem 0x000d4000-0x000d7fff window] (subtractive decode) Dec 13 02:34:26.676978 kernel: pci 0000:00:11.0: bridge window [mem 0x000d8000-0x000dbfff window] (subtractive decode) Dec 13 02:34:26.677026 kernel: pci 0000:00:11.0: bridge window [mem 0xc0000000-0xfebfffff window] (subtractive decode) Dec 13 02:34:26.677074 kernel: pci 0000:00:11.0: bridge window [io 0x0000-0x0cf7 window] (subtractive decode) Dec 13 02:34:26.677120 kernel: pci 0000:00:11.0: bridge window [io 0x0d00-0xfeff window] (subtractive decode) Dec 13 02:34:26.677172 kernel: pci 0000:03:00.0: [15ad:07c0] type 00 class 0x010700 Dec 13 02:34:26.677524 kernel: pci 0000:03:00.0: reg 0x10: [io 0x4000-0x4007] Dec 13 02:34:26.677598 kernel: pci 0000:03:00.0: reg 0x14: [mem 0xfd5f8000-0xfd5fffff 64bit] Dec 13 02:34:26.677650 kernel: pci 0000:03:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Dec 13 02:34:26.677699 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Dec 13 02:34:26.677750 kernel: pci 0000:03:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Dec 13 02:34:26.677799 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Dec 13 02:34:26.677846 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Dec 13 02:34:26.677891 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Dec 13 02:34:26.677947 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Dec 13 02:34:26.677994 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Dec 13 02:34:26.678039 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Dec 13 02:34:26.678084 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Dec 13 02:34:26.678287 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Dec 13 02:34:26.678345 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Dec 13 02:34:26.678394 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Dec 13 02:34:26.678442 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Dec 13 02:34:26.678492 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Dec 13 02:34:26.678539 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Dec 13 02:34:26.678586 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Dec 13 02:34:26.678638 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Dec 13 02:34:26.678684 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Dec 13 02:34:26.678730 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Dec 13 02:34:26.678778 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Dec 13 02:34:26.678827 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Dec 13 02:34:26.678888 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Dec 13 02:34:26.678985 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Dec 13 02:34:26.679033 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Dec 13 02:34:26.679080 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Dec 13 02:34:26.679127 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Dec 13 02:34:26.679173 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Dec 13 02:34:26.679521 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Dec 13 02:34:26.679582 kernel: pci 0000:0b:00.0: [15ad:07b0] type 00 class 0x020000 Dec 13 02:34:26.679633 kernel: pci 0000:0b:00.0: reg 0x10: [mem 0xfd4fc000-0xfd4fcfff] Dec 13 02:34:26.679681 kernel: pci 0000:0b:00.0: reg 0x14: [mem 0xfd4fd000-0xfd4fdfff] Dec 13 02:34:26.679730 kernel: pci 0000:0b:00.0: reg 0x18: [mem 0xfd4fe000-0xfd4fffff] Dec 13 02:34:26.679778 kernel: pci 0000:0b:00.0: reg 0x1c: [io 0x5000-0x500f] Dec 13 02:34:26.679832 kernel: pci 0000:0b:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Dec 13 02:34:26.679880 kernel: pci 0000:0b:00.0: supports D1 D2 Dec 13 02:34:26.679942 kernel: pci 0000:0b:00.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 02:34:26.680010 kernel: pci 0000:0b:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Dec 13 02:34:26.680059 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Dec 13 02:34:26.680105 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Dec 13 02:34:26.684678 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Dec 13 02:34:26.684749 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Dec 13 02:34:26.684800 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Dec 13 02:34:26.684848 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Dec 13 02:34:26.684896 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Dec 13 02:34:26.684958 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Dec 13 02:34:26.685005 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Dec 13 02:34:26.685051 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Dec 13 02:34:26.685097 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Dec 13 02:34:26.685146 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Dec 13 02:34:26.685193 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Dec 13 02:34:26.685238 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Dec 13 02:34:26.685288 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Dec 13 02:34:26.685333 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Dec 13 02:34:26.685378 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Dec 13 02:34:26.685425 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Dec 13 02:34:26.685471 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Dec 13 02:34:26.685516 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Dec 13 02:34:26.685563 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Dec 13 02:34:26.685608 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Dec 13 02:34:26.685655 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Dec 13 02:34:26.685870 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Dec 13 02:34:26.685988 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Dec 13 02:34:26.686041 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Dec 13 02:34:26.686089 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Dec 13 02:34:26.686411 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Dec 13 02:34:26.686468 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Dec 13 02:34:26.686517 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Dec 13 02:34:26.686568 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Dec 13 02:34:26.686614 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Dec 13 02:34:26.686660 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Dec 13 02:34:26.686705 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Dec 13 02:34:26.686753 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Dec 13 02:34:26.686798 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Dec 13 02:34:26.686857 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Dec 13 02:34:26.686903 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Dec 13 02:34:26.686965 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Dec 13 02:34:26.687013 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Dec 13 02:34:26.687076 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Dec 13 02:34:26.687124 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Dec 13 02:34:26.687349 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Dec 13 02:34:26.687400 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Dec 13 02:34:26.687449 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Dec 13 02:34:26.687498 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Dec 13 02:34:26.687544 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Dec 13 02:34:26.687591 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Dec 13 02:34:26.687637 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Dec 13 02:34:26.687682 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Dec 13 02:34:26.687730 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Dec 13 02:34:26.687776 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Dec 13 02:34:26.687821 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Dec 13 02:34:26.687871 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Dec 13 02:34:26.687915 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Dec 13 02:34:26.687968 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Dec 13 02:34:26.688016 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Dec 13 02:34:26.688062 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Dec 13 02:34:26.688118 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Dec 13 02:34:26.688177 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Dec 13 02:34:26.688224 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Dec 13 02:34:26.688275 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Dec 13 02:34:26.688321 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Dec 13 02:34:26.688366 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Dec 13 02:34:26.688414 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Dec 13 02:34:26.688459 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Dec 13 02:34:26.688505 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Dec 13 02:34:26.688552 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Dec 13 02:34:26.688599 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Dec 13 02:34:26.688646 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Dec 13 02:34:26.688694 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Dec 13 02:34:26.688741 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Dec 13 02:34:26.688787 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Dec 13 02:34:26.688834 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Dec 13 02:34:26.688881 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Dec 13 02:34:26.688955 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Dec 13 02:34:26.689009 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Dec 13 02:34:26.689057 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Dec 13 02:34:26.689102 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Dec 13 02:34:26.689110 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 9 Dec 13 02:34:26.689117 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 0 Dec 13 02:34:26.689123 kernel: ACPI: PCI: Interrupt link LNKB disabled Dec 13 02:34:26.689129 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 02:34:26.689135 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 10 Dec 13 02:34:26.689141 kernel: iommu: Default domain type: Translated Dec 13 02:34:26.689146 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 02:34:26.689398 kernel: pci 0000:00:0f.0: vgaarb: setting as boot VGA device Dec 13 02:34:26.689458 kernel: pci 0000:00:0f.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 02:34:26.689506 kernel: pci 0000:00:0f.0: vgaarb: bridge control possible Dec 13 02:34:26.689515 kernel: vgaarb: loaded Dec 13 02:34:26.689521 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 02:34:26.689528 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 02:34:26.689534 kernel: PTP clock support registered Dec 13 02:34:26.689540 kernel: PCI: Using ACPI for IRQ routing Dec 13 02:34:26.689546 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 02:34:26.689554 kernel: e820: reserve RAM buffer [mem 0x0009ec00-0x0009ffff] Dec 13 02:34:26.689559 kernel: e820: reserve RAM buffer [mem 0x7fee0000-0x7fffffff] Dec 13 02:34:26.689565 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 Dec 13 02:34:26.689575 kernel: hpet0: 16 comparators, 64-bit 14.318180 MHz counter Dec 13 02:34:26.689581 kernel: clocksource: Switched to clocksource tsc-early Dec 13 02:34:26.689587 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 02:34:26.689593 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 02:34:26.689599 kernel: pnp: PnP ACPI init Dec 13 02:34:26.689650 kernel: system 00:00: [io 0x1000-0x103f] has been reserved Dec 13 02:34:26.689696 kernel: system 00:00: [io 0x1040-0x104f] has been reserved Dec 13 02:34:26.689739 kernel: system 00:00: [io 0x0cf0-0x0cf1] has been reserved Dec 13 02:34:26.689783 kernel: system 00:04: [mem 0xfed00000-0xfed003ff] has been reserved Dec 13 02:34:26.689832 kernel: pnp 00:06: [dma 2] Dec 13 02:34:26.689878 kernel: system 00:07: [io 0xfce0-0xfcff] has been reserved Dec 13 02:34:26.689921 kernel: system 00:07: [mem 0xf0000000-0xf7ffffff] has been reserved Dec 13 02:34:26.689974 kernel: system 00:07: [mem 0xfe800000-0xfe9fffff] has been reserved Dec 13 02:34:26.689982 kernel: pnp: PnP ACPI: found 8 devices Dec 13 02:34:26.689988 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 02:34:26.689994 kernel: NET: Registered PF_INET protocol family Dec 13 02:34:26.690001 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 02:34:26.690007 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Dec 13 02:34:26.690012 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 02:34:26.690019 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 02:34:26.690027 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 02:34:26.690033 kernel: TCP: Hash tables configured (established 16384 bind 16384) Dec 13 02:34:26.690039 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 02:34:26.690044 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 02:34:26.690050 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 02:34:26.690056 kernel: NET: Registered PF_XDP protocol family Dec 13 02:34:26.690105 kernel: pci 0000:00:15.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Dec 13 02:34:26.690155 kernel: pci 0000:00:15.3: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Dec 13 02:34:26.690207 kernel: pci 0000:00:15.4: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Dec 13 02:34:26.690255 kernel: pci 0000:00:15.5: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Dec 13 02:34:26.690303 kernel: pci 0000:00:15.6: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Dec 13 02:34:26.690351 kernel: pci 0000:00:15.7: bridge window [io 0x1000-0x0fff] to [bus 0a] add_size 1000 Dec 13 02:34:26.690398 kernel: pci 0000:00:16.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 0b] add_size 200000 add_align 100000 Dec 13 02:34:26.690445 kernel: pci 0000:00:16.3: bridge window [io 0x1000-0x0fff] to [bus 0e] add_size 1000 Dec 13 02:34:26.690494 kernel: pci 0000:00:16.4: bridge window [io 0x1000-0x0fff] to [bus 0f] add_size 1000 Dec 13 02:34:26.690540 kernel: pci 0000:00:16.5: bridge window [io 0x1000-0x0fff] to [bus 10] add_size 1000 Dec 13 02:34:26.690588 kernel: pci 0000:00:16.6: bridge window [io 0x1000-0x0fff] to [bus 11] add_size 1000 Dec 13 02:34:26.690635 kernel: pci 0000:00:16.7: bridge window [io 0x1000-0x0fff] to [bus 12] add_size 1000 Dec 13 02:34:26.690681 kernel: pci 0000:00:17.3: bridge window [io 0x1000-0x0fff] to [bus 16] add_size 1000 Dec 13 02:34:26.690728 kernel: pci 0000:00:17.4: bridge window [io 0x1000-0x0fff] to [bus 17] add_size 1000 Dec 13 02:34:26.690777 kernel: pci 0000:00:17.5: bridge window [io 0x1000-0x0fff] to [bus 18] add_size 1000 Dec 13 02:34:26.690826 kernel: pci 0000:00:17.6: bridge window [io 0x1000-0x0fff] to [bus 19] add_size 1000 Dec 13 02:34:26.690873 kernel: pci 0000:00:17.7: bridge window [io 0x1000-0x0fff] to [bus 1a] add_size 1000 Dec 13 02:34:26.690920 kernel: pci 0000:00:18.2: bridge window [io 0x1000-0x0fff] to [bus 1d] add_size 1000 Dec 13 02:34:26.691285 kernel: pci 0000:00:18.3: bridge window [io 0x1000-0x0fff] to [bus 1e] add_size 1000 Dec 13 02:34:26.691627 kernel: pci 0000:00:18.4: bridge window [io 0x1000-0x0fff] to [bus 1f] add_size 1000 Dec 13 02:34:26.691685 kernel: pci 0000:00:18.5: bridge window [io 0x1000-0x0fff] to [bus 20] add_size 1000 Dec 13 02:34:26.691958 kernel: pci 0000:00:18.6: bridge window [io 0x1000-0x0fff] to [bus 21] add_size 1000 Dec 13 02:34:26.692011 kernel: pci 0000:00:18.7: bridge window [io 0x1000-0x0fff] to [bus 22] add_size 1000 Dec 13 02:34:26.692061 kernel: pci 0000:00:15.0: BAR 15: assigned [mem 0xc0000000-0xc01fffff 64bit pref] Dec 13 02:34:26.692113 kernel: pci 0000:00:16.0: BAR 15: assigned [mem 0xc0200000-0xc03fffff 64bit pref] Dec 13 02:34:26.692162 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.692212 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.692260 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.692307 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.692354 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.692400 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.692447 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.692493 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.692539 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.692587 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.692634 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.692679 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.692725 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.692771 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.692823 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.692869 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.692917 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.693251 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.693302 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.693351 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.693402 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.693451 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.693498 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.693544 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.693592 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.693641 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.693687 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.693734 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.693780 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.693825 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.693871 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.693917 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.693976 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.694024 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.694070 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.694115 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.694160 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.694206 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.694251 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.694297 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.694344 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.694391 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.694437 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.694484 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.694530 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.694575 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.694622 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.694667 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.694713 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.694759 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.694807 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.694853 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.694898 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.694957 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.695005 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.695051 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.695097 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.695143 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.695188 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.695234 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.695282 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.695329 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.695375 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.695421 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.695467 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.695513 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.695559 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.695606 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.695652 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.695700 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.695746 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.695792 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.695843 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.695889 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.695946 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.695995 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.696041 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.696087 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.696133 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.696182 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.696228 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.696275 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.696321 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Dec 13 02:34:26.696368 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Dec 13 02:34:26.696416 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Dec 13 02:34:26.696464 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] Dec 13 02:34:26.696510 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Dec 13 02:34:26.696559 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Dec 13 02:34:26.696604 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Dec 13 02:34:26.696655 kernel: pci 0000:03:00.0: BAR 6: assigned [mem 0xfd500000-0xfd50ffff pref] Dec 13 02:34:26.696704 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Dec 13 02:34:26.696750 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Dec 13 02:34:26.696797 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Dec 13 02:34:26.696859 kernel: pci 0000:00:15.0: bridge window [mem 0xc0000000-0xc01fffff 64bit pref] Dec 13 02:34:26.696908 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Dec 13 02:34:26.697246 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Dec 13 02:34:26.697301 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Dec 13 02:34:26.697349 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Dec 13 02:34:26.697428 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Dec 13 02:34:26.697688 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Dec 13 02:34:26.697742 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Dec 13 02:34:26.697792 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Dec 13 02:34:26.697839 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Dec 13 02:34:26.697886 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Dec 13 02:34:26.697939 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Dec 13 02:34:26.697989 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Dec 13 02:34:26.698265 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Dec 13 02:34:26.698326 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Dec 13 02:34:26.698375 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Dec 13 02:34:26.698423 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Dec 13 02:34:26.698470 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Dec 13 02:34:26.698519 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Dec 13 02:34:26.698569 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Dec 13 02:34:26.698615 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Dec 13 02:34:26.698662 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Dec 13 02:34:26.698709 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Dec 13 02:34:26.699141 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Dec 13 02:34:26.699199 kernel: pci 0000:0b:00.0: BAR 6: assigned [mem 0xfd400000-0xfd40ffff pref] Dec 13 02:34:26.699257 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Dec 13 02:34:26.699304 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Dec 13 02:34:26.699351 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Dec 13 02:34:26.699400 kernel: pci 0000:00:16.0: bridge window [mem 0xc0200000-0xc03fffff 64bit pref] Dec 13 02:34:26.699450 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Dec 13 02:34:26.699497 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Dec 13 02:34:26.699543 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Dec 13 02:34:26.699590 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Dec 13 02:34:26.699637 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Dec 13 02:34:26.699683 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Dec 13 02:34:26.699729 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Dec 13 02:34:26.699775 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Dec 13 02:34:26.699828 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Dec 13 02:34:26.699874 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Dec 13 02:34:26.699920 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Dec 13 02:34:26.699976 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Dec 13 02:34:26.700022 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Dec 13 02:34:26.700068 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Dec 13 02:34:26.700115 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Dec 13 02:34:26.700161 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Dec 13 02:34:26.700207 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Dec 13 02:34:26.700477 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Dec 13 02:34:26.700538 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Dec 13 02:34:26.700592 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Dec 13 02:34:26.700666 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Dec 13 02:34:26.700938 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Dec 13 02:34:26.700994 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Dec 13 02:34:26.701045 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Dec 13 02:34:26.701094 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Dec 13 02:34:26.701140 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Dec 13 02:34:26.701186 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Dec 13 02:34:26.701238 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Dec 13 02:34:26.701284 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Dec 13 02:34:26.701330 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Dec 13 02:34:26.701377 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Dec 13 02:34:26.701424 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Dec 13 02:34:26.701470 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Dec 13 02:34:26.701516 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Dec 13 02:34:26.701562 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Dec 13 02:34:26.701608 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Dec 13 02:34:26.701654 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Dec 13 02:34:26.701703 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Dec 13 02:34:26.701750 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Dec 13 02:34:26.701796 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Dec 13 02:34:26.701842 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Dec 13 02:34:26.701888 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Dec 13 02:34:26.701944 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Dec 13 02:34:26.701994 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Dec 13 02:34:26.702041 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Dec 13 02:34:26.702088 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Dec 13 02:34:26.702136 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Dec 13 02:34:26.702184 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Dec 13 02:34:26.702230 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Dec 13 02:34:26.702276 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Dec 13 02:34:26.702324 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Dec 13 02:34:26.702370 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Dec 13 02:34:26.702416 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Dec 13 02:34:26.702462 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Dec 13 02:34:26.702532 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Dec 13 02:34:26.702810 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Dec 13 02:34:26.702868 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Dec 13 02:34:26.702918 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Dec 13 02:34:26.703241 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Dec 13 02:34:26.703295 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Dec 13 02:34:26.703343 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Dec 13 02:34:26.703612 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Dec 13 02:34:26.703664 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Dec 13 02:34:26.703712 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Dec 13 02:34:26.703770 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Dec 13 02:34:26.703823 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Dec 13 02:34:26.703869 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Dec 13 02:34:26.703917 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Dec 13 02:34:26.704286 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Dec 13 02:34:26.704553 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Dec 13 02:34:26.704606 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Dec 13 02:34:26.704654 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Dec 13 02:34:26.704712 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Dec 13 02:34:26.704762 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Dec 13 02:34:26.704810 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Dec 13 02:34:26.704858 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Dec 13 02:34:26.704904 kernel: pci_bus 0000:00: resource 4 [mem 0x000a0000-0x000bffff window] Dec 13 02:34:26.704960 kernel: pci_bus 0000:00: resource 5 [mem 0x000cc000-0x000cffff window] Dec 13 02:34:26.705001 kernel: pci_bus 0000:00: resource 6 [mem 0x000d0000-0x000d3fff window] Dec 13 02:34:26.705042 kernel: pci_bus 0000:00: resource 7 [mem 0x000d4000-0x000d7fff window] Dec 13 02:34:26.705082 kernel: pci_bus 0000:00: resource 8 [mem 0x000d8000-0x000dbfff window] Dec 13 02:34:26.705122 kernel: pci_bus 0000:00: resource 9 [mem 0xc0000000-0xfebfffff window] Dec 13 02:34:26.705165 kernel: pci_bus 0000:00: resource 10 [io 0x0000-0x0cf7 window] Dec 13 02:34:26.705206 kernel: pci_bus 0000:00: resource 11 [io 0x0d00-0xfeff window] Dec 13 02:34:26.705252 kernel: pci_bus 0000:02: resource 0 [io 0x2000-0x3fff] Dec 13 02:34:26.705295 kernel: pci_bus 0000:02: resource 1 [mem 0xfd600000-0xfdffffff] Dec 13 02:34:26.705337 kernel: pci_bus 0000:02: resource 2 [mem 0xe7b00000-0xe7ffffff 64bit pref] Dec 13 02:34:26.705379 kernel: pci_bus 0000:02: resource 4 [mem 0x000a0000-0x000bffff window] Dec 13 02:34:26.705420 kernel: pci_bus 0000:02: resource 5 [mem 0x000cc000-0x000cffff window] Dec 13 02:34:26.705464 kernel: pci_bus 0000:02: resource 6 [mem 0x000d0000-0x000d3fff window] Dec 13 02:34:26.705505 kernel: pci_bus 0000:02: resource 7 [mem 0x000d4000-0x000d7fff window] Dec 13 02:34:26.705547 kernel: pci_bus 0000:02: resource 8 [mem 0x000d8000-0x000dbfff window] Dec 13 02:34:26.705589 kernel: pci_bus 0000:02: resource 9 [mem 0xc0000000-0xfebfffff window] Dec 13 02:34:26.705630 kernel: pci_bus 0000:02: resource 10 [io 0x0000-0x0cf7 window] Dec 13 02:34:26.705673 kernel: pci_bus 0000:02: resource 11 [io 0x0d00-0xfeff window] Dec 13 02:34:26.705719 kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x4fff] Dec 13 02:34:26.705763 kernel: pci_bus 0000:03: resource 1 [mem 0xfd500000-0xfd5fffff] Dec 13 02:34:26.705812 kernel: pci_bus 0000:03: resource 2 [mem 0xc0000000-0xc01fffff 64bit pref] Dec 13 02:34:26.705858 kernel: pci_bus 0000:04: resource 0 [io 0x8000-0x8fff] Dec 13 02:34:26.705901 kernel: pci_bus 0000:04: resource 1 [mem 0xfd100000-0xfd1fffff] Dec 13 02:34:26.706214 kernel: pci_bus 0000:04: resource 2 [mem 0xe7800000-0xe78fffff 64bit pref] Dec 13 02:34:26.706271 kernel: pci_bus 0000:05: resource 0 [io 0xc000-0xcfff] Dec 13 02:34:26.706527 kernel: pci_bus 0000:05: resource 1 [mem 0xfcd00000-0xfcdfffff] Dec 13 02:34:26.706578 kernel: pci_bus 0000:05: resource 2 [mem 0xe7400000-0xe74fffff 64bit pref] Dec 13 02:34:26.706626 kernel: pci_bus 0000:06: resource 1 [mem 0xfc900000-0xfc9fffff] Dec 13 02:34:26.706674 kernel: pci_bus 0000:06: resource 2 [mem 0xe7000000-0xe70fffff 64bit pref] Dec 13 02:34:26.706723 kernel: pci_bus 0000:07: resource 1 [mem 0xfc500000-0xfc5fffff] Dec 13 02:34:26.706774 kernel: pci_bus 0000:07: resource 2 [mem 0xe6c00000-0xe6cfffff 64bit pref] Dec 13 02:34:26.706835 kernel: pci_bus 0000:08: resource 1 [mem 0xfc100000-0xfc1fffff] Dec 13 02:34:26.706881 kernel: pci_bus 0000:08: resource 2 [mem 0xe6800000-0xe68fffff 64bit pref] Dec 13 02:34:26.707170 kernel: pci_bus 0000:09: resource 1 [mem 0xfbd00000-0xfbdfffff] Dec 13 02:34:26.707224 kernel: pci_bus 0000:09: resource 2 [mem 0xe6400000-0xe64fffff 64bit pref] Dec 13 02:34:26.707483 kernel: pci_bus 0000:0a: resource 1 [mem 0xfb900000-0xfb9fffff] Dec 13 02:34:26.707537 kernel: pci_bus 0000:0a: resource 2 [mem 0xe6000000-0xe60fffff 64bit pref] Dec 13 02:34:26.707589 kernel: pci_bus 0000:0b: resource 0 [io 0x5000-0x5fff] Dec 13 02:34:26.707636 kernel: pci_bus 0000:0b: resource 1 [mem 0xfd400000-0xfd4fffff] Dec 13 02:34:26.707680 kernel: pci_bus 0000:0b: resource 2 [mem 0xc0200000-0xc03fffff 64bit pref] Dec 13 02:34:26.707726 kernel: pci_bus 0000:0c: resource 0 [io 0x9000-0x9fff] Dec 13 02:34:26.707770 kernel: pci_bus 0000:0c: resource 1 [mem 0xfd000000-0xfd0fffff] Dec 13 02:34:26.707812 kernel: pci_bus 0000:0c: resource 2 [mem 0xe7700000-0xe77fffff 64bit pref] Dec 13 02:34:26.707860 kernel: pci_bus 0000:0d: resource 0 [io 0xd000-0xdfff] Dec 13 02:34:26.707903 kernel: pci_bus 0000:0d: resource 1 [mem 0xfcc00000-0xfccfffff] Dec 13 02:34:26.707964 kernel: pci_bus 0000:0d: resource 2 [mem 0xe7300000-0xe73fffff 64bit pref] Dec 13 02:34:26.708013 kernel: pci_bus 0000:0e: resource 1 [mem 0xfc800000-0xfc8fffff] Dec 13 02:34:26.708056 kernel: pci_bus 0000:0e: resource 2 [mem 0xe6f00000-0xe6ffffff 64bit pref] Dec 13 02:34:26.708106 kernel: pci_bus 0000:0f: resource 1 [mem 0xfc400000-0xfc4fffff] Dec 13 02:34:26.708153 kernel: pci_bus 0000:0f: resource 2 [mem 0xe6b00000-0xe6bfffff 64bit pref] Dec 13 02:34:26.708206 kernel: pci_bus 0000:10: resource 1 [mem 0xfc000000-0xfc0fffff] Dec 13 02:34:26.708252 kernel: pci_bus 0000:10: resource 2 [mem 0xe6700000-0xe67fffff 64bit pref] Dec 13 02:34:26.708302 kernel: pci_bus 0000:11: resource 1 [mem 0xfbc00000-0xfbcfffff] Dec 13 02:34:26.708345 kernel: pci_bus 0000:11: resource 2 [mem 0xe6300000-0xe63fffff 64bit pref] Dec 13 02:34:26.708392 kernel: pci_bus 0000:12: resource 1 [mem 0xfb800000-0xfb8fffff] Dec 13 02:34:26.708435 kernel: pci_bus 0000:12: resource 2 [mem 0xe5f00000-0xe5ffffff 64bit pref] Dec 13 02:34:26.708481 kernel: pci_bus 0000:13: resource 0 [io 0x6000-0x6fff] Dec 13 02:34:26.708524 kernel: pci_bus 0000:13: resource 1 [mem 0xfd300000-0xfd3fffff] Dec 13 02:34:26.708569 kernel: pci_bus 0000:13: resource 2 [mem 0xe7a00000-0xe7afffff 64bit pref] Dec 13 02:34:26.708616 kernel: pci_bus 0000:14: resource 0 [io 0xa000-0xafff] Dec 13 02:34:26.708659 kernel: pci_bus 0000:14: resource 1 [mem 0xfcf00000-0xfcffffff] Dec 13 02:34:26.708701 kernel: pci_bus 0000:14: resource 2 [mem 0xe7600000-0xe76fffff 64bit pref] Dec 13 02:34:26.708747 kernel: pci_bus 0000:15: resource 0 [io 0xe000-0xefff] Dec 13 02:34:26.708791 kernel: pci_bus 0000:15: resource 1 [mem 0xfcb00000-0xfcbfffff] Dec 13 02:34:26.708834 kernel: pci_bus 0000:15: resource 2 [mem 0xe7200000-0xe72fffff 64bit pref] Dec 13 02:34:26.708882 kernel: pci_bus 0000:16: resource 1 [mem 0xfc700000-0xfc7fffff] Dec 13 02:34:26.709214 kernel: pci_bus 0000:16: resource 2 [mem 0xe6e00000-0xe6efffff 64bit pref] Dec 13 02:34:26.709266 kernel: pci_bus 0000:17: resource 1 [mem 0xfc300000-0xfc3fffff] Dec 13 02:34:26.709525 kernel: pci_bus 0000:17: resource 2 [mem 0xe6a00000-0xe6afffff 64bit pref] Dec 13 02:34:26.709578 kernel: pci_bus 0000:18: resource 1 [mem 0xfbf00000-0xfbffffff] Dec 13 02:34:26.709624 kernel: pci_bus 0000:18: resource 2 [mem 0xe6600000-0xe66fffff 64bit pref] Dec 13 02:34:26.709697 kernel: pci_bus 0000:19: resource 1 [mem 0xfbb00000-0xfbbfffff] Dec 13 02:34:26.709971 kernel: pci_bus 0000:19: resource 2 [mem 0xe6200000-0xe62fffff 64bit pref] Dec 13 02:34:26.710023 kernel: pci_bus 0000:1a: resource 1 [mem 0xfb700000-0xfb7fffff] Dec 13 02:34:26.710068 kernel: pci_bus 0000:1a: resource 2 [mem 0xe5e00000-0xe5efffff 64bit pref] Dec 13 02:34:26.710116 kernel: pci_bus 0000:1b: resource 0 [io 0x7000-0x7fff] Dec 13 02:34:26.710440 kernel: pci_bus 0000:1b: resource 1 [mem 0xfd200000-0xfd2fffff] Dec 13 02:34:26.710486 kernel: pci_bus 0000:1b: resource 2 [mem 0xe7900000-0xe79fffff 64bit pref] Dec 13 02:34:26.710535 kernel: pci_bus 0000:1c: resource 0 [io 0xb000-0xbfff] Dec 13 02:34:26.710848 kernel: pci_bus 0000:1c: resource 1 [mem 0xfce00000-0xfcefffff] Dec 13 02:34:26.710897 kernel: pci_bus 0000:1c: resource 2 [mem 0xe7500000-0xe75fffff 64bit pref] Dec 13 02:34:26.710982 kernel: pci_bus 0000:1d: resource 1 [mem 0xfca00000-0xfcafffff] Dec 13 02:34:26.711030 kernel: pci_bus 0000:1d: resource 2 [mem 0xe7100000-0xe71fffff 64bit pref] Dec 13 02:34:26.711083 kernel: pci_bus 0000:1e: resource 1 [mem 0xfc600000-0xfc6fffff] Dec 13 02:34:26.711127 kernel: pci_bus 0000:1e: resource 2 [mem 0xe6d00000-0xe6dfffff 64bit pref] Dec 13 02:34:26.711173 kernel: pci_bus 0000:1f: resource 1 [mem 0xfc200000-0xfc2fffff] Dec 13 02:34:26.711217 kernel: pci_bus 0000:1f: resource 2 [mem 0xe6900000-0xe69fffff 64bit pref] Dec 13 02:34:26.711264 kernel: pci_bus 0000:20: resource 1 [mem 0xfbe00000-0xfbefffff] Dec 13 02:34:26.711308 kernel: pci_bus 0000:20: resource 2 [mem 0xe6500000-0xe65fffff 64bit pref] Dec 13 02:34:26.711356 kernel: pci_bus 0000:21: resource 1 [mem 0xfba00000-0xfbafffff] Dec 13 02:34:26.711399 kernel: pci_bus 0000:21: resource 2 [mem 0xe6100000-0xe61fffff 64bit pref] Dec 13 02:34:26.711445 kernel: pci_bus 0000:22: resource 1 [mem 0xfb600000-0xfb6fffff] Dec 13 02:34:26.711491 kernel: pci_bus 0000:22: resource 2 [mem 0xe5d00000-0xe5dfffff 64bit pref] Dec 13 02:34:26.711545 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 13 02:34:26.711554 kernel: PCI: CLS 32 bytes, default 64 Dec 13 02:34:26.711561 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 02:34:26.711569 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Dec 13 02:34:26.711575 kernel: clocksource: Switched to clocksource tsc Dec 13 02:34:26.711581 kernel: Initialise system trusted keyrings Dec 13 02:34:26.711588 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Dec 13 02:34:26.711802 kernel: Key type asymmetric registered Dec 13 02:34:26.711813 kernel: Asymmetric key parser 'x509' registered Dec 13 02:34:26.711819 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 02:34:26.711825 kernel: io scheduler mq-deadline registered Dec 13 02:34:26.711831 kernel: io scheduler kyber registered Dec 13 02:34:26.711839 kernel: io scheduler bfq registered Dec 13 02:34:26.711899 kernel: pcieport 0000:00:15.0: PME: Signaling with IRQ 24 Dec 13 02:34:26.711964 kernel: pcieport 0000:00:15.0: pciehp: Slot #160 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:34:26.712022 kernel: pcieport 0000:00:15.1: PME: Signaling with IRQ 25 Dec 13 02:34:26.712071 kernel: pcieport 0000:00:15.1: pciehp: Slot #161 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:34:26.712120 kernel: pcieport 0000:00:15.2: PME: Signaling with IRQ 26 Dec 13 02:34:26.712168 kernel: pcieport 0000:00:15.2: pciehp: Slot #162 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:34:26.712217 kernel: pcieport 0000:00:15.3: PME: Signaling with IRQ 27 Dec 13 02:34:26.712267 kernel: pcieport 0000:00:15.3: pciehp: Slot #163 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:34:26.712316 kernel: pcieport 0000:00:15.4: PME: Signaling with IRQ 28 Dec 13 02:34:26.712364 kernel: pcieport 0000:00:15.4: pciehp: Slot #164 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:34:26.712413 kernel: pcieport 0000:00:15.5: PME: Signaling with IRQ 29 Dec 13 02:34:26.712461 kernel: pcieport 0000:00:15.5: pciehp: Slot #165 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:34:26.712511 kernel: pcieport 0000:00:15.6: PME: Signaling with IRQ 30 Dec 13 02:34:26.712559 kernel: pcieport 0000:00:15.6: pciehp: Slot #166 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:34:26.712607 kernel: pcieport 0000:00:15.7: PME: Signaling with IRQ 31 Dec 13 02:34:26.712675 kernel: pcieport 0000:00:15.7: pciehp: Slot #167 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:34:26.712727 kernel: pcieport 0000:00:16.0: PME: Signaling with IRQ 32 Dec 13 02:34:26.712775 kernel: pcieport 0000:00:16.0: pciehp: Slot #192 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:34:26.712828 kernel: pcieport 0000:00:16.1: PME: Signaling with IRQ 33 Dec 13 02:34:26.712876 kernel: pcieport 0000:00:16.1: pciehp: Slot #193 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:34:26.712924 kernel: pcieport 0000:00:16.2: PME: Signaling with IRQ 34 Dec 13 02:34:26.712982 kernel: pcieport 0000:00:16.2: pciehp: Slot #194 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:34:26.713029 kernel: pcieport 0000:00:16.3: PME: Signaling with IRQ 35 Dec 13 02:34:26.713076 kernel: pcieport 0000:00:16.3: pciehp: Slot #195 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:34:26.713126 kernel: pcieport 0000:00:16.4: PME: Signaling with IRQ 36 Dec 13 02:34:26.713173 kernel: pcieport 0000:00:16.4: pciehp: Slot #196 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:34:26.713222 kernel: pcieport 0000:00:16.5: PME: Signaling with IRQ 37 Dec 13 02:34:26.713281 kernel: pcieport 0000:00:16.5: pciehp: Slot #197 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:34:26.713330 kernel: pcieport 0000:00:16.6: PME: Signaling with IRQ 38 Dec 13 02:34:26.713376 kernel: pcieport 0000:00:16.6: pciehp: Slot #198 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:34:26.713427 kernel: pcieport 0000:00:16.7: PME: Signaling with IRQ 39 Dec 13 02:34:26.713473 kernel: pcieport 0000:00:16.7: pciehp: Slot #199 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:34:26.713520 kernel: pcieport 0000:00:17.0: PME: Signaling with IRQ 40 Dec 13 02:34:26.713567 kernel: pcieport 0000:00:17.0: pciehp: Slot #224 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:34:26.713614 kernel: pcieport 0000:00:17.1: PME: Signaling with IRQ 41 Dec 13 02:34:26.713661 kernel: pcieport 0000:00:17.1: pciehp: Slot #225 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:34:26.713710 kernel: pcieport 0000:00:17.2: PME: Signaling with IRQ 42 Dec 13 02:34:26.713780 kernel: pcieport 0000:00:17.2: pciehp: Slot #226 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:34:26.713829 kernel: pcieport 0000:00:17.3: PME: Signaling with IRQ 43 Dec 13 02:34:26.713877 kernel: pcieport 0000:00:17.3: pciehp: Slot #227 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:34:26.714200 kernel: pcieport 0000:00:17.4: PME: Signaling with IRQ 44 Dec 13 02:34:26.714266 kernel: pcieport 0000:00:17.4: pciehp: Slot #228 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:34:26.714321 kernel: pcieport 0000:00:17.5: PME: Signaling with IRQ 45 Dec 13 02:34:26.714370 kernel: pcieport 0000:00:17.5: pciehp: Slot #229 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:34:26.714439 kernel: pcieport 0000:00:17.6: PME: Signaling with IRQ 46 Dec 13 02:34:26.714715 kernel: pcieport 0000:00:17.6: pciehp: Slot #230 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:34:26.714770 kernel: pcieport 0000:00:17.7: PME: Signaling with IRQ 47 Dec 13 02:34:26.715044 kernel: pcieport 0000:00:17.7: pciehp: Slot #231 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:34:26.715099 kernel: pcieport 0000:00:18.0: PME: Signaling with IRQ 48 Dec 13 02:34:26.715148 kernel: pcieport 0000:00:18.0: pciehp: Slot #256 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:34:26.715491 kernel: pcieport 0000:00:18.1: PME: Signaling with IRQ 49 Dec 13 02:34:26.715543 kernel: pcieport 0000:00:18.1: pciehp: Slot #257 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:34:26.715593 kernel: pcieport 0000:00:18.2: PME: Signaling with IRQ 50 Dec 13 02:34:26.715753 kernel: pcieport 0000:00:18.2: pciehp: Slot #258 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:34:26.715817 kernel: pcieport 0000:00:18.3: PME: Signaling with IRQ 51 Dec 13 02:34:26.715868 kernel: pcieport 0000:00:18.3: pciehp: Slot #259 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:34:26.716233 kernel: pcieport 0000:00:18.4: PME: Signaling with IRQ 52 Dec 13 02:34:26.716287 kernel: pcieport 0000:00:18.4: pciehp: Slot #260 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:34:26.716339 kernel: pcieport 0000:00:18.5: PME: Signaling with IRQ 53 Dec 13 02:34:26.716523 kernel: pcieport 0000:00:18.5: pciehp: Slot #261 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:34:26.716782 kernel: pcieport 0000:00:18.6: PME: Signaling with IRQ 54 Dec 13 02:34:26.716856 kernel: pcieport 0000:00:18.6: pciehp: Slot #262 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:34:26.716908 kernel: pcieport 0000:00:18.7: PME: Signaling with IRQ 55 Dec 13 02:34:26.717253 kernel: pcieport 0000:00:18.7: pciehp: Slot #263 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 02:34:26.717265 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 02:34:26.717272 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 02:34:26.717278 kernel: 00:05: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 02:34:26.717285 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBC,PNP0f13:MOUS] at 0x60,0x64 irq 1,12 Dec 13 02:34:26.717291 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 02:34:26.717297 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 02:34:26.717348 kernel: rtc_cmos 00:01: registered as rtc0 Dec 13 02:34:26.717394 kernel: rtc_cmos 00:01: setting system clock to 2024-12-13T02:34:26 UTC (1734057266) Dec 13 02:34:26.717551 kernel: rtc_cmos 00:01: alarms up to one month, y3k, 114 bytes nvram Dec 13 02:34:26.717561 kernel: fail to initialize ptp_kvm Dec 13 02:34:26.717568 kernel: intel_pstate: CPU model not supported Dec 13 02:34:26.717574 kernel: NET: Registered PF_INET6 protocol family Dec 13 02:34:26.717580 kernel: Segment Routing with IPv6 Dec 13 02:34:26.717587 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 02:34:26.717593 kernel: NET: Registered PF_PACKET protocol family Dec 13 02:34:26.717599 kernel: Key type dns_resolver registered Dec 13 02:34:26.717606 kernel: IPI shorthand broadcast: enabled Dec 13 02:34:26.717614 kernel: sched_clock: Marking stable (843299901, 220607472)->(1132722256, -68814883) Dec 13 02:34:26.717620 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 02:34:26.717626 kernel: registered taskstats version 1 Dec 13 02:34:26.717632 kernel: Loading compiled-in X.509 certificates Dec 13 02:34:26.717915 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: d9defb0205602bee9bb670636cbe5c74194fdb5e' Dec 13 02:34:26.717923 kernel: Key type .fscrypt registered Dec 13 02:34:26.717938 kernel: Key type fscrypt-provisioning registered Dec 13 02:34:26.717944 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 02:34:26.717952 kernel: ima: Allocated hash algorithm: sha1 Dec 13 02:34:26.717958 kernel: ima: No architecture policies found Dec 13 02:34:26.717965 kernel: clk: Disabling unused clocks Dec 13 02:34:26.717971 kernel: Freeing unused kernel image (initmem) memory: 47476K Dec 13 02:34:26.717977 kernel: Write protecting the kernel read-only data: 28672k Dec 13 02:34:26.717984 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 02:34:26.717990 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 02:34:26.717996 kernel: Run /init as init process Dec 13 02:34:26.718002 kernel: with arguments: Dec 13 02:34:26.718010 kernel: /init Dec 13 02:34:26.718016 kernel: with environment: Dec 13 02:34:26.718022 kernel: HOME=/ Dec 13 02:34:26.718028 kernel: TERM=linux Dec 13 02:34:26.718034 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 02:34:26.718042 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 02:34:26.718050 systemd[1]: Detected virtualization vmware. Dec 13 02:34:26.718057 systemd[1]: Detected architecture x86-64. Dec 13 02:34:26.718065 systemd[1]: Running in initrd. Dec 13 02:34:26.718071 systemd[1]: No hostname configured, using default hostname. Dec 13 02:34:26.718077 systemd[1]: Hostname set to . Dec 13 02:34:26.718084 systemd[1]: Initializing machine ID from random generator. Dec 13 02:34:26.718090 systemd[1]: Queued start job for default target initrd.target. Dec 13 02:34:26.718096 systemd[1]: Started systemd-ask-password-console.path. Dec 13 02:34:26.718103 systemd[1]: Reached target cryptsetup.target. Dec 13 02:34:26.718110 systemd[1]: Reached target paths.target. Dec 13 02:34:26.718116 systemd[1]: Reached target slices.target. Dec 13 02:34:26.718123 systemd[1]: Reached target swap.target. Dec 13 02:34:26.718263 systemd[1]: Reached target timers.target. Dec 13 02:34:26.718274 systemd[1]: Listening on iscsid.socket. Dec 13 02:34:26.718282 systemd[1]: Listening on iscsiuio.socket. Dec 13 02:34:26.718288 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 02:34:26.718295 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 02:34:26.718301 systemd[1]: Listening on systemd-journald.socket. Dec 13 02:34:26.718309 systemd[1]: Listening on systemd-networkd.socket. Dec 13 02:34:26.718515 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 02:34:26.718523 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 02:34:26.718529 systemd[1]: Reached target sockets.target. Dec 13 02:34:26.718538 systemd[1]: Starting kmod-static-nodes.service... Dec 13 02:34:26.718544 systemd[1]: Finished network-cleanup.service. Dec 13 02:34:26.718551 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 02:34:26.718558 systemd[1]: Starting systemd-journald.service... Dec 13 02:34:26.718564 systemd[1]: Starting systemd-modules-load.service... Dec 13 02:34:26.718571 systemd[1]: Starting systemd-resolved.service... Dec 13 02:34:26.718578 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 02:34:26.718585 systemd[1]: Finished kmod-static-nodes.service. Dec 13 02:34:26.718591 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 02:34:26.718598 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 02:34:26.718604 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 02:34:26.718611 kernel: audit: type=1130 audit(1734057266.657:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:26.718617 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 02:34:26.718624 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 02:34:26.718632 kernel: audit: type=1130 audit(1734057266.661:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:26.718639 systemd[1]: Started systemd-resolved.service. Dec 13 02:34:26.718919 systemd[1]: Reached target nss-lookup.target. Dec 13 02:34:26.718961 kernel: audit: type=1130 audit(1734057266.669:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:26.718968 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 02:34:26.718975 systemd[1]: Starting dracut-cmdline.service... Dec 13 02:34:26.718984 kernel: audit: type=1130 audit(1734057266.679:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:26.718990 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 02:34:26.718997 kernel: Bridge firewalling registered Dec 13 02:34:26.719007 systemd-journald[216]: Journal started Dec 13 02:34:26.719042 systemd-journald[216]: Runtime Journal (/run/log/journal/91ffe5437d244db7a84b99059c176c72) is 4.8M, max 38.8M, 34.0M free. Dec 13 02:34:26.722427 systemd[1]: Started systemd-journald.service. Dec 13 02:34:26.722449 kernel: audit: type=1130 audit(1734057266.718:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:26.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:26.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:26.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:26.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:26.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:26.656994 systemd-modules-load[217]: Inserted module 'overlay' Dec 13 02:34:26.666822 systemd-resolved[218]: Positive Trust Anchors: Dec 13 02:34:26.666827 systemd-resolved[218]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 02:34:26.666847 systemd-resolved[218]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 02:34:26.669120 systemd-resolved[218]: Defaulting to hostname 'linux'. Dec 13 02:34:26.708178 systemd-modules-load[217]: Inserted module 'br_netfilter' Dec 13 02:34:26.725632 dracut-cmdline[232]: dracut-dracut-053 Dec 13 02:34:26.725632 dracut-cmdline[232]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Dec 13 02:34:26.725632 dracut-cmdline[232]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:34:26.726567 kernel: SCSI subsystem initialized Dec 13 02:34:26.735076 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 02:34:26.735113 kernel: device-mapper: uevent: version 1.0.3 Dec 13 02:34:26.736157 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 02:34:26.741343 systemd-modules-load[217]: Inserted module 'dm_multipath' Dec 13 02:34:26.745651 kernel: Loading iSCSI transport class v2.0-870. Dec 13 02:34:26.745678 kernel: audit: type=1130 audit(1734057266.740:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:26.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:26.741968 systemd[1]: Finished systemd-modules-load.service. Dec 13 02:34:26.742498 systemd[1]: Starting systemd-sysctl.service... Dec 13 02:34:26.750705 systemd[1]: Finished systemd-sysctl.service. Dec 13 02:34:26.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:26.753964 kernel: audit: type=1130 audit(1734057266.748:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:26.753988 kernel: iscsi: registered transport (tcp) Dec 13 02:34:26.769971 kernel: iscsi: registered transport (qla4xxx) Dec 13 02:34:26.770000 kernel: QLogic iSCSI HBA Driver Dec 13 02:34:26.786238 systemd[1]: Finished dracut-cmdline.service. Dec 13 02:34:26.786870 systemd[1]: Starting dracut-pre-udev.service... Dec 13 02:34:26.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:26.789937 kernel: audit: type=1130 audit(1734057266.784:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:26.824948 kernel: raid6: avx2x4 gen() 47233 MB/s Dec 13 02:34:26.840940 kernel: raid6: avx2x4 xor() 21126 MB/s Dec 13 02:34:26.857950 kernel: raid6: avx2x2 gen() 50909 MB/s Dec 13 02:34:26.874942 kernel: raid6: avx2x2 xor() 31706 MB/s Dec 13 02:34:26.891945 kernel: raid6: avx2x1 gen() 44771 MB/s Dec 13 02:34:26.908944 kernel: raid6: avx2x1 xor() 27654 MB/s Dec 13 02:34:26.925944 kernel: raid6: sse2x4 gen() 21161 MB/s Dec 13 02:34:26.942948 kernel: raid6: sse2x4 xor() 11621 MB/s Dec 13 02:34:26.959944 kernel: raid6: sse2x2 gen() 21206 MB/s Dec 13 02:34:26.976941 kernel: raid6: sse2x2 xor() 13200 MB/s Dec 13 02:34:26.993947 kernel: raid6: sse2x1 gen() 18108 MB/s Dec 13 02:34:27.011131 kernel: raid6: sse2x1 xor() 8863 MB/s Dec 13 02:34:27.011166 kernel: raid6: using algorithm avx2x2 gen() 50909 MB/s Dec 13 02:34:27.011174 kernel: raid6: .... xor() 31706 MB/s, rmw enabled Dec 13 02:34:27.012302 kernel: raid6: using avx2x2 recovery algorithm Dec 13 02:34:27.020941 kernel: xor: automatically using best checksumming function avx Dec 13 02:34:27.081053 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 02:34:27.085409 systemd[1]: Finished dracut-pre-udev.service. Dec 13 02:34:27.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:27.086034 systemd[1]: Starting systemd-udevd.service... Dec 13 02:34:27.083000 audit: BPF prog-id=7 op=LOAD Dec 13 02:34:27.083000 audit: BPF prog-id=8 op=LOAD Dec 13 02:34:27.092941 kernel: audit: type=1130 audit(1734057267.083:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:27.096444 systemd-udevd[415]: Using default interface naming scheme 'v252'. Dec 13 02:34:27.099192 systemd[1]: Started systemd-udevd.service. Dec 13 02:34:27.099719 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 02:34:27.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:27.107290 dracut-pre-trigger[420]: rd.md=0: removing MD RAID activation Dec 13 02:34:27.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:27.123541 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 02:34:27.124067 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 02:34:27.186947 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 02:34:27.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:27.236277 kernel: VMware PVSCSI driver - version 1.0.7.0-k Dec 13 02:34:27.236335 kernel: vmw_pvscsi: using 64bit dma Dec 13 02:34:27.238937 kernel: vmw_pvscsi: max_id: 16 Dec 13 02:34:27.238955 kernel: vmw_pvscsi: setting ring_pages to 8 Dec 13 02:34:27.254444 kernel: vmw_pvscsi: enabling reqCallThreshold Dec 13 02:34:27.254475 kernel: vmw_pvscsi: driver-based request coalescing enabled Dec 13 02:34:27.254483 kernel: vmw_pvscsi: using MSI-X Dec 13 02:34:27.254490 kernel: scsi host0: VMware PVSCSI storage adapter rev 2, req/cmp/msg rings: 8/8/1 pages, cmd_per_lun=254 Dec 13 02:34:27.254573 kernel: vmw_pvscsi 0000:03:00.0: VMware PVSCSI rev 2 host #0 Dec 13 02:34:27.255779 kernel: scsi 0:0:0:0: Direct-Access VMware Virtual disk 2.0 PQ: 0 ANSI: 6 Dec 13 02:34:27.264936 kernel: VMware vmxnet3 virtual NIC driver - version 1.6.0.0-k-NAPI Dec 13 02:34:27.264961 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 02:34:27.278000 kernel: vmxnet3 0000:0b:00.0: # of Tx queues : 2, # of Rx queues : 2 Dec 13 02:34:27.283817 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 02:34:27.283832 kernel: AES CTR mode by8 optimization enabled Dec 13 02:34:27.283840 kernel: vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps Dec 13 02:34:27.284970 kernel: sd 0:0:0:0: [sda] 17805312 512-byte logical blocks: (9.12 GB/8.49 GiB) Dec 13 02:34:27.345012 kernel: sd 0:0:0:0: [sda] Write Protect is off Dec 13 02:34:27.345093 kernel: sd 0:0:0:0: [sda] Mode Sense: 31 00 00 00 Dec 13 02:34:27.345154 kernel: sd 0:0:0:0: [sda] Cache data unavailable Dec 13 02:34:27.345212 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through Dec 13 02:34:27.345269 kernel: libata version 3.00 loaded. Dec 13 02:34:27.345277 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:34:27.345285 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Dec 13 02:34:27.348951 kernel: vmxnet3 0000:0b:00.0 ens192: renamed from eth0 Dec 13 02:34:27.350188 kernel: ata_piix 0000:00:07.1: version 2.13 Dec 13 02:34:27.357905 kernel: scsi host1: ata_piix Dec 13 02:34:27.358016 kernel: scsi host2: ata_piix Dec 13 02:34:27.358086 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0x1060 irq 14 Dec 13 02:34:27.358096 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0x1068 irq 15 Dec 13 02:34:27.382940 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (464) Dec 13 02:34:27.386793 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 02:34:27.390018 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 02:34:27.392591 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 02:34:27.396693 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 02:34:27.396837 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 02:34:27.397664 systemd[1]: Starting disk-uuid.service... Dec 13 02:34:27.421940 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:34:27.426940 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:34:27.520979 kernel: ata2.00: ATAPI: VMware Virtual IDE CDROM Drive, 00000001, max UDMA/33 Dec 13 02:34:27.525978 kernel: scsi 2:0:0:0: CD-ROM NECVMWar VMware IDE CDR10 1.00 PQ: 0 ANSI: 5 Dec 13 02:34:27.550972 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 1x/1x writer dvd-ram cd/rw xa/form2 cdda tray Dec 13 02:34:27.569024 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 02:34:27.569041 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Dec 13 02:34:28.430219 disk-uuid[547]: The operation has completed successfully. Dec 13 02:34:28.430939 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 02:34:28.473191 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 02:34:28.473242 systemd[1]: Finished disk-uuid.service. Dec 13 02:34:28.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:28.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:28.473814 systemd[1]: Starting verity-setup.service... Dec 13 02:34:28.498941 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 02:34:29.019197 systemd[1]: Found device dev-mapper-usr.device. Dec 13 02:34:29.019891 systemd[1]: Mounting sysusr-usr.mount... Dec 13 02:34:29.020968 systemd[1]: Finished verity-setup.service. Dec 13 02:34:29.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:29.434946 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 02:34:29.435122 systemd[1]: Mounted sysusr-usr.mount. Dec 13 02:34:29.435719 systemd[1]: Starting afterburn-network-kargs.service... Dec 13 02:34:29.436190 systemd[1]: Starting ignition-setup.service... Dec 13 02:34:29.534114 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:34:29.534148 kernel: BTRFS info (device sda6): using free space tree Dec 13 02:34:29.534157 kernel: BTRFS info (device sda6): has skinny extents Dec 13 02:34:29.578946 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 02:34:29.585576 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 02:34:29.593208 systemd[1]: Finished ignition-setup.service. Dec 13 02:34:29.593797 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 02:34:29.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:29.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:29.645892 systemd[1]: Finished afterburn-network-kargs.service. Dec 13 02:34:29.646532 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 02:34:29.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:29.696000 audit: BPF prog-id=9 op=LOAD Dec 13 02:34:29.697755 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 02:34:29.698644 systemd[1]: Starting systemd-networkd.service... Dec 13 02:34:29.713079 systemd-networkd[733]: lo: Link UP Dec 13 02:34:29.713085 systemd-networkd[733]: lo: Gained carrier Dec 13 02:34:29.713363 systemd-networkd[733]: Enumeration completed Dec 13 02:34:29.718199 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Dec 13 02:34:29.718339 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Dec 13 02:34:29.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:29.713568 systemd-networkd[733]: ens192: Configuring with /etc/systemd/network/10-dracut-cmdline-99.network. Dec 13 02:34:29.713678 systemd[1]: Started systemd-networkd.service. Dec 13 02:34:29.713826 systemd[1]: Reached target network.target. Dec 13 02:34:29.714354 systemd[1]: Starting iscsiuio.service... Dec 13 02:34:29.717117 systemd-networkd[733]: ens192: Link UP Dec 13 02:34:29.717119 systemd-networkd[733]: ens192: Gained carrier Dec 13 02:34:29.718548 systemd[1]: Started iscsiuio.service. Dec 13 02:34:29.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:29.719168 systemd[1]: Starting iscsid.service... Dec 13 02:34:29.721923 iscsid[738]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 02:34:29.721923 iscsid[738]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 02:34:29.721923 iscsid[738]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 02:34:29.721923 iscsid[738]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 02:34:29.721923 iscsid[738]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 02:34:29.721923 iscsid[738]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 02:34:29.723178 systemd[1]: Started iscsid.service. Dec 13 02:34:29.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:29.723901 systemd[1]: Starting dracut-initqueue.service... Dec 13 02:34:29.732015 systemd[1]: Finished dracut-initqueue.service. Dec 13 02:34:29.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:29.732316 systemd[1]: Reached target remote-fs-pre.target. Dec 13 02:34:29.732556 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 02:34:29.732771 systemd[1]: Reached target remote-fs.target. Dec 13 02:34:29.733415 systemd[1]: Starting dracut-pre-mount.service... Dec 13 02:34:29.739448 systemd[1]: Finished dracut-pre-mount.service. Dec 13 02:34:29.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:29.772601 ignition[604]: Ignition 2.14.0 Dec 13 02:34:29.772611 ignition[604]: Stage: fetch-offline Dec 13 02:34:29.772642 ignition[604]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:34:29.772660 ignition[604]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 02:34:29.781515 ignition[604]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 02:34:29.781585 ignition[604]: parsed url from cmdline: "" Dec 13 02:34:29.781587 ignition[604]: no config URL provided Dec 13 02:34:29.781590 ignition[604]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 02:34:29.781595 ignition[604]: no config at "/usr/lib/ignition/user.ign" Dec 13 02:34:29.782016 ignition[604]: config successfully fetched Dec 13 02:34:29.782035 ignition[604]: parsing config with SHA512: aa75b69bd0b44603069d92cd5c0cb3dfdba1f7612ac569e22382b1d2fcf777b96785cc0242bc724769cc46397c717ad215553942fbe108658cd9398521d9f496 Dec 13 02:34:29.785835 unknown[604]: fetched base config from "system" Dec 13 02:34:29.786149 ignition[604]: fetch-offline: fetch-offline passed Dec 13 02:34:29.785841 unknown[604]: fetched user config from "vmware" Dec 13 02:34:29.786190 ignition[604]: Ignition finished successfully Dec 13 02:34:29.787228 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 02:34:29.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:29.787535 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 02:34:29.788242 systemd[1]: Starting ignition-kargs.service... Dec 13 02:34:29.794027 ignition[752]: Ignition 2.14.0 Dec 13 02:34:29.794285 ignition[752]: Stage: kargs Dec 13 02:34:29.794471 ignition[752]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:34:29.794635 ignition[752]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 02:34:29.795833 ignition[752]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 02:34:29.798423 ignition[752]: kargs: kargs passed Dec 13 02:34:29.798578 ignition[752]: Ignition finished successfully Dec 13 02:34:29.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:29.799479 systemd[1]: Finished ignition-kargs.service. Dec 13 02:34:29.800163 systemd[1]: Starting ignition-disks.service... Dec 13 02:34:29.804596 ignition[758]: Ignition 2.14.0 Dec 13 02:34:29.804847 ignition[758]: Stage: disks Dec 13 02:34:29.805206 ignition[758]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:34:29.805364 ignition[758]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 02:34:29.806696 ignition[758]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 02:34:29.808327 ignition[758]: disks: disks passed Dec 13 02:34:29.808368 ignition[758]: Ignition finished successfully Dec 13 02:34:29.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:29.809015 systemd[1]: Finished ignition-disks.service. Dec 13 02:34:29.809175 systemd[1]: Reached target initrd-root-device.target. Dec 13 02:34:29.809270 systemd[1]: Reached target local-fs-pre.target. Dec 13 02:34:29.809358 systemd[1]: Reached target local-fs.target. Dec 13 02:34:29.809441 systemd[1]: Reached target sysinit.target. Dec 13 02:34:29.809521 systemd[1]: Reached target basic.target. Dec 13 02:34:29.810120 systemd[1]: Starting systemd-fsck-root.service... Dec 13 02:34:29.821269 systemd-fsck[766]: ROOT: clean, 621/1628000 files, 124058/1617920 blocks Dec 13 02:34:29.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:29.822808 systemd[1]: Finished systemd-fsck-root.service. Dec 13 02:34:29.823416 systemd[1]: Mounting sysroot.mount... Dec 13 02:34:29.829966 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 02:34:29.830377 systemd[1]: Mounted sysroot.mount. Dec 13 02:34:29.830643 systemd[1]: Reached target initrd-root-fs.target. Dec 13 02:34:29.831602 systemd[1]: Mounting sysroot-usr.mount... Dec 13 02:34:29.832121 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 02:34:29.832306 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 02:34:29.832503 systemd[1]: Reached target ignition-diskful.target. Dec 13 02:34:29.833448 systemd[1]: Mounted sysroot-usr.mount. Dec 13 02:34:29.834071 systemd[1]: Starting initrd-setup-root.service... Dec 13 02:34:29.836797 initrd-setup-root[776]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 02:34:29.840264 initrd-setup-root[784]: cut: /sysroot/etc/group: No such file or directory Dec 13 02:34:29.842576 initrd-setup-root[792]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 02:34:29.844861 initrd-setup-root[800]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 02:34:29.874006 systemd[1]: Finished initrd-setup-root.service. Dec 13 02:34:29.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:29.874582 systemd[1]: Starting ignition-mount.service... Dec 13 02:34:29.875039 systemd[1]: Starting sysroot-boot.service... Dec 13 02:34:29.878355 bash[817]: umount: /sysroot/usr/share/oem: not mounted. Dec 13 02:34:29.883868 ignition[818]: INFO : Ignition 2.14.0 Dec 13 02:34:29.883868 ignition[818]: INFO : Stage: mount Dec 13 02:34:29.884194 ignition[818]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:34:29.884194 ignition[818]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 02:34:29.886154 ignition[818]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 02:34:29.892589 ignition[818]: INFO : mount: mount passed Dec 13 02:34:29.892589 ignition[818]: INFO : Ignition finished successfully Dec 13 02:34:29.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:29.893324 systemd[1]: Finished ignition-mount.service. Dec 13 02:34:29.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:29.895273 systemd[1]: Finished sysroot-boot.service. Dec 13 02:34:30.383191 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 02:34:30.389940 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (827) Dec 13 02:34:30.393345 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:34:30.393362 kernel: BTRFS info (device sda6): using free space tree Dec 13 02:34:30.393370 kernel: BTRFS info (device sda6): has skinny extents Dec 13 02:34:30.397941 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 02:34:30.397971 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 02:34:30.398486 systemd[1]: Starting ignition-files.service... Dec 13 02:34:30.407320 ignition[847]: INFO : Ignition 2.14.0 Dec 13 02:34:30.407320 ignition[847]: INFO : Stage: files Dec 13 02:34:30.407653 ignition[847]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:34:30.407653 ignition[847]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 02:34:30.408681 ignition[847]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 02:34:30.410725 ignition[847]: DEBUG : files: compiled without relabeling support, skipping Dec 13 02:34:30.411150 ignition[847]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 02:34:30.411150 ignition[847]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 02:34:30.413823 ignition[847]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 02:34:30.414059 ignition[847]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 02:34:30.414775 unknown[847]: wrote ssh authorized keys file for user: core Dec 13 02:34:30.415133 ignition[847]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 02:34:30.415746 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 02:34:30.415746 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 02:34:30.457339 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 13 02:34:30.525316 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 02:34:30.525607 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 02:34:30.525960 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 02:34:30.526154 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 02:34:30.526412 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 02:34:30.526618 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 02:34:30.526875 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 02:34:30.527083 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 02:34:30.527322 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 02:34:30.527697 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 02:34:30.527936 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 02:34:30.528126 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 02:34:30.528390 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 02:34:30.528791 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Dec 13 02:34:30.529020 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 02:34:30.533891 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2909946250" Dec 13 02:34:30.536989 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (852) Dec 13 02:34:30.537005 ignition[847]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2909946250": device or resource busy Dec 13 02:34:30.537005 ignition[847]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2909946250", trying btrfs: device or resource busy Dec 13 02:34:30.537005 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2909946250" Dec 13 02:34:30.537005 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2909946250" Dec 13 02:34:30.537005 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem2909946250" Dec 13 02:34:30.537005 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem2909946250" Dec 13 02:34:30.537005 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Dec 13 02:34:30.537005 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 02:34:30.537005 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 Dec 13 02:34:30.538285 systemd[1]: mnt-oem2909946250.mount: Deactivated successfully. Dec 13 02:34:30.909140 systemd-networkd[733]: ens192: Gained IPv6LL Dec 13 02:34:31.026816 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Dec 13 02:34:31.224603 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 02:34:31.224864 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/network/00-vmware.network" Dec 13 02:34:31.225044 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/network/00-vmware.network" Dec 13 02:34:31.225044 ignition[847]: INFO : files: op(10): [started] processing unit "vmtoolsd.service" Dec 13 02:34:31.225044 ignition[847]: INFO : files: op(10): [finished] processing unit "vmtoolsd.service" Dec 13 02:34:31.225044 ignition[847]: INFO : files: op(11): [started] processing unit "prepare-helm.service" Dec 13 02:34:31.225044 ignition[847]: INFO : files: op(11): op(12): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 02:34:31.225044 ignition[847]: INFO : files: op(11): op(12): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 02:34:31.225044 ignition[847]: INFO : files: op(11): [finished] processing unit "prepare-helm.service" Dec 13 02:34:31.225044 ignition[847]: INFO : files: op(13): [started] processing unit "coreos-metadata.service" Dec 13 02:34:31.225044 ignition[847]: INFO : files: op(13): op(14): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 02:34:31.225044 ignition[847]: INFO : files: op(13): op(14): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 02:34:31.225044 ignition[847]: INFO : files: op(13): [finished] processing unit "coreos-metadata.service" Dec 13 02:34:31.225044 ignition[847]: INFO : files: op(15): [started] setting preset to enabled for "prepare-helm.service" Dec 13 02:34:31.226778 ignition[847]: INFO : files: op(15): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 02:34:31.226778 ignition[847]: INFO : files: op(16): [started] setting preset to disabled for "coreos-metadata.service" Dec 13 02:34:31.226778 ignition[847]: INFO : files: op(16): op(17): [started] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 02:34:31.269648 ignition[847]: INFO : files: op(16): op(17): [finished] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 02:34:31.269849 ignition[847]: INFO : files: op(16): [finished] setting preset to disabled for "coreos-metadata.service" Dec 13 02:34:31.269849 ignition[847]: INFO : files: op(18): [started] setting preset to enabled for "vmtoolsd.service" Dec 13 02:34:31.269849 ignition[847]: INFO : files: op(18): [finished] setting preset to enabled for "vmtoolsd.service" Dec 13 02:34:31.269849 ignition[847]: INFO : files: createResultFile: createFiles: op(19): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 02:34:31.269849 ignition[847]: INFO : files: createResultFile: createFiles: op(19): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 02:34:31.269849 ignition[847]: INFO : files: files passed Dec 13 02:34:31.270673 ignition[847]: INFO : Ignition finished successfully Dec 13 02:34:31.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.271983 systemd[1]: Finished ignition-files.service. Dec 13 02:34:31.276713 kernel: kauditd_printk_skb: 24 callbacks suppressed Dec 13 02:34:31.276728 kernel: audit: type=1130 audit(1734057271.270:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.272531 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 02:34:31.275161 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 02:34:31.275520 systemd[1]: Starting ignition-quench.service... Dec 13 02:34:31.277700 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 02:34:31.285965 kernel: audit: type=1130 audit(1734057271.275:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.285978 kernel: audit: type=1131 audit(1734057271.275:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.285986 kernel: audit: type=1130 audit(1734057271.281:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.286048 initrd-setup-root-after-ignition[873]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 02:34:31.277744 systemd[1]: Finished ignition-quench.service. Dec 13 02:34:31.280779 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 02:34:31.283167 systemd[1]: Reached target ignition-complete.target. Dec 13 02:34:31.286342 systemd[1]: Starting initrd-parse-etc.service... Dec 13 02:34:31.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.294192 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 02:34:31.299254 kernel: audit: type=1130 audit(1734057271.292:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.299267 kernel: audit: type=1131 audit(1734057271.292:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.294237 systemd[1]: Finished initrd-parse-etc.service. Dec 13 02:34:31.294388 systemd[1]: Reached target initrd-fs.target. Dec 13 02:34:31.299156 systemd[1]: Reached target initrd.target. Dec 13 02:34:31.299330 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 02:34:31.299708 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 02:34:31.306221 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 02:34:31.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.306717 systemd[1]: Starting initrd-cleanup.service... Dec 13 02:34:31.309381 kernel: audit: type=1130 audit(1734057271.304:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.313412 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 02:34:31.313458 systemd[1]: Finished initrd-cleanup.service. Dec 13 02:34:31.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.314019 systemd[1]: Stopped target nss-lookup.target. Dec 13 02:34:31.318522 kernel: audit: type=1130 audit(1734057271.311:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.318536 kernel: audit: type=1131 audit(1734057271.311:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.318654 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 02:34:31.318881 systemd[1]: Stopped target timers.target. Dec 13 02:34:31.319141 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 02:34:31.319299 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 02:34:31.317000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.319586 systemd[1]: Stopped target initrd.target. Dec 13 02:34:31.321984 kernel: audit: type=1131 audit(1734057271.317:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.322050 systemd[1]: Stopped target basic.target. Dec 13 02:34:31.322251 systemd[1]: Stopped target ignition-complete.target. Dec 13 02:34:31.322462 systemd[1]: Stopped target ignition-diskful.target. Dec 13 02:34:31.322673 systemd[1]: Stopped target initrd-root-device.target. Dec 13 02:34:31.322883 systemd[1]: Stopped target remote-fs.target. Dec 13 02:34:31.323088 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 02:34:31.323300 systemd[1]: Stopped target sysinit.target. Dec 13 02:34:31.323498 systemd[1]: Stopped target local-fs.target. Dec 13 02:34:31.323694 systemd[1]: Stopped target local-fs-pre.target. Dec 13 02:34:31.323896 systemd[1]: Stopped target swap.target. Dec 13 02:34:31.324100 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 02:34:31.324132 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 02:34:31.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.324333 systemd[1]: Stopped target cryptsetup.target. Dec 13 02:34:31.324467 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 02:34:31.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.324490 systemd[1]: Stopped dracut-initqueue.service. Dec 13 02:34:31.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.324651 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 02:34:31.324672 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 02:34:31.324809 systemd[1]: Stopped target paths.target. Dec 13 02:34:31.324956 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 02:34:31.328961 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 02:34:31.329067 systemd[1]: Stopped target slices.target. Dec 13 02:34:31.329375 systemd[1]: Stopped target sockets.target. Dec 13 02:34:31.329551 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 02:34:31.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.329574 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 02:34:31.329714 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 02:34:31.329734 systemd[1]: Stopped ignition-files.service. Dec 13 02:34:31.330276 systemd[1]: Stopping ignition-mount.service... Dec 13 02:34:31.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.330459 systemd[1]: Stopping iscsid.service... Dec 13 02:34:31.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.335149 iscsid[738]: iscsid shutting down. Dec 13 02:34:31.332446 systemd[1]: Stopping sysroot-boot.service... Dec 13 02:34:31.332626 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 02:34:31.332671 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 02:34:31.332841 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 02:34:31.332862 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 02:34:31.333308 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 02:34:31.333371 systemd[1]: Stopped iscsid.service. Dec 13 02:34:31.333513 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 02:34:31.333530 systemd[1]: Closed iscsid.socket. Dec 13 02:34:31.333644 systemd[1]: Stopping iscsiuio.service... Dec 13 02:34:31.336271 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 02:34:31.337576 systemd[1]: Stopped iscsiuio.service. Dec 13 02:34:31.337844 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 02:34:31.335000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.338465 ignition[886]: INFO : Ignition 2.14.0 Dec 13 02:34:31.338465 ignition[886]: INFO : Stage: umount Dec 13 02:34:31.338465 ignition[886]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 02:34:31.338465 ignition[886]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 02:34:31.337867 systemd[1]: Closed iscsiuio.socket. Dec 13 02:34:31.340375 ignition[886]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 02:34:31.341975 ignition[886]: INFO : umount: umount passed Dec 13 02:34:31.342114 ignition[886]: INFO : Ignition finished successfully Dec 13 02:34:31.343556 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 02:34:31.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.344287 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 02:34:31.344332 systemd[1]: Stopped ignition-mount.service. Dec 13 02:34:31.344487 systemd[1]: Stopped target network.target. Dec 13 02:34:31.344568 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 02:34:31.344591 systemd[1]: Stopped ignition-disks.service. Dec 13 02:34:31.344695 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 02:34:31.344715 systemd[1]: Stopped ignition-kargs.service. Dec 13 02:34:31.344810 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 02:34:31.344830 systemd[1]: Stopped ignition-setup.service. Dec 13 02:34:31.344983 systemd[1]: Stopping systemd-networkd.service... Dec 13 02:34:31.345158 systemd[1]: Stopping systemd-resolved.service... Dec 13 02:34:31.352130 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 02:34:31.350000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.350000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.352382 systemd[1]: Stopped systemd-resolved.service. Dec 13 02:34:31.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.352681 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 02:34:31.352728 systemd[1]: Stopped systemd-networkd.service. Dec 13 02:34:31.352909 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 02:34:31.352959 systemd[1]: Closed systemd-networkd.socket. Dec 13 02:34:31.353432 systemd[1]: Stopping network-cleanup.service... Dec 13 02:34:31.353530 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 02:34:31.353557 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 02:34:31.353691 systemd[1]: afterburn-network-kargs.service: Deactivated successfully. Dec 13 02:34:31.353713 systemd[1]: Stopped afterburn-network-kargs.service. Dec 13 02:34:31.353827 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 02:34:31.353849 systemd[1]: Stopped systemd-sysctl.service. Dec 13 02:34:31.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.354000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.355943 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 02:34:31.355969 systemd[1]: Stopped systemd-modules-load.service. Dec 13 02:34:31.356118 systemd[1]: Stopping systemd-udevd.service... Dec 13 02:34:31.355000 audit: BPF prog-id=6 op=UNLOAD Dec 13 02:34:31.355000 audit: BPF prog-id=9 op=UNLOAD Dec 13 02:34:31.361048 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 02:34:31.361273 systemd[1]: Stopped systemd-udevd.service. Dec 13 02:34:31.361677 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 02:34:31.361701 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 02:34:31.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.362079 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 02:34:31.362098 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 02:34:31.362428 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 02:34:31.362451 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 02:34:31.360000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.362804 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 02:34:31.362825 systemd[1]: Stopped dracut-cmdline.service. Dec 13 02:34:31.361000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.363280 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 02:34:31.363302 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 02:34:31.361000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.364062 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 02:34:31.364319 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 02:34:31.364351 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 02:34:31.362000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.364817 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 02:34:31.364842 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 02:34:31.363000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.365203 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 02:34:31.365224 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 02:34:31.363000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.365796 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 02:34:31.365874 systemd[1]: Stopped network-cleanup.service. Dec 13 02:34:31.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.369564 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 02:34:31.369802 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 02:34:31.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.382243 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 02:34:31.382285 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 02:34:31.440344 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 02:34:31.440417 systemd[1]: Stopped sysroot-boot.service. Dec 13 02:34:31.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.440815 systemd[1]: Reached target initrd-switch-root.target. Dec 13 02:34:31.440964 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 02:34:31.439000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.440996 systemd[1]: Stopped initrd-setup-root.service. Dec 13 02:34:31.441737 systemd[1]: Starting initrd-switch-root.service... Dec 13 02:34:31.450324 systemd[1]: Switching root. Dec 13 02:34:31.469613 systemd-journald[216]: Journal stopped Dec 13 02:34:33.886373 systemd-journald[216]: Received SIGTERM from PID 1 (systemd). Dec 13 02:34:33.886391 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 02:34:33.886399 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 02:34:33.886405 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 02:34:33.886410 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 02:34:33.886416 kernel: SELinux: policy capability open_perms=1 Dec 13 02:34:33.886423 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 02:34:33.886428 kernel: SELinux: policy capability always_check_network=0 Dec 13 02:34:33.886434 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 02:34:33.886439 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 02:34:33.886444 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 02:34:33.886450 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 02:34:33.886457 systemd[1]: Successfully loaded SELinux policy in 38.339ms. Dec 13 02:34:33.886464 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.512ms. Dec 13 02:34:33.886472 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 02:34:33.886479 systemd[1]: Detected virtualization vmware. Dec 13 02:34:33.886486 systemd[1]: Detected architecture x86-64. Dec 13 02:34:33.886492 systemd[1]: Detected first boot. Dec 13 02:34:33.886498 systemd[1]: Initializing machine ID from random generator. Dec 13 02:34:33.886505 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 02:34:33.886511 systemd[1]: Populated /etc with preset unit settings. Dec 13 02:34:33.886518 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:34:33.886524 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:34:33.886532 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:34:33.886539 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 02:34:33.886546 systemd[1]: Stopped initrd-switch-root.service. Dec 13 02:34:33.886552 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 02:34:33.886568 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 02:34:33.886582 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 02:34:33.886589 systemd[1]: Created slice system-getty.slice. Dec 13 02:34:33.886596 systemd[1]: Created slice system-modprobe.slice. Dec 13 02:34:33.886604 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 02:34:33.886611 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 02:34:33.886617 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 02:34:33.886623 systemd[1]: Created slice user.slice. Dec 13 02:34:33.886629 systemd[1]: Started systemd-ask-password-console.path. Dec 13 02:34:33.886636 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 02:34:33.886642 systemd[1]: Set up automount boot.automount. Dec 13 02:34:33.886658 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 02:34:33.886669 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 02:34:33.886676 systemd[1]: Stopped target initrd-fs.target. Dec 13 02:34:33.886684 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 02:34:33.886691 systemd[1]: Reached target integritysetup.target. Dec 13 02:34:33.886698 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 02:34:33.886704 systemd[1]: Reached target remote-fs.target. Dec 13 02:34:33.886711 systemd[1]: Reached target slices.target. Dec 13 02:34:33.886717 systemd[1]: Reached target swap.target. Dec 13 02:34:33.886724 systemd[1]: Reached target torcx.target. Dec 13 02:34:33.886732 systemd[1]: Reached target veritysetup.target. Dec 13 02:34:33.886738 systemd[1]: Listening on systemd-coredump.socket. Dec 13 02:34:33.886750 systemd[1]: Listening on systemd-initctl.socket. Dec 13 02:34:33.886757 systemd[1]: Listening on systemd-networkd.socket. Dec 13 02:34:33.886763 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 02:34:33.886771 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 02:34:33.886778 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 02:34:33.886785 systemd[1]: Mounting dev-hugepages.mount... Dec 13 02:34:33.886792 systemd[1]: Mounting dev-mqueue.mount... Dec 13 02:34:33.886805 systemd[1]: Mounting media.mount... Dec 13 02:34:33.886817 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:34:33.886824 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 02:34:33.886831 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 02:34:33.886839 systemd[1]: Mounting tmp.mount... Dec 13 02:34:33.886846 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 02:34:33.886853 systemd[1]: Starting ignition-delete-config.service... Dec 13 02:34:33.886860 systemd[1]: Starting kmod-static-nodes.service... Dec 13 02:34:33.886867 systemd[1]: Starting modprobe@configfs.service... Dec 13 02:34:33.886874 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:34:33.886880 systemd[1]: Starting modprobe@drm.service... Dec 13 02:34:33.886887 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:34:33.886894 systemd[1]: Starting modprobe@fuse.service... Dec 13 02:34:33.886902 systemd[1]: Starting modprobe@loop.service... Dec 13 02:34:33.886909 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 02:34:33.886916 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 02:34:33.886923 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 02:34:33.886974 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 02:34:33.886982 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 02:34:33.886989 systemd[1]: Stopped systemd-journald.service. Dec 13 02:34:33.886995 systemd[1]: Starting systemd-journald.service... Dec 13 02:34:33.887002 systemd[1]: Starting systemd-modules-load.service... Dec 13 02:34:33.887010 systemd[1]: Starting systemd-network-generator.service... Dec 13 02:34:33.887017 systemd[1]: Starting systemd-remount-fs.service... Dec 13 02:34:33.887024 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 02:34:33.887031 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 02:34:33.887037 systemd[1]: Stopped verity-setup.service. Dec 13 02:34:33.887044 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:34:33.887051 systemd[1]: Mounted dev-hugepages.mount. Dec 13 02:34:33.887057 systemd[1]: Mounted dev-mqueue.mount. Dec 13 02:34:33.887064 systemd[1]: Mounted media.mount. Dec 13 02:34:33.887072 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 02:34:33.887079 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 02:34:33.887086 systemd[1]: Mounted tmp.mount. Dec 13 02:34:33.887092 systemd[1]: Finished kmod-static-nodes.service. Dec 13 02:34:33.887099 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 02:34:33.887106 systemd[1]: Finished modprobe@configfs.service. Dec 13 02:34:33.887112 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:34:33.887119 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:34:33.887130 systemd-journald[999]: Journal started Dec 13 02:34:33.887158 systemd-journald[999]: Runtime Journal (/run/log/journal/b7c6dc45b1474b8d93163ba0b34f0cbd) is 4.8M, max 38.8M, 34.0M free. Dec 13 02:34:31.635000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 02:34:31.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 02:34:31.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 02:34:31.682000 audit: BPF prog-id=10 op=LOAD Dec 13 02:34:31.682000 audit: BPF prog-id=10 op=UNLOAD Dec 13 02:34:31.682000 audit: BPF prog-id=11 op=LOAD Dec 13 02:34:31.682000 audit: BPF prog-id=11 op=UNLOAD Dec 13 02:34:31.777000 audit[920]: AVC avc: denied { associate } for pid=920 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 02:34:31.777000 audit[920]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=903 pid=920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:34:31.777000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 02:34:31.779000 audit[920]: AVC avc: denied { associate } for pid=920 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 02:34:31.779000 audit[920]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=903 pid=920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:34:31.779000 audit: CWD cwd="/" Dec 13 02:34:33.889125 systemd[1]: Started systemd-journald.service. Dec 13 02:34:31.779000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:31.779000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:31.779000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 02:34:33.781000 audit: BPF prog-id=12 op=LOAD Dec 13 02:34:33.781000 audit: BPF prog-id=3 op=UNLOAD Dec 13 02:34:33.781000 audit: BPF prog-id=13 op=LOAD Dec 13 02:34:33.781000 audit: BPF prog-id=14 op=LOAD Dec 13 02:34:33.781000 audit: BPF prog-id=4 op=UNLOAD Dec 13 02:34:33.781000 audit: BPF prog-id=5 op=UNLOAD Dec 13 02:34:33.782000 audit: BPF prog-id=15 op=LOAD Dec 13 02:34:33.782000 audit: BPF prog-id=12 op=UNLOAD Dec 13 02:34:33.782000 audit: BPF prog-id=16 op=LOAD Dec 13 02:34:33.782000 audit: BPF prog-id=17 op=LOAD Dec 13 02:34:33.782000 audit: BPF prog-id=13 op=UNLOAD Dec 13 02:34:33.782000 audit: BPF prog-id=14 op=UNLOAD Dec 13 02:34:33.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:33.784000 audit: BPF prog-id=15 op=UNLOAD Dec 13 02:34:33.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:33.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:33.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:33.844000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:33.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:33.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:33.845000 audit: BPF prog-id=18 op=LOAD Dec 13 02:34:33.845000 audit: BPF prog-id=19 op=LOAD Dec 13 02:34:33.845000 audit: BPF prog-id=20 op=LOAD Dec 13 02:34:33.845000 audit: BPF prog-id=16 op=UNLOAD Dec 13 02:34:33.845000 audit: BPF prog-id=17 op=UNLOAD Dec 13 02:34:33.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:33.872000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 02:34:33.872000 audit[999]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffe7fd26550 a2=4000 a3=7ffe7fd265ec items=0 ppid=1 pid=999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:34:33.872000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 02:34:33.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:33.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:33.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:33.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:33.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:33.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:33.781706 systemd[1]: Queued start job for default target multi-user.target. Dec 13 02:34:31.776475 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T02:34:31Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:34:33.784762 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 02:34:33.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:33.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.777058 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T02:34:31Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 02:34:33.889075 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 02:34:31.777071 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T02:34:31Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 02:34:33.890120 systemd[1]: Finished modprobe@drm.service. Dec 13 02:34:31.777092 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T02:34:31Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 02:34:33.890363 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:34:31.777099 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T02:34:31Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 02:34:33.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:33.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:33.890442 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:34:31.777118 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T02:34:31Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 02:34:31.777125 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T02:34:31Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 02:34:31.777251 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T02:34:31Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 02:34:33.890715 systemd[1]: Finished systemd-modules-load.service. Dec 13 02:34:33.890777 jq[986]: true Dec 13 02:34:33.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.777274 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T02:34:31Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 02:34:31.777282 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T02:34:31Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 02:34:33.890990 systemd[1]: Finished systemd-network-generator.service. Dec 13 02:34:33.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.778363 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T02:34:31Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 02:34:31.778385 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T02:34:31Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 02:34:31.778396 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T02:34:31Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 02:34:33.891235 systemd[1]: Finished systemd-remount-fs.service. Dec 13 02:34:31.778404 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T02:34:31Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 02:34:33.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:31.778413 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T02:34:31Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 02:34:31.778420 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T02:34:31Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 02:34:33.233618 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T02:34:33Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:34:33.233773 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T02:34:33Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:34:33.233844 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T02:34:33Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:34:33.233966 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T02:34:33Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:34:33.892147 jq[1008]: true Dec 13 02:34:33.234000 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T02:34:33Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 02:34:33.234043 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T02:34:33Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 02:34:33.892338 systemd[1]: Reached target network-pre.target. Dec 13 02:34:33.894090 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 02:34:33.894196 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 02:34:33.914602 kernel: fuse: init (API version 7.34) Dec 13 02:34:33.903551 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 02:34:33.904343 systemd[1]: Starting systemd-journal-flush.service... Dec 13 02:34:33.904469 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:34:33.905170 systemd[1]: Starting systemd-random-seed.service... Dec 13 02:34:33.906030 systemd[1]: Starting systemd-sysctl.service... Dec 13 02:34:33.918517 systemd-journald[999]: Time spent on flushing to /var/log/journal/b7c6dc45b1474b8d93163ba0b34f0cbd is 26.086ms for 2001 entries. Dec 13 02:34:33.918517 systemd-journald[999]: System Journal (/var/log/journal/b7c6dc45b1474b8d93163ba0b34f0cbd) is 8.0M, max 584.8M, 576.8M free. Dec 13 02:34:33.974952 systemd-journald[999]: Received client request to flush runtime journal. Dec 13 02:34:33.975000 kernel: loop: module loaded Dec 13 02:34:33.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:33.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:33.922000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:33.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:33.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:33.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:33.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:33.906865 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 02:34:33.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:33.920360 systemd[1]: Finished systemd-random-seed.service. Dec 13 02:34:33.920528 systemd[1]: Reached target first-boot-complete.target. Dec 13 02:34:33.924182 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 02:34:33.924254 systemd[1]: Finished modprobe@fuse.service. Dec 13 02:34:33.925280 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 02:34:33.925550 systemd[1]: Finished systemd-sysctl.service. Dec 13 02:34:33.927227 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 02:34:33.937855 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:34:33.941005 systemd[1]: Finished modprobe@loop.service. Dec 13 02:34:33.941214 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:34:33.965732 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 02:34:33.966712 systemd[1]: Starting systemd-sysusers.service... Dec 13 02:34:33.975826 systemd[1]: Finished systemd-journal-flush.service. Dec 13 02:34:34.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:34.009762 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 02:34:34.010842 systemd[1]: Starting systemd-udev-settle.service... Dec 13 02:34:34.019320 udevadm[1050]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 02:34:34.031139 systemd[1]: Finished systemd-sysusers.service. Dec 13 02:34:34.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:34.032263 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 02:34:34.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:34.116231 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 02:34:34.156637 ignition[1009]: Ignition 2.14.0 Dec 13 02:34:34.156865 ignition[1009]: deleting config from guestinfo properties Dec 13 02:34:34.160842 ignition[1009]: Successfully deleted config Dec 13 02:34:34.161399 systemd[1]: Finished ignition-delete-config.service. Dec 13 02:34:34.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ignition-delete-config comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:34.445774 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 02:34:34.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:34.444000 audit: BPF prog-id=21 op=LOAD Dec 13 02:34:34.444000 audit: BPF prog-id=22 op=LOAD Dec 13 02:34:34.444000 audit: BPF prog-id=7 op=UNLOAD Dec 13 02:34:34.444000 audit: BPF prog-id=8 op=UNLOAD Dec 13 02:34:34.446871 systemd[1]: Starting systemd-udevd.service... Dec 13 02:34:34.458123 systemd-udevd[1053]: Using default interface naming scheme 'v252'. Dec 13 02:34:34.510580 systemd[1]: Started systemd-udevd.service. Dec 13 02:34:34.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:34.509000 audit: BPF prog-id=23 op=LOAD Dec 13 02:34:34.511853 systemd[1]: Starting systemd-networkd.service... Dec 13 02:34:34.522000 audit: BPF prog-id=24 op=LOAD Dec 13 02:34:34.523000 audit: BPF prog-id=25 op=LOAD Dec 13 02:34:34.523000 audit: BPF prog-id=26 op=LOAD Dec 13 02:34:34.525365 systemd[1]: Starting systemd-userdbd.service... Dec 13 02:34:34.539458 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 02:34:34.565962 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 02:34:34.567439 systemd[1]: Started systemd-userdbd.service. Dec 13 02:34:34.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:34.568935 kernel: ACPI: button: Power Button [PWRF] Dec 13 02:34:34.645000 audit[1055]: AVC avc: denied { confidentiality } for pid=1055 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 02:34:34.645000 audit[1055]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55d4683138e0 a1=337fc a2=7f884c439bc5 a3=5 items=110 ppid=1053 pid=1055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:34:34.645000 audit: CWD cwd="/" Dec 13 02:34:34.645000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=1 name=(null) inode=24431 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=2 name=(null) inode=24431 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=3 name=(null) inode=24432 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=4 name=(null) inode=24431 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=5 name=(null) inode=24433 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=6 name=(null) inode=24431 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=7 name=(null) inode=24434 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=8 name=(null) inode=24434 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=9 name=(null) inode=24435 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=10 name=(null) inode=24434 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=11 name=(null) inode=24436 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=12 name=(null) inode=24434 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=13 name=(null) inode=24437 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=14 name=(null) inode=24434 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=15 name=(null) inode=24438 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=16 name=(null) inode=24434 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=17 name=(null) inode=24439 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=18 name=(null) inode=24431 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=19 name=(null) inode=24440 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=20 name=(null) inode=24440 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=21 name=(null) inode=24441 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=22 name=(null) inode=24440 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=23 name=(null) inode=24442 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=24 name=(null) inode=24440 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=25 name=(null) inode=24443 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=26 name=(null) inode=24440 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=27 name=(null) inode=24444 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=28 name=(null) inode=24440 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=29 name=(null) inode=24445 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=30 name=(null) inode=24431 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=31 name=(null) inode=24446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=32 name=(null) inode=24446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=33 name=(null) inode=24447 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=34 name=(null) inode=24446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=35 name=(null) inode=24448 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=36 name=(null) inode=24446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=37 name=(null) inode=24449 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=38 name=(null) inode=24446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=39 name=(null) inode=24450 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=40 name=(null) inode=24446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=41 name=(null) inode=24451 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=42 name=(null) inode=24431 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=43 name=(null) inode=24452 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=44 name=(null) inode=24452 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=45 name=(null) inode=24453 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=46 name=(null) inode=24452 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=47 name=(null) inode=24454 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=48 name=(null) inode=24452 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=49 name=(null) inode=24455 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=50 name=(null) inode=24452 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=51 name=(null) inode=24456 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=52 name=(null) inode=24452 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=53 name=(null) inode=24457 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=55 name=(null) inode=24458 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=56 name=(null) inode=24458 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=57 name=(null) inode=24459 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=58 name=(null) inode=24458 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=59 name=(null) inode=24460 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=60 name=(null) inode=24458 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=61 name=(null) inode=24461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=62 name=(null) inode=24461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=63 name=(null) inode=24462 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=64 name=(null) inode=24461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=65 name=(null) inode=24463 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=66 name=(null) inode=24461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=67 name=(null) inode=24464 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=68 name=(null) inode=24461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=69 name=(null) inode=24465 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=70 name=(null) inode=24461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=71 name=(null) inode=24466 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=72 name=(null) inode=24458 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=73 name=(null) inode=24467 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=74 name=(null) inode=24467 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=75 name=(null) inode=24468 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=76 name=(null) inode=24467 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=77 name=(null) inode=24469 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=78 name=(null) inode=24467 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=79 name=(null) inode=24470 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=80 name=(null) inode=24467 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=81 name=(null) inode=24471 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=82 name=(null) inode=24467 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=83 name=(null) inode=24472 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=84 name=(null) inode=24458 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=85 name=(null) inode=24473 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=86 name=(null) inode=24473 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=87 name=(null) inode=24474 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=88 name=(null) inode=24473 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=89 name=(null) inode=24475 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=90 name=(null) inode=24473 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=91 name=(null) inode=24476 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=92 name=(null) inode=24473 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=93 name=(null) inode=24477 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=94 name=(null) inode=24473 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=95 name=(null) inode=24478 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=96 name=(null) inode=24458 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=97 name=(null) inode=24479 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=98 name=(null) inode=24479 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=99 name=(null) inode=24480 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=100 name=(null) inode=24479 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=101 name=(null) inode=24481 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=102 name=(null) inode=24479 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=103 name=(null) inode=24482 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=104 name=(null) inode=24479 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=105 name=(null) inode=24483 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=106 name=(null) inode=24479 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=107 name=(null) inode=24484 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PATH item=109 name=(null) inode=24485 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:34:34.645000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 02:34:34.664410 kernel: vmw_vmci 0000:00:07.7: Found VMCI PCI device at 0x11080, irq 16 Dec 13 02:34:34.665248 kernel: vmw_vmci 0000:00:07.7: Using capabilities 0xc Dec 13 02:34:34.667343 kernel: Guest personality initialized and is active Dec 13 02:34:34.667369 kernel: VMCI host device registered (name=vmci, major=10, minor=125) Dec 13 02:34:34.667388 kernel: Initialized host personality Dec 13 02:34:34.682939 kernel: piix4_smbus 0000:00:07.3: SMBus Host Controller not enabled! Dec 13 02:34:34.688941 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1061) Dec 13 02:34:34.695614 (udev-worker)[1057]: id: Truncating stdout of 'dmi_memory_id' up to 16384 byte. Dec 13 02:34:34.695934 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input3 Dec 13 02:34:34.697689 systemd-networkd[1060]: lo: Link UP Dec 13 02:34:34.697694 systemd-networkd[1060]: lo: Gained carrier Dec 13 02:34:34.697988 systemd-networkd[1060]: Enumeration completed Dec 13 02:34:34.698045 systemd[1]: Started systemd-networkd.service. Dec 13 02:34:34.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:34.698240 systemd-networkd[1060]: ens192: Configuring with /etc/systemd/network/00-vmware.network. Dec 13 02:34:34.699819 systemd-networkd[1060]: ens192: Link UP Dec 13 02:34:34.699901 systemd-networkd[1060]: ens192: Gained carrier Dec 13 02:34:34.699945 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Dec 13 02:34:34.700053 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Dec 13 02:34:34.700154 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens192: link becomes ready Dec 13 02:34:34.705952 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 02:34:34.710918 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 02:34:34.721147 systemd[1]: Finished systemd-udev-settle.service. Dec 13 02:34:34.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:34.722089 systemd[1]: Starting lvm2-activation-early.service... Dec 13 02:34:34.738247 lvm[1086]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 02:34:34.757441 systemd[1]: Finished lvm2-activation-early.service. Dec 13 02:34:34.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:34.757622 systemd[1]: Reached target cryptsetup.target. Dec 13 02:34:34.758532 systemd[1]: Starting lvm2-activation.service... Dec 13 02:34:34.761004 lvm[1087]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 02:34:34.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:34.782550 systemd[1]: Finished lvm2-activation.service. Dec 13 02:34:34.782711 systemd[1]: Reached target local-fs-pre.target. Dec 13 02:34:34.783538 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 02:34:34.790160 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 02:34:34.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:34.874338 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 02:34:34.874361 systemd[1]: Reached target local-fs.target. Dec 13 02:34:34.874473 systemd[1]: Reached target machines.target. Dec 13 02:34:34.875455 systemd[1]: Starting ldconfig.service... Dec 13 02:34:34.876098 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:34:34.876133 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:34:34.876867 systemd[1]: Starting systemd-boot-update.service... Dec 13 02:34:34.877675 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 02:34:34.878499 systemd[1]: Starting systemd-sysext.service... Dec 13 02:34:34.884507 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1091 (bootctl) Dec 13 02:34:34.885191 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 02:34:34.886873 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 02:34:34.898690 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 02:34:34.898804 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 02:34:34.917948 kernel: loop0: detected capacity change from 0 to 210664 Dec 13 02:34:35.201529 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 02:34:35.202035 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 02:34:35.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:35.222078 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 02:34:35.240189 kernel: loop1: detected capacity change from 0 to 210664 Dec 13 02:34:35.240944 systemd-fsck[1098]: fsck.fat 4.2 (2021-01-31) Dec 13 02:34:35.240944 systemd-fsck[1098]: /dev/sda1: 789 files, 119291/258078 clusters Dec 13 02:34:35.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:35.241747 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 02:34:35.242842 systemd[1]: Mounting boot.mount... Dec 13 02:34:35.262464 systemd[1]: Mounted boot.mount. Dec 13 02:34:35.275515 (sd-sysext)[1102]: Using extensions 'kubernetes'. Dec 13 02:34:35.276380 (sd-sysext)[1102]: Merged extensions into '/usr'. Dec 13 02:34:35.276879 systemd[1]: Finished systemd-boot-update.service. Dec 13 02:34:35.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:35.288279 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:34:35.289499 systemd[1]: Mounting usr-share-oem.mount... Dec 13 02:34:35.290520 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:34:35.292477 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:34:35.293339 systemd[1]: Starting modprobe@loop.service... Dec 13 02:34:35.293664 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:34:35.293748 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:34:35.293820 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:34:35.295342 systemd[1]: Mounted usr-share-oem.mount. Dec 13 02:34:35.295980 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:34:35.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:35.294000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:35.296070 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:34:35.296382 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:34:35.296455 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:34:35.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:35.294000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:35.296834 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:34:35.297648 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:34:35.297752 systemd[1]: Finished modprobe@loop.service. Dec 13 02:34:35.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:35.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:35.298394 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:34:35.299196 systemd[1]: Finished systemd-sysext.service. Dec 13 02:34:35.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:35.300360 systemd[1]: Starting ensure-sysext.service... Dec 13 02:34:35.301401 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 02:34:35.306660 systemd[1]: Reloading. Dec 13 02:34:35.308968 systemd-tmpfiles[1110]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 02:34:35.309921 systemd-tmpfiles[1110]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 02:34:35.311461 systemd-tmpfiles[1110]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 02:34:35.355115 /usr/lib/systemd/system-generators/torcx-generator[1129]: time="2024-12-13T02:34:35Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:34:35.355301 /usr/lib/systemd/system-generators/torcx-generator[1129]: time="2024-12-13T02:34:35Z" level=info msg="torcx already run" Dec 13 02:34:35.430401 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:34:35.430516 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:34:35.444516 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:34:35.486000 audit: BPF prog-id=27 op=LOAD Dec 13 02:34:35.486000 audit: BPF prog-id=24 op=UNLOAD Dec 13 02:34:35.486000 audit: BPF prog-id=28 op=LOAD Dec 13 02:34:35.486000 audit: BPF prog-id=29 op=LOAD Dec 13 02:34:35.486000 audit: BPF prog-id=25 op=UNLOAD Dec 13 02:34:35.486000 audit: BPF prog-id=26 op=UNLOAD Dec 13 02:34:35.487000 audit: BPF prog-id=30 op=LOAD Dec 13 02:34:35.487000 audit: BPF prog-id=31 op=LOAD Dec 13 02:34:35.487000 audit: BPF prog-id=21 op=UNLOAD Dec 13 02:34:35.487000 audit: BPF prog-id=22 op=UNLOAD Dec 13 02:34:35.487000 audit: BPF prog-id=32 op=LOAD Dec 13 02:34:35.487000 audit: BPF prog-id=18 op=UNLOAD Dec 13 02:34:35.488000 audit: BPF prog-id=33 op=LOAD Dec 13 02:34:35.488000 audit: BPF prog-id=34 op=LOAD Dec 13 02:34:35.488000 audit: BPF prog-id=19 op=UNLOAD Dec 13 02:34:35.488000 audit: BPF prog-id=20 op=UNLOAD Dec 13 02:34:35.489000 audit: BPF prog-id=35 op=LOAD Dec 13 02:34:35.489000 audit: BPF prog-id=23 op=UNLOAD Dec 13 02:34:35.496668 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 02:34:35.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:35.498867 systemd[1]: Starting audit-rules.service... Dec 13 02:34:35.500116 systemd[1]: Starting clean-ca-certificates.service... Dec 13 02:34:35.501404 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 02:34:35.500000 audit: BPF prog-id=36 op=LOAD Dec 13 02:34:35.503460 systemd[1]: Starting systemd-resolved.service... Dec 13 02:34:35.503000 audit: BPF prog-id=37 op=LOAD Dec 13 02:34:35.506313 systemd[1]: Starting systemd-timesyncd.service... Dec 13 02:34:35.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:35.508011 systemd[1]: Starting systemd-update-utmp.service... Dec 13 02:34:35.508526 systemd[1]: Finished clean-ca-certificates.service. Dec 13 02:34:35.509905 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:34:35.511000 audit[1197]: SYSTEM_BOOT pid=1197 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 02:34:35.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:35.515845 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:34:35.516693 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:34:35.517739 systemd[1]: Starting modprobe@loop.service... Dec 13 02:34:35.517891 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:34:35.518002 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:34:35.518118 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:34:35.519290 systemd[1]: Finished systemd-update-utmp.service. Dec 13 02:34:35.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:35.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:35.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:35.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:35.521063 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:34:35.521136 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:34:35.521835 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:34:35.521893 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:34:35.523123 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:34:35.523392 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:34:35.523460 systemd[1]: Finished modprobe@loop.service. Dec 13 02:34:35.523722 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:34:35.526508 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:34:35.527493 systemd[1]: Starting modprobe@drm.service... Dec 13 02:34:35.528888 systemd[1]: Starting modprobe@loop.service... Dec 13 02:34:35.529233 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:34:35.529461 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:34:35.531102 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 02:34:35.531439 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:34:35.532376 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:34:35.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:35.532724 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:34:35.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:35.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:35.534257 systemd[1]: Finished ensure-sysext.service. Dec 13 02:34:35.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:35.535327 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 02:34:35.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:35.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:35.536309 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:34:35.536378 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:34:35.536537 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:34:35.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:35.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:35.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:35.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:34:35.538492 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 02:34:35.538576 systemd[1]: Finished modprobe@drm.service. Dec 13 02:34:35.538817 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:34:35.538883 systemd[1]: Finished modprobe@loop.service. Dec 13 02:34:35.539050 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:34:35.569000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 02:34:35.569000 audit[1218]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff9d337680 a2=420 a3=0 items=0 ppid=1191 pid=1218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:34:35.569000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 02:34:35.571273 augenrules[1218]: No rules Dec 13 02:34:35.571522 systemd[1]: Finished audit-rules.service. Dec 13 02:34:35.580624 systemd-resolved[1194]: Positive Trust Anchors: Dec 13 02:34:35.580800 systemd-resolved[1194]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 02:34:35.580860 systemd-resolved[1194]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 02:34:35.582400 systemd[1]: Started systemd-timesyncd.service. Dec 13 02:34:35.582592 systemd[1]: Reached target time-set.target. Dec 13 02:34:35.592793 ldconfig[1090]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 02:34:35.595265 systemd[1]: Finished ldconfig.service. Dec 13 02:34:35.596332 systemd[1]: Starting systemd-update-done.service... Dec 13 02:34:35.600454 systemd[1]: Finished systemd-update-done.service. Dec 13 02:34:35.605434 systemd-resolved[1194]: Defaulting to hostname 'linux'. Dec 13 02:34:35.606541 systemd[1]: Started systemd-resolved.service. Dec 13 02:34:35.606693 systemd[1]: Reached target network.target. Dec 13 02:34:35.606783 systemd[1]: Reached target nss-lookup.target. Dec 13 02:34:35.606881 systemd[1]: Reached target sysinit.target. Dec 13 02:34:35.607057 systemd[1]: Started motdgen.path. Dec 13 02:34:35.607154 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 02:34:35.607350 systemd[1]: Started logrotate.timer. Dec 13 02:34:35.607477 systemd[1]: Started mdadm.timer. Dec 13 02:34:35.607592 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 02:34:35.607685 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 02:34:35.607704 systemd[1]: Reached target paths.target. Dec 13 02:34:35.607786 systemd[1]: Reached target timers.target. Dec 13 02:34:35.608046 systemd[1]: Listening on dbus.socket. Dec 13 02:34:35.608961 systemd[1]: Starting docker.socket... Dec 13 02:34:35.610773 systemd[1]: Listening on sshd.socket. Dec 13 02:34:35.610943 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:34:35.611199 systemd[1]: Listening on docker.socket. Dec 13 02:34:35.611327 systemd[1]: Reached target sockets.target. Dec 13 02:34:35.611417 systemd[1]: Reached target basic.target. Dec 13 02:34:35.611529 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 02:34:35.611548 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 02:34:35.612398 systemd[1]: Starting containerd.service... Dec 13 02:34:35.613857 systemd[1]: Starting dbus.service... Dec 13 02:34:35.614784 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 02:34:35.615685 systemd[1]: Starting extend-filesystems.service... Dec 13 02:34:35.615827 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 02:34:35.616957 systemd[1]: Starting motdgen.service... Dec 13 02:34:35.617574 jq[1229]: false Dec 13 02:34:35.622244 systemd[1]: Starting prepare-helm.service... Dec 13 02:34:35.623115 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 02:34:35.624209 systemd[1]: Starting sshd-keygen.service... Dec 13 02:34:35.626476 systemd[1]: Starting systemd-logind.service... Dec 13 02:34:35.626766 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:34:35.626813 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 02:34:35.627263 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 02:34:35.627686 systemd[1]: Starting update-engine.service... Dec 13 02:34:35.629020 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 02:34:35.631690 systemd[1]: Starting vmtoolsd.service... Dec 13 02:34:35.632810 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 02:34:35.632950 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 02:34:35.637379 jq[1240]: true Dec 13 02:34:35.643539 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 02:34:35.643643 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 02:34:35.644445 jq[1246]: true Dec 13 02:34:35.658493 extend-filesystems[1230]: Found loop1 Dec 13 02:34:35.662353 tar[1244]: linux-amd64/helm Dec 13 02:34:35.663832 extend-filesystems[1230]: Found sda Dec 13 02:34:35.664835 systemd[1]: Started vmtoolsd.service. Dec 13 02:34:35.665169 extend-filesystems[1230]: Found sda1 Dec 13 02:34:35.665169 extend-filesystems[1230]: Found sda2 Dec 13 02:34:35.665169 extend-filesystems[1230]: Found sda3 Dec 13 02:34:35.665169 extend-filesystems[1230]: Found usr Dec 13 02:34:35.665169 extend-filesystems[1230]: Found sda4 Dec 13 02:34:35.665169 extend-filesystems[1230]: Found sda6 Dec 13 02:34:35.665169 extend-filesystems[1230]: Found sda7 Dec 13 02:34:35.665169 extend-filesystems[1230]: Found sda9 Dec 13 02:34:35.665169 extend-filesystems[1230]: Checking size of /dev/sda9 Dec 13 02:34:35.673096 extend-filesystems[1230]: Old size kept for /dev/sda9 Dec 13 02:34:35.677708 extend-filesystems[1230]: Found sr0 Dec 13 02:34:35.677996 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 02:34:35.678104 systemd[1]: Finished motdgen.service. Dec 13 02:34:35.678350 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 02:34:35.678432 systemd[1]: Finished extend-filesystems.service. Dec 13 02:34:35.694543 dbus-daemon[1228]: [system] SELinux support is enabled Dec 13 02:34:35.694634 systemd[1]: Started dbus.service. Dec 13 02:34:35.695864 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 02:34:35.695881 systemd[1]: Reached target system-config.target. Dec 13 02:34:35.696005 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 02:34:35.696017 systemd[1]: Reached target user-config.target. Dec 13 02:34:35.700089 systemd-logind[1238]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 02:34:35.702208 systemd-logind[1238]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 02:34:35.703885 systemd-logind[1238]: New seat seat0. Dec 13 02:34:35.708692 systemd[1]: Started systemd-logind.service. Dec 13 02:35:46.082467 systemd-resolved[1194]: Clock change detected. Flushing caches. Dec 13 02:35:46.082626 systemd-timesyncd[1195]: Contacted time server 23.150.41.122:123 (0.flatcar.pool.ntp.org). Dec 13 02:35:46.082661 systemd-timesyncd[1195]: Initial clock synchronization to Fri 2024-12-13 02:35:46.082437 UTC. Dec 13 02:35:46.085506 bash[1281]: Updated "/home/core/.ssh/authorized_keys" Dec 13 02:35:46.087525 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 02:35:46.093700 env[1255]: time="2024-12-13T02:35:46.092884854Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 02:35:46.109223 kernel: NET: Registered PF_VSOCK protocol family Dec 13 02:35:46.113649 update_engine[1239]: I1213 02:35:46.113157 1239 main.cc:92] Flatcar Update Engine starting Dec 13 02:35:46.114909 systemd[1]: Started update-engine.service. Dec 13 02:35:46.116349 systemd[1]: Started locksmithd.service. Dec 13 02:35:46.117059 update_engine[1239]: I1213 02:35:46.117043 1239 update_check_scheduler.cc:74] Next update check in 9m45s Dec 13 02:35:46.150825 env[1255]: time="2024-12-13T02:35:46.150802004Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 02:35:46.151705 env[1255]: time="2024-12-13T02:35:46.151693082Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:35:46.153262 env[1255]: time="2024-12-13T02:35:46.153245076Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:35:46.153320 env[1255]: time="2024-12-13T02:35:46.153309900Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:35:46.153506 env[1255]: time="2024-12-13T02:35:46.153494172Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:35:46.153586 env[1255]: time="2024-12-13T02:35:46.153576361Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 02:35:46.153636 env[1255]: time="2024-12-13T02:35:46.153625119Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 02:35:46.153678 env[1255]: time="2024-12-13T02:35:46.153669143Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 02:35:46.153784 env[1255]: time="2024-12-13T02:35:46.153775218Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:35:46.153994 env[1255]: time="2024-12-13T02:35:46.153984524Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:35:46.154229 env[1255]: time="2024-12-13T02:35:46.154216149Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:35:46.154521 env[1255]: time="2024-12-13T02:35:46.154511588Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 02:35:46.154592 env[1255]: time="2024-12-13T02:35:46.154581847Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 02:35:46.154636 env[1255]: time="2024-12-13T02:35:46.154625986Z" level=info msg="metadata content store policy set" policy=shared Dec 13 02:35:46.156107 env[1255]: time="2024-12-13T02:35:46.156095739Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 02:35:46.156159 env[1255]: time="2024-12-13T02:35:46.156149003Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 02:35:46.156217 env[1255]: time="2024-12-13T02:35:46.156196105Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 02:35:46.156304 env[1255]: time="2024-12-13T02:35:46.156294731Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 02:35:46.156370 env[1255]: time="2024-12-13T02:35:46.156340682Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 02:35:46.156439 env[1255]: time="2024-12-13T02:35:46.156430793Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 02:35:46.156485 env[1255]: time="2024-12-13T02:35:46.156475652Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 02:35:46.156567 env[1255]: time="2024-12-13T02:35:46.156528401Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 02:35:46.156612 env[1255]: time="2024-12-13T02:35:46.156602828Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 02:35:46.156657 env[1255]: time="2024-12-13T02:35:46.156648270Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 02:35:46.156897 env[1255]: time="2024-12-13T02:35:46.156887581Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 02:35:46.156945 env[1255]: time="2024-12-13T02:35:46.156935356Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 02:35:46.157068 env[1255]: time="2024-12-13T02:35:46.157059499Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 02:35:46.157252 env[1255]: time="2024-12-13T02:35:46.157241890Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 02:35:46.157967 env[1255]: time="2024-12-13T02:35:46.157956395Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 02:35:46.158025 env[1255]: time="2024-12-13T02:35:46.158014076Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 02:35:46.158077 env[1255]: time="2024-12-13T02:35:46.158063251Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 02:35:46.158250 env[1255]: time="2024-12-13T02:35:46.158240571Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 02:35:46.158577 env[1255]: time="2024-12-13T02:35:46.158567427Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 02:35:46.158627 env[1255]: time="2024-12-13T02:35:46.158617393Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 02:35:46.158703 env[1255]: time="2024-12-13T02:35:46.158694040Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 02:35:46.158749 env[1255]: time="2024-12-13T02:35:46.158739340Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 02:35:46.158794 env[1255]: time="2024-12-13T02:35:46.158784734Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 02:35:46.158863 env[1255]: time="2024-12-13T02:35:46.158854391Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 02:35:46.159153 env[1255]: time="2024-12-13T02:35:46.159144180Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 02:35:46.159245 env[1255]: time="2024-12-13T02:35:46.159235766Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 02:35:46.159353 env[1255]: time="2024-12-13T02:35:46.159343621Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 02:35:46.159722 env[1255]: time="2024-12-13T02:35:46.159712336Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 02:35:46.159772 env[1255]: time="2024-12-13T02:35:46.159762617Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 02:35:46.159818 env[1255]: time="2024-12-13T02:35:46.159809087Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 02:35:46.159870 env[1255]: time="2024-12-13T02:35:46.159858633Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 02:35:46.160130 env[1255]: time="2024-12-13T02:35:46.160120128Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 02:35:46.160223 env[1255]: time="2024-12-13T02:35:46.160174400Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 02:35:46.160285 env[1255]: time="2024-12-13T02:35:46.160275424Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 02:35:46.160881 env[1255]: time="2024-12-13T02:35:46.160850272Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 02:35:46.164713 env[1255]: time="2024-12-13T02:35:46.161176013Z" level=info msg="Connect containerd service" Dec 13 02:35:46.164713 env[1255]: time="2024-12-13T02:35:46.161209758Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 02:35:46.164713 env[1255]: time="2024-12-13T02:35:46.162478760Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 02:35:46.164713 env[1255]: time="2024-12-13T02:35:46.162569739Z" level=info msg="Start subscribing containerd event" Dec 13 02:35:46.164713 env[1255]: time="2024-12-13T02:35:46.162604881Z" level=info msg="Start recovering state" Dec 13 02:35:46.164713 env[1255]: time="2024-12-13T02:35:46.162614351Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 02:35:46.164713 env[1255]: time="2024-12-13T02:35:46.162639321Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 02:35:46.164713 env[1255]: time="2024-12-13T02:35:46.162647079Z" level=info msg="Start event monitor" Dec 13 02:35:46.164713 env[1255]: time="2024-12-13T02:35:46.162667657Z" level=info msg="containerd successfully booted in 0.071201s" Dec 13 02:35:46.162720 systemd[1]: Started containerd.service. Dec 13 02:35:46.166953 env[1255]: time="2024-12-13T02:35:46.166934208Z" level=info msg="Start snapshots syncer" Dec 13 02:35:46.166994 env[1255]: time="2024-12-13T02:35:46.166953117Z" level=info msg="Start cni network conf syncer for default" Dec 13 02:35:46.166994 env[1255]: time="2024-12-13T02:35:46.166973468Z" level=info msg="Start streaming server" Dec 13 02:35:46.237650 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:35:46.237710 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:35:46.436950 tar[1244]: linux-amd64/LICENSE Dec 13 02:35:46.436950 tar[1244]: linux-amd64/README.md Dec 13 02:35:46.438653 systemd[1]: Finished prepare-helm.service. Dec 13 02:35:46.506186 locksmithd[1288]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 02:35:46.584472 systemd-networkd[1060]: ens192: Gained IPv6LL Dec 13 02:35:46.586138 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 02:35:46.586434 systemd[1]: Reached target network-online.target. Dec 13 02:35:46.588482 systemd[1]: Starting kubelet.service... Dec 13 02:35:46.797649 sshd_keygen[1249]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 02:35:46.812540 systemd[1]: Finished sshd-keygen.service. Dec 13 02:35:46.813801 systemd[1]: Starting issuegen.service... Dec 13 02:35:46.818192 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 02:35:46.818303 systemd[1]: Finished issuegen.service. Dec 13 02:35:46.819551 systemd[1]: Starting systemd-user-sessions.service... Dec 13 02:35:46.824113 systemd[1]: Finished systemd-user-sessions.service. Dec 13 02:35:46.825169 systemd[1]: Started getty@tty1.service. Dec 13 02:35:46.826063 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 02:35:46.826276 systemd[1]: Reached target getty.target. Dec 13 02:35:47.458471 systemd[1]: Started kubelet.service. Dec 13 02:35:47.458788 systemd[1]: Reached target multi-user.target. Dec 13 02:35:47.459726 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 02:35:47.464494 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 02:35:47.464590 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 02:35:47.464765 systemd[1]: Startup finished in 880ms (kernel) + 5.044s (initrd) + 5.513s (userspace) = 11.438s. Dec 13 02:35:47.494908 login[1356]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 02:35:47.495880 login[1357]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 02:35:47.505834 systemd[1]: Created slice user-500.slice. Dec 13 02:35:47.506709 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 02:35:47.510238 systemd-logind[1238]: New session 1 of user core. Dec 13 02:35:47.513399 systemd-logind[1238]: New session 2 of user core. Dec 13 02:35:47.516054 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 02:35:47.517081 systemd[1]: Starting user@500.service... Dec 13 02:35:47.520057 (systemd)[1363]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:35:47.566405 systemd[1363]: Queued start job for default target default.target. Dec 13 02:35:47.566734 systemd[1363]: Reached target paths.target. Dec 13 02:35:47.566748 systemd[1363]: Reached target sockets.target. Dec 13 02:35:47.566756 systemd[1363]: Reached target timers.target. Dec 13 02:35:47.566763 systemd[1363]: Reached target basic.target. Dec 13 02:35:47.566820 systemd[1]: Started user@500.service. Dec 13 02:35:47.567557 systemd[1]: Started session-1.scope. Dec 13 02:35:47.568077 systemd[1]: Started session-2.scope. Dec 13 02:35:47.568484 systemd[1363]: Reached target default.target. Dec 13 02:35:47.568562 systemd[1363]: Startup finished in 44ms. Dec 13 02:35:48.055966 kubelet[1360]: E1213 02:35:48.055926 1360 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:35:48.057210 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:35:48.057289 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:35:58.307786 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 02:35:58.307914 systemd[1]: Stopped kubelet.service. Dec 13 02:35:58.308897 systemd[1]: Starting kubelet.service... Dec 13 02:35:58.358534 systemd[1]: Started kubelet.service. Dec 13 02:35:58.440122 kubelet[1392]: E1213 02:35:58.440092 1392 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:35:58.443025 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:35:58.443121 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:36:08.693674 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 02:36:08.693807 systemd[1]: Stopped kubelet.service. Dec 13 02:36:08.694776 systemd[1]: Starting kubelet.service... Dec 13 02:36:08.913821 systemd[1]: Started kubelet.service. Dec 13 02:36:09.006776 kubelet[1403]: E1213 02:36:09.006695 1403 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:36:09.008324 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:36:09.008418 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:36:19.258986 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 02:36:19.259127 systemd[1]: Stopped kubelet.service. Dec 13 02:36:19.260260 systemd[1]: Starting kubelet.service... Dec 13 02:36:19.509618 systemd[1]: Started kubelet.service. Dec 13 02:36:19.535572 kubelet[1413]: E1213 02:36:19.535536 1413 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:36:19.536713 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:36:19.536786 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:36:26.182444 systemd[1]: Created slice system-sshd.slice. Dec 13 02:36:26.183708 systemd[1]: Started sshd@0-139.178.70.101:22-147.75.109.163:39810.service. Dec 13 02:36:26.254487 sshd[1421]: Accepted publickey for core from 147.75.109.163 port 39810 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:36:26.255466 sshd[1421]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:36:26.258402 systemd[1]: Started session-3.scope. Dec 13 02:36:26.258685 systemd-logind[1238]: New session 3 of user core. Dec 13 02:36:26.306856 systemd[1]: Started sshd@1-139.178.70.101:22-147.75.109.163:39826.service. Dec 13 02:36:26.337887 sshd[1426]: Accepted publickey for core from 147.75.109.163 port 39826 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:36:26.339610 sshd[1426]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:36:26.344428 systemd-logind[1238]: New session 4 of user core. Dec 13 02:36:26.344688 systemd[1]: Started session-4.scope. Dec 13 02:36:26.396286 sshd[1426]: pam_unix(sshd:session): session closed for user core Dec 13 02:36:26.398179 systemd[1]: Started sshd@2-139.178.70.101:22-147.75.109.163:39838.service. Dec 13 02:36:26.399443 systemd[1]: sshd@1-139.178.70.101:22-147.75.109.163:39826.service: Deactivated successfully. Dec 13 02:36:26.399898 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 02:36:26.400625 systemd-logind[1238]: Session 4 logged out. Waiting for processes to exit. Dec 13 02:36:26.401273 systemd-logind[1238]: Removed session 4. Dec 13 02:36:26.427819 sshd[1431]: Accepted publickey for core from 147.75.109.163 port 39838 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:36:26.428658 sshd[1431]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:36:26.431677 systemd[1]: Started session-5.scope. Dec 13 02:36:26.431890 systemd-logind[1238]: New session 5 of user core. Dec 13 02:36:26.479903 sshd[1431]: pam_unix(sshd:session): session closed for user core Dec 13 02:36:26.482856 systemd[1]: Started sshd@3-139.178.70.101:22-147.75.109.163:39844.service. Dec 13 02:36:26.483519 systemd[1]: sshd@2-139.178.70.101:22-147.75.109.163:39838.service: Deactivated successfully. Dec 13 02:36:26.484030 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 02:36:26.484486 systemd-logind[1238]: Session 5 logged out. Waiting for processes to exit. Dec 13 02:36:26.485189 systemd-logind[1238]: Removed session 5. Dec 13 02:36:26.513806 sshd[1437]: Accepted publickey for core from 147.75.109.163 port 39844 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:36:26.514706 sshd[1437]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:36:26.517577 systemd-logind[1238]: New session 6 of user core. Dec 13 02:36:26.518179 systemd[1]: Started session-6.scope. Dec 13 02:36:26.569494 sshd[1437]: pam_unix(sshd:session): session closed for user core Dec 13 02:36:26.572655 systemd[1]: sshd@3-139.178.70.101:22-147.75.109.163:39844.service: Deactivated successfully. Dec 13 02:36:26.573238 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 02:36:26.573660 systemd-logind[1238]: Session 6 logged out. Waiting for processes to exit. Dec 13 02:36:26.574664 systemd[1]: Started sshd@4-139.178.70.101:22-147.75.109.163:39854.service. Dec 13 02:36:26.575279 systemd-logind[1238]: Removed session 6. Dec 13 02:36:26.604855 sshd[1444]: Accepted publickey for core from 147.75.109.163 port 39854 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:36:26.605827 sshd[1444]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:36:26.608553 systemd-logind[1238]: New session 7 of user core. Dec 13 02:36:26.609612 systemd[1]: Started session-7.scope. Dec 13 02:36:26.696585 sudo[1447]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 02:36:26.696769 sudo[1447]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:36:26.704310 dbus-daemon[1228]: \xd0-\x85\xfcsU: received setenforce notice (enforcing=1620022512) Dec 13 02:36:26.705351 sudo[1447]: pam_unix(sudo:session): session closed for user root Dec 13 02:36:26.707398 sshd[1444]: pam_unix(sshd:session): session closed for user core Dec 13 02:36:26.709764 systemd[1]: sshd@4-139.178.70.101:22-147.75.109.163:39854.service: Deactivated successfully. Dec 13 02:36:26.710129 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 02:36:26.710560 systemd-logind[1238]: Session 7 logged out. Waiting for processes to exit. Dec 13 02:36:26.711240 systemd[1]: Started sshd@5-139.178.70.101:22-147.75.109.163:39856.service. Dec 13 02:36:26.712371 systemd-logind[1238]: Removed session 7. Dec 13 02:36:26.740618 sshd[1451]: Accepted publickey for core from 147.75.109.163 port 39856 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:36:26.740802 sshd[1451]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:36:26.743229 systemd-logind[1238]: New session 8 of user core. Dec 13 02:36:26.743878 systemd[1]: Started session-8.scope. Dec 13 02:36:26.794176 sudo[1455]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 02:36:26.794596 sudo[1455]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:36:26.796819 sudo[1455]: pam_unix(sudo:session): session closed for user root Dec 13 02:36:26.800413 sudo[1454]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 02:36:26.800582 sudo[1454]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:36:26.807398 systemd[1]: Stopping audit-rules.service... Dec 13 02:36:26.807000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 02:36:26.814395 kernel: kauditd_printk_skb: 284 callbacks suppressed Dec 13 02:36:26.814439 kernel: audit: type=1305 audit(1734057386.807:205): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 02:36:26.807000 audit[1458]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd9a8f2f20 a2=420 a3=0 items=0 ppid=1 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:26.816875 auditctl[1458]: No rules Dec 13 02:36:26.822053 kernel: audit: type=1300 audit(1734057386.807:205): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd9a8f2f20 a2=420 a3=0 items=0 ppid=1 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:26.817237 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 02:36:26.817415 systemd[1]: Stopped audit-rules.service. Dec 13 02:36:26.822241 kernel: audit: type=1327 audit(1734057386.807:205): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 02:36:26.807000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 02:36:26.822618 systemd[1]: Starting audit-rules.service... Dec 13 02:36:26.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:26.830236 kernel: audit: type=1131 audit(1734057386.816:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:26.836419 augenrules[1475]: No rules Dec 13 02:36:26.836923 systemd[1]: Finished audit-rules.service. Dec 13 02:36:26.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:26.837544 sudo[1454]: pam_unix(sudo:session): session closed for user root Dec 13 02:36:26.841548 kernel: audit: type=1130 audit(1734057386.835:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:26.840877 sshd[1451]: pam_unix(sshd:session): session closed for user core Dec 13 02:36:26.836000 audit[1454]: USER_END pid=1454 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:36:26.843351 systemd[1]: Started sshd@6-139.178.70.101:22-147.75.109.163:39872.service. Dec 13 02:36:26.845859 kernel: audit: type=1106 audit(1734057386.836:208): pid=1454 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:36:26.836000 audit[1454]: CRED_DISP pid=1454 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:36:26.851925 kernel: audit: type=1104 audit(1734057386.836:209): pid=1454 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:36:26.851997 kernel: audit: type=1130 audit(1734057386.842:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.101:22-147.75.109.163:39872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:26.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.101:22-147.75.109.163:39872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:26.849896 systemd[1]: sshd@5-139.178.70.101:22-147.75.109.163:39856.service: Deactivated successfully. Dec 13 02:36:26.850430 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 02:36:26.847000 audit[1451]: USER_END pid=1451 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:36:26.852764 systemd-logind[1238]: Session 8 logged out. Waiting for processes to exit. Dec 13 02:36:26.847000 audit[1451]: CRED_DISP pid=1451 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:36:26.859716 kernel: audit: type=1106 audit(1734057386.847:211): pid=1451 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:36:26.859783 kernel: audit: type=1104 audit(1734057386.847:212): pid=1451 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:36:26.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.101:22-147.75.109.163:39856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:26.860083 systemd-logind[1238]: Removed session 8. Dec 13 02:36:26.877000 audit[1480]: USER_ACCT pid=1480 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:36:26.878637 sshd[1480]: Accepted publickey for core from 147.75.109.163 port 39872 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:36:26.878000 audit[1480]: CRED_ACQ pid=1480 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:36:26.878000 audit[1480]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcafa17b30 a2=3 a3=0 items=0 ppid=1 pid=1480 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:26.878000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:36:26.879672 sshd[1480]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:36:26.883511 systemd[1]: Started session-9.scope. Dec 13 02:36:26.883837 systemd-logind[1238]: New session 9 of user core. Dec 13 02:36:26.885000 audit[1480]: USER_START pid=1480 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:36:26.886000 audit[1483]: CRED_ACQ pid=1483 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:36:26.932000 audit[1484]: USER_ACCT pid=1484 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:36:26.932000 audit[1484]: CRED_REFR pid=1484 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:36:26.933874 sudo[1484]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 02:36:26.934004 sudo[1484]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:36:26.933000 audit[1484]: USER_START pid=1484 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:36:26.948090 systemd[1]: Starting docker.service... Dec 13 02:36:26.972472 env[1494]: time="2024-12-13T02:36:26.972440774Z" level=info msg="Starting up" Dec 13 02:36:26.973285 env[1494]: time="2024-12-13T02:36:26.973271820Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 02:36:26.973344 env[1494]: time="2024-12-13T02:36:26.973333925Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 02:36:26.973399 env[1494]: time="2024-12-13T02:36:26.973387123Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 02:36:26.973444 env[1494]: time="2024-12-13T02:36:26.973434782Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 02:36:26.974651 env[1494]: time="2024-12-13T02:36:26.974634974Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 02:36:26.974733 env[1494]: time="2024-12-13T02:36:26.974719664Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 02:36:26.974800 env[1494]: time="2024-12-13T02:36:26.974785815Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 02:36:26.974862 env[1494]: time="2024-12-13T02:36:26.974850490Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 02:36:26.978303 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport161028693-merged.mount: Deactivated successfully. Dec 13 02:36:26.998271 env[1494]: time="2024-12-13T02:36:26.996612588Z" level=info msg="Loading containers: start." Dec 13 02:36:27.134000 audit[1524]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1524 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:36:27.134000 audit[1524]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff272c9a90 a2=0 a3=7fff272c9a7c items=0 ppid=1494 pid=1524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:27.134000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 02:36:27.136000 audit[1526]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1526 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:36:27.136000 audit[1526]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff11baf4c0 a2=0 a3=7fff11baf4ac items=0 ppid=1494 pid=1526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:27.136000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 02:36:27.138000 audit[1528]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1528 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:36:27.138000 audit[1528]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffda9949bc0 a2=0 a3=7ffda9949bac items=0 ppid=1494 pid=1528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:27.138000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 02:36:27.139000 audit[1530]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1530 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:36:27.139000 audit[1530]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffc3ce0e20 a2=0 a3=7fffc3ce0e0c items=0 ppid=1494 pid=1530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:27.139000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 02:36:27.140000 audit[1532]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1532 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:36:27.140000 audit[1532]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff42126660 a2=0 a3=7fff4212664c items=0 ppid=1494 pid=1532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:27.140000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 02:36:27.158000 audit[1537]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1537 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:36:27.158000 audit[1537]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe324cefd0 a2=0 a3=7ffe324cefbc items=0 ppid=1494 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:27.158000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 02:36:27.162000 audit[1539]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1539 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:36:27.162000 audit[1539]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffec62213e0 a2=0 a3=7ffec62213cc items=0 ppid=1494 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:27.162000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 02:36:27.163000 audit[1541]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1541 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:36:27.163000 audit[1541]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fffde3b0cc0 a2=0 a3=7fffde3b0cac items=0 ppid=1494 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:27.163000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 02:36:27.164000 audit[1543]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1543 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:36:27.164000 audit[1543]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe0da340b0 a2=0 a3=7ffe0da3409c items=0 ppid=1494 pid=1543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:27.164000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:36:27.170000 audit[1547]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1547 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:36:27.170000 audit[1547]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd1c561080 a2=0 a3=7ffd1c56106c items=0 ppid=1494 pid=1547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:27.170000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:36:27.174000 audit[1548]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1548 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:36:27.174000 audit[1548]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffcd7bf03d0 a2=0 a3=7ffcd7bf03bc items=0 ppid=1494 pid=1548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:27.174000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:36:27.184225 kernel: Initializing XFRM netlink socket Dec 13 02:36:27.276872 env[1494]: time="2024-12-13T02:36:27.276196313Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 02:36:27.326000 audit[1556]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1556 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:36:27.326000 audit[1556]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fff47f1e450 a2=0 a3=7fff47f1e43c items=0 ppid=1494 pid=1556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:27.326000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 02:36:27.335000 audit[1559]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1559 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:36:27.335000 audit[1559]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fff3d345750 a2=0 a3=7fff3d34573c items=0 ppid=1494 pid=1559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:27.335000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 02:36:27.337000 audit[1562]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1562 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:36:27.337000 audit[1562]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffdccc0bed0 a2=0 a3=7ffdccc0bebc items=0 ppid=1494 pid=1562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:27.337000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 02:36:27.338000 audit[1564]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1564 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:36:27.338000 audit[1564]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffdd2d928d0 a2=0 a3=7ffdd2d928bc items=0 ppid=1494 pid=1564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:27.338000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 02:36:27.340000 audit[1566]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1566 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:36:27.340000 audit[1566]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffc85b70160 a2=0 a3=7ffc85b7014c items=0 ppid=1494 pid=1566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:27.340000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 02:36:27.341000 audit[1568]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1568 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:36:27.341000 audit[1568]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffe6cc3e110 a2=0 a3=7ffe6cc3e0fc items=0 ppid=1494 pid=1568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:27.341000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 02:36:27.342000 audit[1570]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1570 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:36:27.342000 audit[1570]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffeb35516f0 a2=0 a3=7ffeb35516dc items=0 ppid=1494 pid=1570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:27.342000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 02:36:27.350000 audit[1573]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1573 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:36:27.350000 audit[1573]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff0dfda710 a2=0 a3=7fff0dfda6fc items=0 ppid=1494 pid=1573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:27.350000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 02:36:27.352000 audit[1575]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1575 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:36:27.352000 audit[1575]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fffc4de1760 a2=0 a3=7fffc4de174c items=0 ppid=1494 pid=1575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:27.352000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 02:36:27.353000 audit[1577]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1577 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:36:27.353000 audit[1577]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffc671b8130 a2=0 a3=7ffc671b811c items=0 ppid=1494 pid=1577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:27.353000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 02:36:27.355000 audit[1579]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1579 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:36:27.355000 audit[1579]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffca68d0b50 a2=0 a3=7ffca68d0b3c items=0 ppid=1494 pid=1579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:27.355000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 02:36:27.356757 systemd-networkd[1060]: docker0: Link UP Dec 13 02:36:27.360000 audit[1583]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1583 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:36:27.360000 audit[1583]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff646396c0 a2=0 a3=7fff646396ac items=0 ppid=1494 pid=1583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:27.360000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:36:27.364000 audit[1584]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1584 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:36:27.364000 audit[1584]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffdd3220d20 a2=0 a3=7ffdd3220d0c items=0 ppid=1494 pid=1584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:27.364000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:36:27.366323 env[1494]: time="2024-12-13T02:36:27.366300009Z" level=info msg="Loading containers: done." Dec 13 02:36:27.372311 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1986510573-merged.mount: Deactivated successfully. Dec 13 02:36:27.415466 env[1494]: time="2024-12-13T02:36:27.415431916Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 02:36:27.415700 env[1494]: time="2024-12-13T02:36:27.415689357Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 02:36:27.415804 env[1494]: time="2024-12-13T02:36:27.415795659Z" level=info msg="Daemon has completed initialization" Dec 13 02:36:27.486299 systemd[1]: Started docker.service. Dec 13 02:36:27.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:27.491111 env[1494]: time="2024-12-13T02:36:27.491080069Z" level=info msg="API listen on /run/docker.sock" Dec 13 02:36:28.876924 env[1255]: time="2024-12-13T02:36:28.876894969Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.8\"" Dec 13 02:36:29.559046 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Dec 13 02:36:29.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:29.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:29.559157 systemd[1]: Stopped kubelet.service. Dec 13 02:36:29.560535 systemd[1]: Starting kubelet.service... Dec 13 02:36:29.567824 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2357755002.mount: Deactivated successfully. Dec 13 02:36:29.621183 systemd[1]: Started kubelet.service. Dec 13 02:36:29.620000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:29.695361 kubelet[1627]: E1213 02:36:29.695325 1627 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:36:29.696535 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:36:29.696610 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:36:29.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:36:31.030461 update_engine[1239]: I1213 02:36:31.030233 1239 update_attempter.cc:509] Updating boot flags... Dec 13 02:36:31.484444 env[1255]: time="2024-12-13T02:36:31.484386560Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:31.485125 env[1255]: time="2024-12-13T02:36:31.485103612Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:772392d372035bf92e430e758ad0446146d82b7192358c8651252e4fb49c43dd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:31.486159 env[1255]: time="2024-12-13T02:36:31.486143435Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:31.487464 env[1255]: time="2024-12-13T02:36:31.487442612Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:f0e1b3de0c2e98e6c6abd73edf9d3b8e4d44460656cde0ebb92e2d9206961fcb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:31.489358 env[1255]: time="2024-12-13T02:36:31.489337087Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.8\" returns image reference \"sha256:772392d372035bf92e430e758ad0446146d82b7192358c8651252e4fb49c43dd\"" Dec 13 02:36:31.495571 env[1255]: time="2024-12-13T02:36:31.495539421Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.8\"" Dec 13 02:36:33.778733 env[1255]: time="2024-12-13T02:36:33.778694179Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:33.801239 env[1255]: time="2024-12-13T02:36:33.801216660Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:85333d41dd3ce32d8344280c6d533d4c8f66252e4c28e332a2322ba3837f7bd6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:33.813803 env[1255]: time="2024-12-13T02:36:33.813782550Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:33.825793 env[1255]: time="2024-12-13T02:36:33.825771131Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:124f66b7e877eb5a80a40503057299bb60e6a5f2130905f4e3293dabf194c397,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:33.826185 env[1255]: time="2024-12-13T02:36:33.826157322Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.8\" returns image reference \"sha256:85333d41dd3ce32d8344280c6d533d4c8f66252e4c28e332a2322ba3837f7bd6\"" Dec 13 02:36:33.834062 env[1255]: time="2024-12-13T02:36:33.834036894Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.8\"" Dec 13 02:36:35.038152 env[1255]: time="2024-12-13T02:36:35.038111730Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:35.045108 env[1255]: time="2024-12-13T02:36:35.045087052Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:eb53b988d5e03f329b5fdba21cbbbae48e1619b199689e7448095b31843b2c43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:35.053357 env[1255]: time="2024-12-13T02:36:35.053342890Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:35.062564 env[1255]: time="2024-12-13T02:36:35.062544053Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c8bdeac2590c99c1a77e33995423ddb6633ff90a82a2aa455442e0a8079ef8c7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:35.062998 env[1255]: time="2024-12-13T02:36:35.062981705Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.8\" returns image reference \"sha256:eb53b988d5e03f329b5fdba21cbbbae48e1619b199689e7448095b31843b2c43\"" Dec 13 02:36:35.069030 env[1255]: time="2024-12-13T02:36:35.069014343Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\"" Dec 13 02:36:36.347929 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2415272988.mount: Deactivated successfully. Dec 13 02:36:37.070273 env[1255]: time="2024-12-13T02:36:37.070236940Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:37.096648 env[1255]: time="2024-12-13T02:36:37.096623613Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:37.103230 env[1255]: time="2024-12-13T02:36:37.103216830Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:37.112076 env[1255]: time="2024-12-13T02:36:37.112058880Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6d6be9417e22af78905000ac4fd134896bacd2188ea63c7cac8edd7a5d7e9b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:37.112421 env[1255]: time="2024-12-13T02:36:37.112402056Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\" returns image reference \"sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2\"" Dec 13 02:36:37.119551 env[1255]: time="2024-12-13T02:36:37.119525583Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 02:36:37.715531 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1085652226.mount: Deactivated successfully. Dec 13 02:36:38.550822 env[1255]: time="2024-12-13T02:36:38.550780840Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:38.569913 env[1255]: time="2024-12-13T02:36:38.569873273Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:38.577919 env[1255]: time="2024-12-13T02:36:38.577887067Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:38.587326 env[1255]: time="2024-12-13T02:36:38.587305687Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:38.587888 env[1255]: time="2024-12-13T02:36:38.587868855Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 02:36:38.595301 env[1255]: time="2024-12-13T02:36:38.595276852Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Dec 13 02:36:39.100956 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount111239943.mount: Deactivated successfully. Dec 13 02:36:39.122026 env[1255]: time="2024-12-13T02:36:39.122006700Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:39.126234 env[1255]: time="2024-12-13T02:36:39.126221094Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:39.127486 env[1255]: time="2024-12-13T02:36:39.127469761Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:39.128733 env[1255]: time="2024-12-13T02:36:39.128718880Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:39.129739 env[1255]: time="2024-12-13T02:36:39.129719686Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Dec 13 02:36:39.139678 env[1255]: time="2024-12-13T02:36:39.139651999Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" Dec 13 02:36:39.662734 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2993286870.mount: Deactivated successfully. Dec 13 02:36:39.867717 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Dec 13 02:36:39.873810 kernel: kauditd_printk_skb: 88 callbacks suppressed Dec 13 02:36:39.873884 kernel: audit: type=1130 audit(1734057399.866:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:39.873908 kernel: audit: type=1131 audit(1734057399.866:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:39.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:39.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:39.867965 systemd[1]: Stopped kubelet.service. Dec 13 02:36:39.870241 systemd[1]: Starting kubelet.service... Dec 13 02:36:40.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:40.318349 systemd[1]: Started kubelet.service. Dec 13 02:36:40.322245 kernel: audit: type=1130 audit(1734057400.317:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:40.417793 kubelet[1686]: E1213 02:36:40.417756 1686 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:36:40.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:36:40.418990 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:36:40.419082 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:36:40.422219 kernel: audit: type=1131 audit(1734057400.418:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:36:42.521951 env[1255]: time="2024-12-13T02:36:42.521917917Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:42.538891 env[1255]: time="2024-12-13T02:36:42.538865590Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:42.545625 env[1255]: time="2024-12-13T02:36:42.545602649Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:42.557579 env[1255]: time="2024-12-13T02:36:42.557558837Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:42.558132 env[1255]: time="2024-12-13T02:36:42.558110847Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899\"" Dec 13 02:36:45.199989 systemd[1]: Stopped kubelet.service. Dec 13 02:36:45.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:45.199000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:45.203802 systemd[1]: Starting kubelet.service... Dec 13 02:36:45.205716 kernel: audit: type=1130 audit(1734057405.199:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:45.205766 kernel: audit: type=1131 audit(1734057405.199:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:45.224401 systemd[1]: Reloading. Dec 13 02:36:45.273522 /usr/lib/systemd/system-generators/torcx-generator[1777]: time="2024-12-13T02:36:45Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:36:45.273539 /usr/lib/systemd/system-generators/torcx-generator[1777]: time="2024-12-13T02:36:45Z" level=info msg="torcx already run" Dec 13 02:36:45.330495 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:36:45.330608 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:36:45.342338 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:36:45.393172 kernel: audit: type=1400 audit(1734057405.384:257): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.393248 kernel: audit: type=1400 audit(1734057405.384:258): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.393281 kernel: audit: type=1400 audit(1734057405.387:259): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.384000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.398228 kernel: audit: type=1400 audit(1734057405.387:260): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.398269 kernel: audit: type=1400 audit(1734057405.387:261): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.400713 kernel: audit: type=1400 audit(1734057405.387:262): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.403164 kernel: audit: type=1400 audit(1734057405.387:263): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.392000 audit: BPF prog-id=43 op=LOAD Dec 13 02:36:45.392000 audit: BPF prog-id=41 op=UNLOAD Dec 13 02:36:45.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.395000 audit: BPF prog-id=44 op=LOAD Dec 13 02:36:45.395000 audit: BPF prog-id=36 op=UNLOAD Dec 13 02:36:45.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.406227 kernel: audit: type=1400 audit(1734057405.387:264): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.397000 audit: BPF prog-id=45 op=LOAD Dec 13 02:36:45.397000 audit: BPF prog-id=27 op=UNLOAD Dec 13 02:36:45.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.402000 audit: BPF prog-id=46 op=LOAD Dec 13 02:36:45.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.402000 audit: BPF prog-id=47 op=LOAD Dec 13 02:36:45.402000 audit: BPF prog-id=28 op=UNLOAD Dec 13 02:36:45.402000 audit: BPF prog-id=29 op=UNLOAD Dec 13 02:36:45.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.402000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.402000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit: BPF prog-id=48 op=LOAD Dec 13 02:36:45.405000 audit: BPF prog-id=38 op=UNLOAD Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit: BPF prog-id=53 op=LOAD Dec 13 02:36:45.405000 audit: BPF prog-id=32 op=UNLOAD Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit: BPF prog-id=54 op=LOAD Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit: BPF prog-id=34 op=UNLOAD Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.406000 audit: BPF prog-id=56 op=LOAD Dec 13 02:36:45.406000 audit: BPF prog-id=37 op=UNLOAD Dec 13 02:36:45.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:45.406000 audit: BPF prog-id=57 op=LOAD Dec 13 02:36:45.406000 audit: BPF prog-id=35 op=UNLOAD Dec 13 02:36:45.425471 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 02:36:45.425522 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 02:36:45.425728 systemd[1]: Stopped kubelet.service. Dec 13 02:36:45.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:36:45.427328 systemd[1]: Starting kubelet.service... Dec 13 02:36:46.597160 systemd[1]: Started kubelet.service. Dec 13 02:36:46.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:46.729607 kubelet[1841]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:36:46.729607 kubelet[1841]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 02:36:46.729607 kubelet[1841]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:36:46.731792 kubelet[1841]: I1213 02:36:46.731753 1841 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 02:36:47.009188 kubelet[1841]: I1213 02:36:47.009162 1841 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 02:36:47.009188 kubelet[1841]: I1213 02:36:47.009181 1841 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 02:36:47.009342 kubelet[1841]: I1213 02:36:47.009329 1841 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 02:36:47.039566 kubelet[1841]: E1213 02:36:47.039547 1841 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://139.178.70.101:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 139.178.70.101:6443: connect: connection refused Dec 13 02:36:47.040682 kubelet[1841]: I1213 02:36:47.040670 1841 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 02:36:47.047895 kubelet[1841]: I1213 02:36:47.047884 1841 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 02:36:47.049871 kubelet[1841]: I1213 02:36:47.049849 1841 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 02:36:47.050066 kubelet[1841]: I1213 02:36:47.049932 1841 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 02:36:47.052490 kubelet[1841]: I1213 02:36:47.052476 1841 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 02:36:47.053809 kubelet[1841]: I1213 02:36:47.053797 1841 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 02:36:47.054537 kubelet[1841]: I1213 02:36:47.054525 1841 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:36:47.055391 kubelet[1841]: I1213 02:36:47.055379 1841 kubelet.go:400] "Attempting to sync node with API server" Dec 13 02:36:47.055422 kubelet[1841]: I1213 02:36:47.055392 1841 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 02:36:47.055422 kubelet[1841]: I1213 02:36:47.055405 1841 kubelet.go:312] "Adding apiserver pod source" Dec 13 02:36:47.055422 kubelet[1841]: I1213 02:36:47.055418 1841 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 02:36:47.058891 kubelet[1841]: W1213 02:36:47.058743 1841 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://139.178.70.101:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.101:6443: connect: connection refused Dec 13 02:36:47.058891 kubelet[1841]: E1213 02:36:47.058777 1841 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.70.101:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.101:6443: connect: connection refused Dec 13 02:36:47.060505 kubelet[1841]: W1213 02:36:47.060474 1841 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://139.178.70.101:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.101:6443: connect: connection refused Dec 13 02:36:47.060588 kubelet[1841]: E1213 02:36:47.060579 1841 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.70.101:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.101:6443: connect: connection refused Dec 13 02:36:47.061486 kubelet[1841]: I1213 02:36:47.061475 1841 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 02:36:47.067527 kubelet[1841]: I1213 02:36:47.067516 1841 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 02:36:47.067614 kubelet[1841]: W1213 02:36:47.067602 1841 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 02:36:47.069741 kubelet[1841]: I1213 02:36:47.069732 1841 server.go:1264] "Started kubelet" Dec 13 02:36:47.070826 kubelet[1841]: I1213 02:36:47.070805 1841 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 02:36:47.073442 kubelet[1841]: I1213 02:36:47.073245 1841 server.go:455] "Adding debug handlers to kubelet server" Dec 13 02:36:47.076000 audit[1841]: AVC avc: denied { mac_admin } for pid=1841 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:47.076000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:36:47.076000 audit[1841]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00040d9b0 a1=c000562270 a2=c00040d980 a3=25 items=0 ppid=1 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:47.076000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:36:47.076000 audit[1841]: AVC avc: denied { mac_admin } for pid=1841 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:47.076000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:36:47.076000 audit[1841]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000157d80 a1=c000562288 a2=c00040dad0 a3=25 items=0 ppid=1 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:47.076000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:36:47.078429 kubelet[1841]: I1213 02:36:47.077935 1841 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 02:36:47.078429 kubelet[1841]: I1213 02:36:47.077973 1841 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 02:36:47.078429 kubelet[1841]: I1213 02:36:47.078007 1841 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 02:36:47.079441 kubelet[1841]: I1213 02:36:47.079409 1841 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 02:36:47.079581 kubelet[1841]: I1213 02:36:47.079573 1841 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 02:36:47.081577 kubelet[1841]: E1213 02:36:47.081520 1841 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://139.178.70.101:6443/api/v1/namespaces/default/events\": dial tcp 139.178.70.101:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.18109c06388689d5 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2024-12-13 02:36:47.069718997 +0000 UTC m=+0.469142344,LastTimestamp:2024-12-13 02:36:47.069718997 +0000 UTC m=+0.469142344,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Dec 13 02:36:47.082357 kubelet[1841]: E1213 02:36:47.082347 1841 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 02:36:47.082000 audit[1852]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1852 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:36:47.082000 audit[1852]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff5ed43b80 a2=0 a3=7fff5ed43b6c items=0 ppid=1841 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:47.082000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 02:36:47.082000 audit[1853]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1853 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:36:47.082000 audit[1853]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc130f03f0 a2=0 a3=7ffc130f03dc items=0 ppid=1841 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:47.082000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 02:36:47.084747 kubelet[1841]: I1213 02:36:47.084713 1841 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 02:36:47.085123 kubelet[1841]: E1213 02:36:47.085108 1841 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.101:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.101:6443: connect: connection refused" interval="200ms" Dec 13 02:36:47.085287 kubelet[1841]: I1213 02:36:47.085276 1841 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 02:36:47.084000 audit[1855]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1855 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:36:47.084000 audit[1855]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdb0f0a7c0 a2=0 a3=7ffdb0f0a7ac items=0 ppid=1841 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:47.084000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:36:47.086134 kubelet[1841]: I1213 02:36:47.086112 1841 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 02:36:47.086173 kubelet[1841]: I1213 02:36:47.086154 1841 reconciler.go:26] "Reconciler: start to sync state" Dec 13 02:36:47.086322 kubelet[1841]: I1213 02:36:47.086314 1841 factory.go:221] Registration of the containerd container factory successfully Dec 13 02:36:47.086367 kubelet[1841]: I1213 02:36:47.086359 1841 factory.go:221] Registration of the systemd container factory successfully Dec 13 02:36:47.085000 audit[1857]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1857 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:36:47.085000 audit[1857]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd3f9951a0 a2=0 a3=7ffd3f99518c items=0 ppid=1841 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:47.085000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:36:47.093000 audit[1860]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1860 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:36:47.093000 audit[1860]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffeff012ae0 a2=0 a3=7ffeff012acc items=0 ppid=1841 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:47.093000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 02:36:47.094418 kubelet[1841]: I1213 02:36:47.094368 1841 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 02:36:47.093000 audit[1861]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1861 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:36:47.093000 audit[1861]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffec1225550 a2=0 a3=7ffec122553c items=0 ppid=1841 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:47.093000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 02:36:47.095117 kubelet[1841]: I1213 02:36:47.095105 1841 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 02:36:47.095117 kubelet[1841]: I1213 02:36:47.095117 1841 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 02:36:47.095156 kubelet[1841]: I1213 02:36:47.095127 1841 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 02:36:47.095175 kubelet[1841]: E1213 02:36:47.095146 1841 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 02:36:47.094000 audit[1862]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1862 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:36:47.094000 audit[1862]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda4edd890 a2=0 a3=7ffda4edd87c items=0 ppid=1841 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:47.094000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 02:36:47.095000 audit[1864]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1864 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:36:47.095000 audit[1864]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff5e8389f0 a2=0 a3=7fff5e8389dc items=0 ppid=1841 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:47.095000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 02:36:47.096000 audit[1865]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1865 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:36:47.096000 audit[1865]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff86e294e0 a2=0 a3=7fff86e294cc items=0 ppid=1841 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:47.096000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 02:36:47.097000 audit[1866]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1866 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:36:47.097000 audit[1866]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe772b01d0 a2=0 a3=7ffe772b01bc items=0 ppid=1841 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:47.097000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 02:36:47.097000 audit[1867]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1867 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:36:47.097000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffdfdb9e0e0 a2=0 a3=7ffdfdb9e0cc items=0 ppid=1841 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:47.097000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 02:36:47.098000 audit[1868]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1868 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:36:47.098000 audit[1868]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe372d3210 a2=0 a3=7ffe372d31fc items=0 ppid=1841 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:47.098000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 02:36:47.100348 kubelet[1841]: W1213 02:36:47.100213 1841 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://139.178.70.101:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.101:6443: connect: connection refused Dec 13 02:36:47.100348 kubelet[1841]: E1213 02:36:47.100244 1841 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.70.101:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.101:6443: connect: connection refused Dec 13 02:36:47.100348 kubelet[1841]: W1213 02:36:47.100278 1841 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://139.178.70.101:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.101:6443: connect: connection refused Dec 13 02:36:47.100348 kubelet[1841]: E1213 02:36:47.100295 1841 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.70.101:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.101:6443: connect: connection refused Dec 13 02:36:47.108837 kubelet[1841]: I1213 02:36:47.108827 1841 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 02:36:47.108897 kubelet[1841]: I1213 02:36:47.108889 1841 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 02:36:47.108951 kubelet[1841]: I1213 02:36:47.108944 1841 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:36:47.109892 kubelet[1841]: I1213 02:36:47.109884 1841 policy_none.go:49] "None policy: Start" Dec 13 02:36:47.110226 kubelet[1841]: I1213 02:36:47.110215 1841 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 02:36:47.110316 kubelet[1841]: I1213 02:36:47.110310 1841 state_mem.go:35] "Initializing new in-memory state store" Dec 13 02:36:47.112967 systemd[1]: Created slice kubepods.slice. Dec 13 02:36:47.115674 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 02:36:47.117868 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 02:36:47.122000 audit[1841]: AVC avc: denied { mac_admin } for pid=1841 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:47.122000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:36:47.122000 audit[1841]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ef8390 a1=c000ed8dc8 a2=c000ef8360 a3=25 items=0 ppid=1 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:47.122000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:36:47.124009 kubelet[1841]: I1213 02:36:47.123722 1841 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 02:36:47.124009 kubelet[1841]: I1213 02:36:47.123882 1841 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 02:36:47.124059 kubelet[1841]: I1213 02:36:47.123998 1841 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 02:36:47.124235 kubelet[1841]: I1213 02:36:47.124163 1841 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 02:36:47.125839 kubelet[1841]: E1213 02:36:47.125822 1841 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Dec 13 02:36:47.185958 kubelet[1841]: I1213 02:36:47.185936 1841 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 02:36:47.186207 kubelet[1841]: E1213 02:36:47.186184 1841 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://139.178.70.101:6443/api/v1/nodes\": dial tcp 139.178.70.101:6443: connect: connection refused" node="localhost" Dec 13 02:36:47.195430 kubelet[1841]: I1213 02:36:47.195373 1841 topology_manager.go:215] "Topology Admit Handler" podUID="3518a4e8451bdfb5a3a5f6cbc425cac4" podNamespace="kube-system" podName="kube-apiserver-localhost" Dec 13 02:36:47.195903 kubelet[1841]: I1213 02:36:47.195884 1841 topology_manager.go:215] "Topology Admit Handler" podUID="8a50003978138b3ab9890682eff4eae8" podNamespace="kube-system" podName="kube-controller-manager-localhost" Dec 13 02:36:47.196419 kubelet[1841]: I1213 02:36:47.196408 1841 topology_manager.go:215] "Topology Admit Handler" podUID="b107a98bcf27297d642d248711a3fc70" podNamespace="kube-system" podName="kube-scheduler-localhost" Dec 13 02:36:47.200465 systemd[1]: Created slice kubepods-burstable-podb107a98bcf27297d642d248711a3fc70.slice. Dec 13 02:36:47.207862 systemd[1]: Created slice kubepods-burstable-pod3518a4e8451bdfb5a3a5f6cbc425cac4.slice. Dec 13 02:36:47.213722 systemd[1]: Created slice kubepods-burstable-pod8a50003978138b3ab9890682eff4eae8.slice. Dec 13 02:36:47.289234 kubelet[1841]: E1213 02:36:47.286494 1841 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.101:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.101:6443: connect: connection refused" interval="400ms" Dec 13 02:36:47.386718 kubelet[1841]: I1213 02:36:47.386685 1841 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/3518a4e8451bdfb5a3a5f6cbc425cac4-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"3518a4e8451bdfb5a3a5f6cbc425cac4\") " pod="kube-system/kube-apiserver-localhost" Dec 13 02:36:47.386718 kubelet[1841]: I1213 02:36:47.386720 1841 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:36:47.386863 kubelet[1841]: I1213 02:36:47.386757 1841 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b107a98bcf27297d642d248711a3fc70-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"b107a98bcf27297d642d248711a3fc70\") " pod="kube-system/kube-scheduler-localhost" Dec 13 02:36:47.386863 kubelet[1841]: I1213 02:36:47.386779 1841 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/3518a4e8451bdfb5a3a5f6cbc425cac4-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"3518a4e8451bdfb5a3a5f6cbc425cac4\") " pod="kube-system/kube-apiserver-localhost" Dec 13 02:36:47.386863 kubelet[1841]: I1213 02:36:47.386791 1841 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:36:47.386863 kubelet[1841]: I1213 02:36:47.386802 1841 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/3518a4e8451bdfb5a3a5f6cbc425cac4-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"3518a4e8451bdfb5a3a5f6cbc425cac4\") " pod="kube-system/kube-apiserver-localhost" Dec 13 02:36:47.386863 kubelet[1841]: I1213 02:36:47.386812 1841 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:36:47.386981 kubelet[1841]: I1213 02:36:47.386823 1841 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:36:47.386981 kubelet[1841]: I1213 02:36:47.386835 1841 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:36:47.387907 kubelet[1841]: I1213 02:36:47.387885 1841 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 02:36:47.388092 kubelet[1841]: E1213 02:36:47.388073 1841 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://139.178.70.101:6443/api/v1/nodes\": dial tcp 139.178.70.101:6443: connect: connection refused" node="localhost" Dec 13 02:36:47.507977 env[1255]: time="2024-12-13T02:36:47.507942944Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:b107a98bcf27297d642d248711a3fc70,Namespace:kube-system,Attempt:0,}" Dec 13 02:36:47.509876 env[1255]: time="2024-12-13T02:36:47.509703103Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:3518a4e8451bdfb5a3a5f6cbc425cac4,Namespace:kube-system,Attempt:0,}" Dec 13 02:36:47.515867 env[1255]: time="2024-12-13T02:36:47.515707788Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:8a50003978138b3ab9890682eff4eae8,Namespace:kube-system,Attempt:0,}" Dec 13 02:36:47.686912 kubelet[1841]: E1213 02:36:47.686886 1841 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.101:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.101:6443: connect: connection refused" interval="800ms" Dec 13 02:36:47.788876 kubelet[1841]: I1213 02:36:47.788856 1841 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 02:36:47.789313 kubelet[1841]: E1213 02:36:47.789300 1841 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://139.178.70.101:6443/api/v1/nodes\": dial tcp 139.178.70.101:6443: connect: connection refused" node="localhost" Dec 13 02:36:47.931013 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3590770946.mount: Deactivated successfully. Dec 13 02:36:47.933872 env[1255]: time="2024-12-13T02:36:47.933843413Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:47.935335 env[1255]: time="2024-12-13T02:36:47.935315402Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:47.937333 env[1255]: time="2024-12-13T02:36:47.937096348Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:47.937617 env[1255]: time="2024-12-13T02:36:47.937601860Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:47.939768 env[1255]: time="2024-12-13T02:36:47.939752716Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:47.941468 env[1255]: time="2024-12-13T02:36:47.941452374Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:47.942007 env[1255]: time="2024-12-13T02:36:47.941990495Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:47.943071 env[1255]: time="2024-12-13T02:36:47.943057778Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:47.943799 env[1255]: time="2024-12-13T02:36:47.943786994Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:47.944545 env[1255]: time="2024-12-13T02:36:47.944531918Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:47.944940 env[1255]: time="2024-12-13T02:36:47.944928704Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:47.945404 env[1255]: time="2024-12-13T02:36:47.945392362Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:36:47.966404 env[1255]: time="2024-12-13T02:36:47.958296814Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:36:47.966404 env[1255]: time="2024-12-13T02:36:47.958313774Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:36:47.966404 env[1255]: time="2024-12-13T02:36:47.958320260Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:36:47.966404 env[1255]: time="2024-12-13T02:36:47.958425143Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/96dd4bed3011202cf96b770b814e6297b6cad3b0d83310e8db4e4a73acba2d61 pid=1888 runtime=io.containerd.runc.v2 Dec 13 02:36:47.966404 env[1255]: time="2024-12-13T02:36:47.956897691Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:36:47.966404 env[1255]: time="2024-12-13T02:36:47.956919892Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:36:47.966404 env[1255]: time="2024-12-13T02:36:47.956926805Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:36:47.966404 env[1255]: time="2024-12-13T02:36:47.957013313Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7ad8fe96fef6acadddf7a46b690423ae1429eb2c4ed2ab2b19436839643723d9 pid=1880 runtime=io.containerd.runc.v2 Dec 13 02:36:47.984153 env[1255]: time="2024-12-13T02:36:47.984103149Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:36:47.984256 env[1255]: time="2024-12-13T02:36:47.984169083Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:36:47.984256 env[1255]: time="2024-12-13T02:36:47.984186495Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:36:47.984429 env[1255]: time="2024-12-13T02:36:47.984390665Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e0536e1aa61bc40d8f3b27e5246d9cef9a8315712df4a7c92c7b743a6c8e5151 pid=1920 runtime=io.containerd.runc.v2 Dec 13 02:36:47.988056 systemd[1]: Started cri-containerd-96dd4bed3011202cf96b770b814e6297b6cad3b0d83310e8db4e4a73acba2d61.scope. Dec 13 02:36:47.991530 systemd[1]: Started cri-containerd-7ad8fe96fef6acadddf7a46b690423ae1429eb2c4ed2ab2b19436839643723d9.scope. Dec 13 02:36:47.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:47.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:47.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:47.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:47.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:47.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:47.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:47.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:47.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:47.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:47.998000 audit: BPF prog-id=58 op=LOAD Dec 13 02:36:47.999000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:47.999000 audit[1906]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1888 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:47.999000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936646434626564333031313230326366393662373730623831346536 Dec 13 02:36:47.999000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:47.999000 audit[1906]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1888 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:47.999000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936646434626564333031313230326366393662373730623831346536 Dec 13 02:36:47.999000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:47.999000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:47.999000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:47.999000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:47.999000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:47.999000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:47.999000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:47.999000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:47.999000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:47.999000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:47.999000 audit: BPF prog-id=59 op=LOAD Dec 13 02:36:47.999000 audit[1906]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025550 items=0 ppid=1888 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:47.999000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936646434626564333031313230326366393662373730623831346536 Dec 13 02:36:48.000000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.000000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.000000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.000000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.000000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.000000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.000000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.000000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.000000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.000000 audit: BPF prog-id=60 op=LOAD Dec 13 02:36:48.000000 audit[1906]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025598 items=0 ppid=1888 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:48.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936646434626564333031313230326366393662373730623831346536 Dec 13 02:36:48.000000 audit: BPF prog-id=60 op=UNLOAD Dec 13 02:36:48.002000 audit: BPF prog-id=59 op=UNLOAD Dec 13 02:36:48.002000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.002000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.002000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.002000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.002000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.002000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.002000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.002000 audit[1906]: AVC avc: denied { perfmon } for pid=1906 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.002000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.002000 audit[1906]: AVC avc: denied { bpf } for pid=1906 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.002000 audit: BPF prog-id=61 op=LOAD Dec 13 02:36:48.002000 audit[1906]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000259a8 items=0 ppid=1888 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:48.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936646434626564333031313230326366393662373730623831346536 Dec 13 02:36:48.013048 systemd[1]: Started cri-containerd-e0536e1aa61bc40d8f3b27e5246d9cef9a8315712df4a7c92c7b743a6c8e5151.scope. Dec 13 02:36:48.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.011000 audit: BPF prog-id=62 op=LOAD Dec 13 02:36:48.012000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.012000 audit[1909]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1880 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:48.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761643866653936666566366163616464646637613436623639303432 Dec 13 02:36:48.012000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.012000 audit[1909]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1880 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:48.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761643866653936666566366163616464646637613436623639303432 Dec 13 02:36:48.012000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.012000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.012000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.012000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.012000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.012000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.012000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.012000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.012000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.012000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.012000 audit: BPF prog-id=63 op=LOAD Dec 13 02:36:48.012000 audit[1909]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c0090 items=0 ppid=1880 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:48.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761643866653936666566366163616464646637613436623639303432 Dec 13 02:36:48.012000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.012000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.012000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.012000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.012000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.012000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.012000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.012000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.012000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.012000 audit: BPF prog-id=64 op=LOAD Dec 13 02:36:48.012000 audit[1909]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c00d8 items=0 ppid=1880 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:48.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761643866653936666566366163616464646637613436623639303432 Dec 13 02:36:48.012000 audit: BPF prog-id=64 op=UNLOAD Dec 13 02:36:48.012000 audit: BPF prog-id=63 op=UNLOAD Dec 13 02:36:48.012000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.012000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.012000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.012000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.012000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.012000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.012000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.012000 audit[1909]: AVC avc: denied { perfmon } for pid=1909 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.012000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.012000 audit[1909]: AVC avc: denied { bpf } for pid=1909 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.012000 audit: BPF prog-id=65 op=LOAD Dec 13 02:36:48.012000 audit[1909]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c04e8 items=0 ppid=1880 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:48.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761643866653936666566366163616464646637613436623639303432 Dec 13 02:36:48.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.022000 audit: BPF prog-id=66 op=LOAD Dec 13 02:36:48.022000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.022000 audit[1936]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1920 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:48.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530353336653161613631626334306438663362323765353234366439 Dec 13 02:36:48.022000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.022000 audit[1936]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1920 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:48.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530353336653161613631626334306438663362323765353234366439 Dec 13 02:36:48.022000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.022000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.022000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.022000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.022000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.022000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.022000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.022000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.022000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.022000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.022000 audit: BPF prog-id=67 op=LOAD Dec 13 02:36:48.022000 audit[1936]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001a8c20 items=0 ppid=1920 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:48.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530353336653161613631626334306438663362323765353234366439 Dec 13 02:36:48.022000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.022000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.022000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.022000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.022000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.022000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.022000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.022000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.022000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.022000 audit: BPF prog-id=68 op=LOAD Dec 13 02:36:48.022000 audit[1936]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001a8c68 items=0 ppid=1920 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:48.022000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530353336653161613631626334306438663362323765353234366439 Dec 13 02:36:48.022000 audit: BPF prog-id=68 op=UNLOAD Dec 13 02:36:48.022000 audit: BPF prog-id=67 op=UNLOAD Dec 13 02:36:48.023000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.023000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.023000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.023000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.023000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.023000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.023000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.023000 audit[1936]: AVC avc: denied { perfmon } for pid=1936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.023000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.023000 audit[1936]: AVC avc: denied { bpf } for pid=1936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.023000 audit: BPF prog-id=69 op=LOAD Dec 13 02:36:48.023000 audit[1936]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001a9078 items=0 ppid=1920 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:48.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530353336653161613631626334306438663362323765353234366439 Dec 13 02:36:48.031774 env[1255]: time="2024-12-13T02:36:48.031744242Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:8a50003978138b3ab9890682eff4eae8,Namespace:kube-system,Attempt:0,} returns sandbox id \"96dd4bed3011202cf96b770b814e6297b6cad3b0d83310e8db4e4a73acba2d61\"" Dec 13 02:36:48.036038 env[1255]: time="2024-12-13T02:36:48.036020182Z" level=info msg="CreateContainer within sandbox \"96dd4bed3011202cf96b770b814e6297b6cad3b0d83310e8db4e4a73acba2d61\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 02:36:48.054681 kubelet[1841]: W1213 02:36:48.054621 1841 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://139.178.70.101:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.101:6443: connect: connection refused Dec 13 02:36:48.054681 kubelet[1841]: E1213 02:36:48.054660 1841 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.70.101:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.101:6443: connect: connection refused Dec 13 02:36:48.056691 env[1255]: time="2024-12-13T02:36:48.056665177Z" level=info msg="CreateContainer within sandbox \"96dd4bed3011202cf96b770b814e6297b6cad3b0d83310e8db4e4a73acba2d61\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"222073afbc06743f6cf45296fc9297a027b26bec9eb97a1fd02b9c65ac4c5702\"" Dec 13 02:36:48.057034 env[1255]: time="2024-12-13T02:36:48.057016005Z" level=info msg="StartContainer for \"222073afbc06743f6cf45296fc9297a027b26bec9eb97a1fd02b9c65ac4c5702\"" Dec 13 02:36:48.060467 env[1255]: time="2024-12-13T02:36:48.060442742Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:b107a98bcf27297d642d248711a3fc70,Namespace:kube-system,Attempt:0,} returns sandbox id \"7ad8fe96fef6acadddf7a46b690423ae1429eb2c4ed2ab2b19436839643723d9\"" Dec 13 02:36:48.062385 env[1255]: time="2024-12-13T02:36:48.062361286Z" level=info msg="CreateContainer within sandbox \"7ad8fe96fef6acadddf7a46b690423ae1429eb2c4ed2ab2b19436839643723d9\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 02:36:48.067952 env[1255]: time="2024-12-13T02:36:48.067921866Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:3518a4e8451bdfb5a3a5f6cbc425cac4,Namespace:kube-system,Attempt:0,} returns sandbox id \"e0536e1aa61bc40d8f3b27e5246d9cef9a8315712df4a7c92c7b743a6c8e5151\"" Dec 13 02:36:48.069488 env[1255]: time="2024-12-13T02:36:48.069464182Z" level=info msg="CreateContainer within sandbox \"e0536e1aa61bc40d8f3b27e5246d9cef9a8315712df4a7c92c7b743a6c8e5151\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 02:36:48.075036 systemd[1]: Started cri-containerd-222073afbc06743f6cf45296fc9297a027b26bec9eb97a1fd02b9c65ac4c5702.scope. Dec 13 02:36:48.077385 env[1255]: time="2024-12-13T02:36:48.076131186Z" level=info msg="CreateContainer within sandbox \"7ad8fe96fef6acadddf7a46b690423ae1429eb2c4ed2ab2b19436839643723d9\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"40c5066cb514558a5d736cebb4755a4ac08b2dc9af945b7d94533b65af10bc11\"" Dec 13 02:36:48.078513 env[1255]: time="2024-12-13T02:36:48.078487362Z" level=info msg="StartContainer for \"40c5066cb514558a5d736cebb4755a4ac08b2dc9af945b7d94533b65af10bc11\"" Dec 13 02:36:48.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.084000 audit: BPF prog-id=70 op=LOAD Dec 13 02:36:48.084000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.084000 audit[1997]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1888 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:48.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232323037336166626330363734336636636634353239366663393239 Dec 13 02:36:48.084000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.084000 audit[1997]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1888 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:48.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232323037336166626330363734336636636634353239366663393239 Dec 13 02:36:48.085000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.085000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.085000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.085000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.085000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.085000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.085000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.085000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.085000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.085000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.085000 audit: BPF prog-id=71 op=LOAD Dec 13 02:36:48.085000 audit[1997]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00020eb70 items=0 ppid=1888 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:48.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232323037336166626330363734336636636634353239366663393239 Dec 13 02:36:48.086000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.086000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.086000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.086000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.086000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.086000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.086000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.086000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.086000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.086000 audit: BPF prog-id=72 op=LOAD Dec 13 02:36:48.086000 audit[1997]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00020ebb8 items=0 ppid=1888 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:48.086000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232323037336166626330363734336636636634353239366663393239 Dec 13 02:36:48.087000 audit: BPF prog-id=72 op=UNLOAD Dec 13 02:36:48.087000 audit: BPF prog-id=71 op=UNLOAD Dec 13 02:36:48.087000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.087000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.087000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.087000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.087000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.087000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.087000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.087000 audit[1997]: AVC avc: denied { perfmon } for pid=1997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.087000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.087000 audit[1997]: AVC avc: denied { bpf } for pid=1997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.087000 audit: BPF prog-id=73 op=LOAD Dec 13 02:36:48.087000 audit[1997]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00020efc8 items=0 ppid=1888 pid=1997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:48.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232323037336166626330363734336636636634353239366663393239 Dec 13 02:36:48.090530 env[1255]: time="2024-12-13T02:36:48.090503363Z" level=info msg="CreateContainer within sandbox \"e0536e1aa61bc40d8f3b27e5246d9cef9a8315712df4a7c92c7b743a6c8e5151\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"d6173b911cb4e8235a790410bbbd6a1bfa788ee79574a0d3e41388ef5e2d46b3\"" Dec 13 02:36:48.090894 env[1255]: time="2024-12-13T02:36:48.090882428Z" level=info msg="StartContainer for \"d6173b911cb4e8235a790410bbbd6a1bfa788ee79574a0d3e41388ef5e2d46b3\"" Dec 13 02:36:48.104639 systemd[1]: Started cri-containerd-40c5066cb514558a5d736cebb4755a4ac08b2dc9af945b7d94533b65af10bc11.scope. Dec 13 02:36:48.110850 systemd[1]: Started cri-containerd-d6173b911cb4e8235a790410bbbd6a1bfa788ee79574a0d3e41388ef5e2d46b3.scope. Dec 13 02:36:48.123479 env[1255]: time="2024-12-13T02:36:48.123455718Z" level=info msg="StartContainer for \"222073afbc06743f6cf45296fc9297a027b26bec9eb97a1fd02b9c65ac4c5702\" returns successfully" Dec 13 02:36:48.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.127000 audit: BPF prog-id=74 op=LOAD Dec 13 02:36:48.128000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.128000 audit[2043]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1920 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:48.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436313733623931316362346538323335613739303431306262626436 Dec 13 02:36:48.128000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.128000 audit[2043]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1920 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:48.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436313733623931316362346538323335613739303431306262626436 Dec 13 02:36:48.128000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.128000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.128000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.128000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.128000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.128000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.128000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.128000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.128000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.128000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.128000 audit: BPF prog-id=75 op=LOAD Dec 13 02:36:48.128000 audit[2043]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001e5f70 items=0 ppid=1920 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:48.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436313733623931316362346538323335613739303431306262626436 Dec 13 02:36:48.128000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.128000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.128000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.128000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.128000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.128000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.128000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.128000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.128000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.128000 audit: BPF prog-id=76 op=LOAD Dec 13 02:36:48.128000 audit[2043]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001e5fb8 items=0 ppid=1920 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:48.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436313733623931316362346538323335613739303431306262626436 Dec 13 02:36:48.128000 audit: BPF prog-id=76 op=UNLOAD Dec 13 02:36:48.128000 audit: BPF prog-id=75 op=UNLOAD Dec 13 02:36:48.128000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.128000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.128000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.128000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.128000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.128000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.128000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.128000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.128000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.128000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.128000 audit: BPF prog-id=77 op=LOAD Dec 13 02:36:48.128000 audit[2043]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003cc3c8 items=0 ppid=1920 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:48.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436313733623931316362346538323335613739303431306262626436 Dec 13 02:36:48.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.131000 audit: BPF prog-id=78 op=LOAD Dec 13 02:36:48.132000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.132000 audit[2027]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1880 pid=2027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:48.132000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430633530363663623531343535386135643733366365626234373535 Dec 13 02:36:48.132000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.132000 audit[2027]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1880 pid=2027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:48.132000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430633530363663623531343535386135643733366365626234373535 Dec 13 02:36:48.132000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.132000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.132000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.132000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.132000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.132000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.132000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.132000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.132000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.132000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.132000 audit: BPF prog-id=79 op=LOAD Dec 13 02:36:48.132000 audit[2027]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003147b0 items=0 ppid=1880 pid=2027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:48.132000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430633530363663623531343535386135643733366365626234373535 Dec 13 02:36:48.132000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.132000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.132000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.132000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.132000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.132000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.132000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.132000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.132000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.132000 audit: BPF prog-id=80 op=LOAD Dec 13 02:36:48.132000 audit[2027]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003147f8 items=0 ppid=1880 pid=2027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:48.132000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430633530363663623531343535386135643733366365626234373535 Dec 13 02:36:48.132000 audit: BPF prog-id=80 op=UNLOAD Dec 13 02:36:48.132000 audit: BPF prog-id=79 op=UNLOAD Dec 13 02:36:48.132000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.132000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.132000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.132000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.132000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.132000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.132000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.132000 audit[2027]: AVC avc: denied { perfmon } for pid=2027 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.132000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.132000 audit[2027]: AVC avc: denied { bpf } for pid=2027 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:48.132000 audit: BPF prog-id=81 op=LOAD Dec 13 02:36:48.132000 audit[2027]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000314c08 items=0 ppid=1880 pid=2027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:48.132000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430633530363663623531343535386135643733366365626234373535 Dec 13 02:36:48.152616 env[1255]: time="2024-12-13T02:36:48.152588470Z" level=info msg="StartContainer for \"d6173b911cb4e8235a790410bbbd6a1bfa788ee79574a0d3e41388ef5e2d46b3\" returns successfully" Dec 13 02:36:48.162479 env[1255]: time="2024-12-13T02:36:48.162457178Z" level=info msg="StartContainer for \"40c5066cb514558a5d736cebb4755a4ac08b2dc9af945b7d94533b65af10bc11\" returns successfully" Dec 13 02:36:48.171298 kubelet[1841]: W1213 02:36:48.171233 1841 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://139.178.70.101:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.101:6443: connect: connection refused Dec 13 02:36:48.171298 kubelet[1841]: E1213 02:36:48.171275 1841 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.70.101:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.101:6443: connect: connection refused Dec 13 02:36:48.259912 kubelet[1841]: W1213 02:36:48.259796 1841 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://139.178.70.101:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.101:6443: connect: connection refused Dec 13 02:36:48.259912 kubelet[1841]: E1213 02:36:48.259854 1841 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.70.101:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.101:6443: connect: connection refused Dec 13 02:36:48.295425 kubelet[1841]: W1213 02:36:48.295367 1841 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://139.178.70.101:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.101:6443: connect: connection refused Dec 13 02:36:48.295425 kubelet[1841]: E1213 02:36:48.295409 1841 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.70.101:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.101:6443: connect: connection refused Dec 13 02:36:48.487344 kubelet[1841]: E1213 02:36:48.487269 1841 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.101:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.101:6443: connect: connection refused" interval="1.6s" Dec 13 02:36:48.591150 kubelet[1841]: I1213 02:36:48.590948 1841 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 02:36:48.591150 kubelet[1841]: E1213 02:36:48.591097 1841 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://139.178.70.101:6443/api/v1/nodes\": dial tcp 139.178.70.101:6443: connect: connection refused" node="localhost" Dec 13 02:36:48.799000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:36:48.799000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0006f8030 a2=fc6 a3=0 items=0 ppid=1888 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 key=(null) Dec 13 02:36:48.799000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:36:48.800000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:36:48.800000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00035b620 a2=fc6 a3=0 items=0 ppid=1888 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 key=(null) Dec 13 02:36:48.800000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:36:49.637000 audit[2056]: AVC avc: denied { watch } for pid=2056 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:36:49.637000 audit[2056]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c00434c510 a2=fc6 a3=0 items=0 ppid=1920 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c498 key=(null) Dec 13 02:36:49.637000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:36:49.637000 audit[2056]: AVC avc: denied { watch } for pid=2056 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:36:49.637000 audit[2056]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c006dbc300 a2=fc6 a3=0 items=0 ppid=1920 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c498 key=(null) Dec 13 02:36:49.637000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:36:49.637000 audit[2056]: AVC avc: denied { watch } for pid=2056 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:36:49.637000 audit[2056]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c001917b60 a2=fc6 a3=0 items=0 ppid=1920 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c498 key=(null) Dec 13 02:36:49.637000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:36:49.642000 audit[2056]: AVC avc: denied { watch } for pid=2056 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:36:49.642000 audit[2056]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c0033940a0 a2=fc6 a3=0 items=0 ppid=1920 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c498 key=(null) Dec 13 02:36:49.642000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:36:49.642000 audit[2056]: AVC avc: denied { watch } for pid=2056 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:36:49.642000 audit[2056]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c00434c930 a2=fc6 a3=0 items=0 ppid=1920 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c498 key=(null) Dec 13 02:36:49.642000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:36:49.644000 audit[2056]: AVC avc: denied { watch } for pid=2056 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:36:49.644000 audit[2056]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4f a1=c006dbc4b0 a2=fc6 a3=0 items=0 ppid=1920 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c498 key=(null) Dec 13 02:36:49.644000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:36:50.035084 kubelet[1841]: E1213 02:36:50.035005 1841 csi_plugin.go:308] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "localhost" not found Dec 13 02:36:50.089968 kubelet[1841]: E1213 02:36:50.089941 1841 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Dec 13 02:36:50.192560 kubelet[1841]: I1213 02:36:50.192543 1841 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 02:36:50.198194 kubelet[1841]: I1213 02:36:50.198177 1841 kubelet_node_status.go:76] "Successfully registered node" node="localhost" Dec 13 02:36:51.061692 kubelet[1841]: I1213 02:36:51.061668 1841 apiserver.go:52] "Watching apiserver" Dec 13 02:36:51.086350 kubelet[1841]: I1213 02:36:51.086328 1841 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 02:36:51.638424 systemd[1]: Reloading. Dec 13 02:36:51.707062 /usr/lib/systemd/system-generators/torcx-generator[2127]: time="2024-12-13T02:36:51Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:36:51.707078 /usr/lib/systemd/system-generators/torcx-generator[2127]: time="2024-12-13T02:36:51Z" level=info msg="torcx already run" Dec 13 02:36:51.751422 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:36:51.751436 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:36:51.764175 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:36:51.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.821409 kernel: kauditd_printk_skb: 650 callbacks suppressed Dec 13 02:36:51.821452 kernel: audit: type=1400 audit(1734057411.817:527): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.821472 kernel: audit: type=1400 audit(1734057411.817:528): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.823761 kernel: audit: type=1400 audit(1734057411.821:529): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.828483 kernel: audit: type=1400 audit(1734057411.821:530): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.828518 kernel: audit: type=1400 audit(1734057411.821:531): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.833335 kernel: audit: type=1400 audit(1734057411.821:532): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.833372 kernel: audit: type=1400 audit(1734057411.821:533): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.838394 kernel: audit: type=1400 audit(1734057411.821:534): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.838467 kernel: audit: type=1400 audit(1734057411.821:535): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.840906 kernel: audit: type=1400 audit(1734057411.828:536): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.828000 audit: BPF prog-id=82 op=LOAD Dec 13 02:36:51.828000 audit: BPF prog-id=58 op=UNLOAD Dec 13 02:36:51.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.830000 audit: BPF prog-id=83 op=LOAD Dec 13 02:36:51.830000 audit: BPF prog-id=70 op=UNLOAD Dec 13 02:36:51.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.835000 audit: BPF prog-id=84 op=LOAD Dec 13 02:36:51.835000 audit: BPF prog-id=43 op=UNLOAD Dec 13 02:36:51.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.843000 audit: BPF prog-id=85 op=LOAD Dec 13 02:36:51.843000 audit: BPF prog-id=44 op=UNLOAD Dec 13 02:36:51.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.844000 audit: BPF prog-id=86 op=LOAD Dec 13 02:36:51.844000 audit: BPF prog-id=78 op=UNLOAD Dec 13 02:36:51.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.845000 audit: BPF prog-id=87 op=LOAD Dec 13 02:36:51.845000 audit: BPF prog-id=45 op=UNLOAD Dec 13 02:36:51.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.846000 audit: BPF prog-id=88 op=LOAD Dec 13 02:36:51.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.846000 audit: BPF prog-id=89 op=LOAD Dec 13 02:36:51.846000 audit: BPF prog-id=46 op=UNLOAD Dec 13 02:36:51.846000 audit: BPF prog-id=47 op=UNLOAD Dec 13 02:36:51.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.847000 audit: BPF prog-id=90 op=LOAD Dec 13 02:36:51.847000 audit: BPF prog-id=74 op=UNLOAD Dec 13 02:36:51.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.848000 audit: BPF prog-id=91 op=LOAD Dec 13 02:36:51.848000 audit: BPF prog-id=48 op=UNLOAD Dec 13 02:36:51.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.848000 audit: BPF prog-id=92 op=LOAD Dec 13 02:36:51.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.848000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.849000 audit: BPF prog-id=93 op=LOAD Dec 13 02:36:51.849000 audit: BPF prog-id=49 op=UNLOAD Dec 13 02:36:51.849000 audit: BPF prog-id=50 op=UNLOAD Dec 13 02:36:51.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.849000 audit: BPF prog-id=94 op=LOAD Dec 13 02:36:51.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.850000 audit: BPF prog-id=95 op=LOAD Dec 13 02:36:51.850000 audit: BPF prog-id=51 op=UNLOAD Dec 13 02:36:51.850000 audit: BPF prog-id=52 op=UNLOAD Dec 13 02:36:51.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.850000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.850000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.850000 audit: BPF prog-id=96 op=LOAD Dec 13 02:36:51.850000 audit: BPF prog-id=62 op=UNLOAD Dec 13 02:36:51.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.851000 audit: BPF prog-id=97 op=LOAD Dec 13 02:36:51.851000 audit: BPF prog-id=53 op=UNLOAD Dec 13 02:36:51.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.852000 audit: BPF prog-id=98 op=LOAD Dec 13 02:36:51.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.852000 audit: BPF prog-id=99 op=LOAD Dec 13 02:36:51.852000 audit: BPF prog-id=54 op=UNLOAD Dec 13 02:36:51.852000 audit: BPF prog-id=55 op=UNLOAD Dec 13 02:36:51.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.853000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.853000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.853000 audit: BPF prog-id=100 op=LOAD Dec 13 02:36:51.853000 audit: BPF prog-id=56 op=UNLOAD Dec 13 02:36:51.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.854000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.854000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.854000 audit: BPF prog-id=101 op=LOAD Dec 13 02:36:51.854000 audit: BPF prog-id=66 op=UNLOAD Dec 13 02:36:51.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:51.855000 audit: BPF prog-id=102 op=LOAD Dec 13 02:36:51.855000 audit: BPF prog-id=57 op=UNLOAD Dec 13 02:36:51.867810 kubelet[1841]: I1213 02:36:51.867732 1841 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 02:36:51.867810 kubelet[1841]: E1213 02:36:51.867673 1841 event.go:319] "Unable to write event (broadcaster is shut down)" event="&Event{ObjectMeta:{localhost.18109c06388689d5 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2024-12-13 02:36:47.069718997 +0000 UTC m=+0.469142344,LastTimestamp:2024-12-13 02:36:47.069718997 +0000 UTC m=+0.469142344,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Dec 13 02:36:51.868299 systemd[1]: Stopping kubelet.service... Dec 13 02:36:51.883580 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 02:36:51.883805 systemd[1]: Stopped kubelet.service. Dec 13 02:36:51.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:51.885719 systemd[1]: Starting kubelet.service... Dec 13 02:36:52.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:52.645237 systemd[1]: Started kubelet.service. Dec 13 02:36:52.735999 kubelet[2191]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:36:52.735999 kubelet[2191]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 02:36:52.735999 kubelet[2191]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:36:52.741757 kubelet[2191]: I1213 02:36:52.741683 2191 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 02:36:52.752253 kubelet[2191]: I1213 02:36:52.752228 2191 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 02:36:52.752253 kubelet[2191]: I1213 02:36:52.752247 2191 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 02:36:52.752385 kubelet[2191]: I1213 02:36:52.752373 2191 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 02:36:52.753248 kubelet[2191]: I1213 02:36:52.753235 2191 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 02:36:52.754214 kubelet[2191]: I1213 02:36:52.754190 2191 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 02:36:52.760849 kubelet[2191]: I1213 02:36:52.760830 2191 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 02:36:52.760999 kubelet[2191]: I1213 02:36:52.760978 2191 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 02:36:52.761111 kubelet[2191]: I1213 02:36:52.761001 2191 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 02:36:52.761169 kubelet[2191]: I1213 02:36:52.761118 2191 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 02:36:52.761169 kubelet[2191]: I1213 02:36:52.761124 2191 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 02:36:52.761169 kubelet[2191]: I1213 02:36:52.761149 2191 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:36:52.761235 kubelet[2191]: I1213 02:36:52.761219 2191 kubelet.go:400] "Attempting to sync node with API server" Dec 13 02:36:52.761235 kubelet[2191]: I1213 02:36:52.761227 2191 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 02:36:52.761274 kubelet[2191]: I1213 02:36:52.761240 2191 kubelet.go:312] "Adding apiserver pod source" Dec 13 02:36:52.761274 kubelet[2191]: I1213 02:36:52.761250 2191 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 02:36:52.762796 kubelet[2191]: I1213 02:36:52.762785 2191 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 02:36:52.762936 kubelet[2191]: I1213 02:36:52.762927 2191 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 02:36:52.763224 kubelet[2191]: I1213 02:36:52.763215 2191 server.go:1264] "Started kubelet" Dec 13 02:36:52.768801 kubelet[2191]: E1213 02:36:52.768784 2191 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 02:36:52.769236 kubelet[2191]: I1213 02:36:52.769219 2191 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 02:36:52.771802 kubelet[2191]: I1213 02:36:52.771791 2191 server.go:455] "Adding debug handlers to kubelet server" Dec 13 02:36:52.773898 kubelet[2191]: I1213 02:36:52.773872 2191 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 02:36:52.774029 kubelet[2191]: I1213 02:36:52.774021 2191 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 02:36:52.787000 audit[2191]: AVC avc: denied { mac_admin } for pid=2191 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:52.787000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:36:52.787000 audit[2191]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000407860 a1=c000825680 a2=c000407830 a3=25 items=0 ppid=1 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:52.788572 kubelet[2191]: I1213 02:36:52.788556 2191 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 02:36:52.788643 kubelet[2191]: I1213 02:36:52.788631 2191 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 02:36:52.788704 kubelet[2191]: I1213 02:36:52.788698 2191 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 02:36:52.787000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:36:52.787000 audit[2191]: AVC avc: denied { mac_admin } for pid=2191 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:52.787000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:36:52.787000 audit[2191]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007a4940 a1=c000825698 a2=c0004078f0 a3=25 items=0 ppid=1 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:52.787000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:36:52.791047 kubelet[2191]: I1213 02:36:52.791039 2191 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 02:36:52.791161 kubelet[2191]: I1213 02:36:52.791153 2191 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 02:36:52.791420 kubelet[2191]: I1213 02:36:52.791413 2191 reconciler.go:26] "Reconciler: start to sync state" Dec 13 02:36:52.794781 kubelet[2191]: I1213 02:36:52.794768 2191 factory.go:221] Registration of the systemd container factory successfully Dec 13 02:36:52.795180 kubelet[2191]: I1213 02:36:52.795167 2191 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 02:36:52.798024 kubelet[2191]: I1213 02:36:52.798009 2191 factory.go:221] Registration of the containerd container factory successfully Dec 13 02:36:52.839993 kubelet[2191]: I1213 02:36:52.839942 2191 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 02:36:52.845391 kubelet[2191]: I1213 02:36:52.845260 2191 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 02:36:52.845391 kubelet[2191]: I1213 02:36:52.845282 2191 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 02:36:52.845391 kubelet[2191]: I1213 02:36:52.845294 2191 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 02:36:52.845391 kubelet[2191]: E1213 02:36:52.845320 2191 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 02:36:52.853008 kubelet[2191]: I1213 02:36:52.852994 2191 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 02:36:52.853124 kubelet[2191]: I1213 02:36:52.853114 2191 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 02:36:52.853174 kubelet[2191]: I1213 02:36:52.853168 2191 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:36:52.853317 kubelet[2191]: I1213 02:36:52.853308 2191 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 02:36:52.853379 kubelet[2191]: I1213 02:36:52.853363 2191 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 02:36:52.853432 kubelet[2191]: I1213 02:36:52.853425 2191 policy_none.go:49] "None policy: Start" Dec 13 02:36:52.854696 kubelet[2191]: I1213 02:36:52.854660 2191 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 02:36:52.854741 kubelet[2191]: I1213 02:36:52.854702 2191 state_mem.go:35] "Initializing new in-memory state store" Dec 13 02:36:52.854814 kubelet[2191]: I1213 02:36:52.854802 2191 state_mem.go:75] "Updated machine memory state" Dec 13 02:36:52.857068 kubelet[2191]: I1213 02:36:52.857055 2191 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 02:36:52.855000 audit[2191]: AVC avc: denied { mac_admin } for pid=2191 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:36:52.855000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:36:52.855000 audit[2191]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c88e70 a1=c000fb5848 a2=c000c88e40 a3=25 items=0 ppid=1 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:36:52.855000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:36:52.861066 kubelet[2191]: I1213 02:36:52.861039 2191 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 02:36:52.861421 kubelet[2191]: I1213 02:36:52.861396 2191 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 02:36:52.862268 kubelet[2191]: I1213 02:36:52.862107 2191 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 02:36:52.946656 kubelet[2191]: I1213 02:36:52.946565 2191 topology_manager.go:215] "Topology Admit Handler" podUID="8a50003978138b3ab9890682eff4eae8" podNamespace="kube-system" podName="kube-controller-manager-localhost" Dec 13 02:36:52.946656 kubelet[2191]: I1213 02:36:52.946636 2191 topology_manager.go:215] "Topology Admit Handler" podUID="b107a98bcf27297d642d248711a3fc70" podNamespace="kube-system" podName="kube-scheduler-localhost" Dec 13 02:36:52.946777 kubelet[2191]: I1213 02:36:52.946675 2191 topology_manager.go:215] "Topology Admit Handler" podUID="3518a4e8451bdfb5a3a5f6cbc425cac4" podNamespace="kube-system" podName="kube-apiserver-localhost" Dec 13 02:36:52.956098 kubelet[2191]: E1213 02:36:52.956066 2191 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Dec 13 02:36:52.956549 kubelet[2191]: E1213 02:36:52.956533 2191 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" Dec 13 02:36:52.965861 kubelet[2191]: I1213 02:36:52.965841 2191 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 02:36:52.970881 kubelet[2191]: I1213 02:36:52.970857 2191 kubelet_node_status.go:112] "Node was previously registered" node="localhost" Dec 13 02:36:52.970982 kubelet[2191]: I1213 02:36:52.970921 2191 kubelet_node_status.go:76] "Successfully registered node" node="localhost" Dec 13 02:36:52.992216 kubelet[2191]: I1213 02:36:52.991999 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:36:52.992216 kubelet[2191]: I1213 02:36:52.992024 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:36:52.992216 kubelet[2191]: I1213 02:36:52.992035 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:36:52.992216 kubelet[2191]: I1213 02:36:52.992072 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:36:52.992216 kubelet[2191]: I1213 02:36:52.992084 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/3518a4e8451bdfb5a3a5f6cbc425cac4-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"3518a4e8451bdfb5a3a5f6cbc425cac4\") " pod="kube-system/kube-apiserver-localhost" Dec 13 02:36:52.992392 kubelet[2191]: I1213 02:36:52.992095 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:36:52.992392 kubelet[2191]: I1213 02:36:52.992103 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b107a98bcf27297d642d248711a3fc70-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"b107a98bcf27297d642d248711a3fc70\") " pod="kube-system/kube-scheduler-localhost" Dec 13 02:36:52.992392 kubelet[2191]: I1213 02:36:52.992137 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/3518a4e8451bdfb5a3a5f6cbc425cac4-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"3518a4e8451bdfb5a3a5f6cbc425cac4\") " pod="kube-system/kube-apiserver-localhost" Dec 13 02:36:52.992392 kubelet[2191]: I1213 02:36:52.992160 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/3518a4e8451bdfb5a3a5f6cbc425cac4-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"3518a4e8451bdfb5a3a5f6cbc425cac4\") " pod="kube-system/kube-apiserver-localhost" Dec 13 02:36:53.763279 kubelet[2191]: I1213 02:36:53.763252 2191 apiserver.go:52] "Watching apiserver" Dec 13 02:36:53.791784 kubelet[2191]: I1213 02:36:53.791755 2191 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 02:36:53.865773 kubelet[2191]: E1213 02:36:53.865735 2191 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Dec 13 02:36:53.905046 kubelet[2191]: I1213 02:36:53.905004 2191 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=2.904991045 podStartE2EDuration="2.904991045s" podCreationTimestamp="2024-12-13 02:36:51 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:36:53.883565343 +0000 UTC m=+1.215436600" watchObservedRunningTime="2024-12-13 02:36:53.904991045 +0000 UTC m=+1.236862294" Dec 13 02:36:53.918066 kubelet[2191]: I1213 02:36:53.918035 2191 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.918023764 podStartE2EDuration="1.918023764s" podCreationTimestamp="2024-12-13 02:36:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:36:53.905395959 +0000 UTC m=+1.237267216" watchObservedRunningTime="2024-12-13 02:36:53.918023764 +0000 UTC m=+1.249895022" Dec 13 02:36:53.931430 kubelet[2191]: I1213 02:36:53.931396 2191 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=2.9313852689999997 podStartE2EDuration="2.931385269s" podCreationTimestamp="2024-12-13 02:36:51 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:36:53.919877835 +0000 UTC m=+1.251749094" watchObservedRunningTime="2024-12-13 02:36:53.931385269 +0000 UTC m=+1.263256526" Dec 13 02:36:54.218000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=8278 scontext=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 02:36:54.218000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0012f1f80 a2=fc6 a3=0 items=0 ppid=1888 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 key=(null) Dec 13 02:36:54.218000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:36:54.517000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:36:54.517000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e8a1c0 a2=fc6 a3=0 items=0 ppid=1888 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 key=(null) Dec 13 02:36:54.517000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:36:54.517000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:36:54.517000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e8a1e0 a2=fc6 a3=0 items=0 ppid=1888 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 key=(null) Dec 13 02:36:54.517000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:36:54.517000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:36:54.517000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e8a200 a2=fc6 a3=0 items=0 ppid=1888 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 key=(null) Dec 13 02:36:54.517000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:36:54.517000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:36:54.517000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e8a560 a2=fc6 a3=0 items=0 ppid=1888 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 key=(null) Dec 13 02:36:54.517000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:36:56.806760 sudo[1484]: pam_unix(sudo:session): session closed for user root Dec 13 02:36:56.805000 audit[1484]: USER_END pid=1484 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:36:56.805000 audit[1484]: CRED_DISP pid=1484 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:36:56.809316 sshd[1480]: pam_unix(sshd:session): session closed for user core Dec 13 02:36:56.808000 audit[1480]: USER_END pid=1480 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:36:56.808000 audit[1480]: CRED_DISP pid=1480 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:36:56.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.101:22-147.75.109.163:39872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:36:56.811118 systemd[1]: sshd@6-139.178.70.101:22-147.75.109.163:39872.service: Deactivated successfully. Dec 13 02:36:56.811635 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 02:36:56.811718 systemd[1]: session-9.scope: Consumed 2.987s CPU time. Dec 13 02:36:56.812538 systemd-logind[1238]: Session 9 logged out. Waiting for processes to exit. Dec 13 02:36:56.813343 systemd-logind[1238]: Removed session 9. Dec 13 02:37:06.088210 kubelet[2191]: I1213 02:37:06.088183 2191 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 02:37:06.088671 env[1255]: time="2024-12-13T02:37:06.088646488Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 02:37:06.088825 kubelet[2191]: I1213 02:37:06.088753 2191 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 02:37:07.035495 kubelet[2191]: I1213 02:37:07.035462 2191 topology_manager.go:215] "Topology Admit Handler" podUID="9d42ef76-0671-447e-8488-bf5d366dc0f8" podNamespace="kube-system" podName="kube-proxy-ht2gf" Dec 13 02:37:07.039642 systemd[1]: Created slice kubepods-besteffort-pod9d42ef76_0671_447e_8488_bf5d366dc0f8.slice. Dec 13 02:37:07.070490 kubelet[2191]: I1213 02:37:07.070470 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9d42ef76-0671-447e-8488-bf5d366dc0f8-xtables-lock\") pod \"kube-proxy-ht2gf\" (UID: \"9d42ef76-0671-447e-8488-bf5d366dc0f8\") " pod="kube-system/kube-proxy-ht2gf" Dec 13 02:37:07.070636 kubelet[2191]: I1213 02:37:07.070626 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9d42ef76-0671-447e-8488-bf5d366dc0f8-lib-modules\") pod \"kube-proxy-ht2gf\" (UID: \"9d42ef76-0671-447e-8488-bf5d366dc0f8\") " pod="kube-system/kube-proxy-ht2gf" Dec 13 02:37:07.070717 kubelet[2191]: I1213 02:37:07.070705 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tlt25\" (UniqueName: \"kubernetes.io/projected/9d42ef76-0671-447e-8488-bf5d366dc0f8-kube-api-access-tlt25\") pod \"kube-proxy-ht2gf\" (UID: \"9d42ef76-0671-447e-8488-bf5d366dc0f8\") " pod="kube-system/kube-proxy-ht2gf" Dec 13 02:37:07.070784 kubelet[2191]: I1213 02:37:07.070776 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/9d42ef76-0671-447e-8488-bf5d366dc0f8-kube-proxy\") pod \"kube-proxy-ht2gf\" (UID: \"9d42ef76-0671-447e-8488-bf5d366dc0f8\") " pod="kube-system/kube-proxy-ht2gf" Dec 13 02:37:07.250208 kubelet[2191]: I1213 02:37:07.250177 2191 topology_manager.go:215] "Topology Admit Handler" podUID="24fa2281-53d2-4ffb-8601-0c59ce35b631" podNamespace="tigera-operator" podName="tigera-operator-7bc55997bb-z4kpm" Dec 13 02:37:07.253539 systemd[1]: Created slice kubepods-besteffort-pod24fa2281_53d2_4ffb_8601_0c59ce35b631.slice. Dec 13 02:37:07.271855 kubelet[2191]: I1213 02:37:07.271823 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/24fa2281-53d2-4ffb-8601-0c59ce35b631-var-lib-calico\") pod \"tigera-operator-7bc55997bb-z4kpm\" (UID: \"24fa2281-53d2-4ffb-8601-0c59ce35b631\") " pod="tigera-operator/tigera-operator-7bc55997bb-z4kpm" Dec 13 02:37:07.271855 kubelet[2191]: I1213 02:37:07.271849 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2t22w\" (UniqueName: \"kubernetes.io/projected/24fa2281-53d2-4ffb-8601-0c59ce35b631-kube-api-access-2t22w\") pod \"tigera-operator-7bc55997bb-z4kpm\" (UID: \"24fa2281-53d2-4ffb-8601-0c59ce35b631\") " pod="tigera-operator/tigera-operator-7bc55997bb-z4kpm" Dec 13 02:37:07.348902 env[1255]: time="2024-12-13T02:37:07.348811313Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-ht2gf,Uid:9d42ef76-0671-447e-8488-bf5d366dc0f8,Namespace:kube-system,Attempt:0,}" Dec 13 02:37:07.396229 env[1255]: time="2024-12-13T02:37:07.396173212Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:37:07.396229 env[1255]: time="2024-12-13T02:37:07.396208208Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:37:07.396353 env[1255]: time="2024-12-13T02:37:07.396217705Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:37:07.396473 env[1255]: time="2024-12-13T02:37:07.396448951Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c8a21541be2ac7bfdb6918a7fef8ecad8a5a4d3bff08ebe1849e2eda48f24139 pid=2276 runtime=io.containerd.runc.v2 Dec 13 02:37:07.406905 systemd[1]: Started cri-containerd-c8a21541be2ac7bfdb6918a7fef8ecad8a5a4d3bff08ebe1849e2eda48f24139.scope. Dec 13 02:37:07.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.419912 kernel: kauditd_printk_skb: 268 callbacks suppressed Dec 13 02:37:07.419996 kernel: audit: type=1400 audit(1734057427.413:786): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.425289 kernel: audit: type=1400 audit(1734057427.413:787): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.425321 kernel: audit: type=1400 audit(1734057427.414:788): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.433216 kernel: audit: type=1400 audit(1734057427.414:789): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.433246 kernel: audit: type=1400 audit(1734057427.414:790): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.435880 kernel: audit: type=1400 audit(1734057427.414:791): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.435917 kernel: audit: type=1400 audit(1734057427.414:792): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.440817 kernel: audit: type=1400 audit(1734057427.414:793): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.448841 kernel: audit: type=1400 audit(1734057427.414:794): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.448881 kernel: audit: type=1400 audit(1734057427.414:795): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.414000 audit: BPF prog-id=103 op=LOAD Dec 13 02:37:07.421000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.421000 audit[2285]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2276 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:07.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338613231353431626532616337626664623639313861376665663865 Dec 13 02:37:07.421000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.421000 audit[2285]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2276 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:07.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338613231353431626532616337626664623639313861376665663865 Dec 13 02:37:07.421000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.421000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.421000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.421000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.421000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.421000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.421000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.421000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.421000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.421000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.421000 audit: BPF prog-id=104 op=LOAD Dec 13 02:37:07.421000 audit[2285]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000213200 items=0 ppid=2276 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:07.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338613231353431626532616337626664623639313861376665663865 Dec 13 02:37:07.421000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.421000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.421000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.421000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.421000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.421000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.421000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.421000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.421000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.421000 audit: BPF prog-id=105 op=LOAD Dec 13 02:37:07.421000 audit[2285]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000213248 items=0 ppid=2276 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:07.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338613231353431626532616337626664623639313861376665663865 Dec 13 02:37:07.421000 audit: BPF prog-id=105 op=UNLOAD Dec 13 02:37:07.421000 audit: BPF prog-id=104 op=UNLOAD Dec 13 02:37:07.421000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.421000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.421000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.421000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.421000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.421000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.421000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.421000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.421000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.421000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.421000 audit: BPF prog-id=106 op=LOAD Dec 13 02:37:07.421000 audit[2285]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000213658 items=0 ppid=2276 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:07.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338613231353431626532616337626664623639313861376665663865 Dec 13 02:37:07.450170 env[1255]: time="2024-12-13T02:37:07.450145678Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-ht2gf,Uid:9d42ef76-0671-447e-8488-bf5d366dc0f8,Namespace:kube-system,Attempt:0,} returns sandbox id \"c8a21541be2ac7bfdb6918a7fef8ecad8a5a4d3bff08ebe1849e2eda48f24139\"" Dec 13 02:37:07.452912 env[1255]: time="2024-12-13T02:37:07.452884722Z" level=info msg="CreateContainer within sandbox \"c8a21541be2ac7bfdb6918a7fef8ecad8a5a4d3bff08ebe1849e2eda48f24139\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 02:37:07.459129 env[1255]: time="2024-12-13T02:37:07.459092747Z" level=info msg="CreateContainer within sandbox \"c8a21541be2ac7bfdb6918a7fef8ecad8a5a4d3bff08ebe1849e2eda48f24139\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"2ef2ababbd21eb1613bb7115d605ac5997ca1ef563fbaf004263255262a2fe25\"" Dec 13 02:37:07.460497 env[1255]: time="2024-12-13T02:37:07.460425149Z" level=info msg="StartContainer for \"2ef2ababbd21eb1613bb7115d605ac5997ca1ef563fbaf004263255262a2fe25\"" Dec 13 02:37:07.472147 systemd[1]: Started cri-containerd-2ef2ababbd21eb1613bb7115d605ac5997ca1ef563fbaf004263255262a2fe25.scope. Dec 13 02:37:07.482000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.482000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7fd61f72d198 items=0 ppid=2276 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:07.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265663261626162626432316562313631336262373131356436303561 Dec 13 02:37:07.482000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.482000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.482000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.482000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.482000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.482000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.482000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.482000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.482000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.482000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.482000 audit: BPF prog-id=107 op=LOAD Dec 13 02:37:07.482000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000347f98 items=0 ppid=2276 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:07.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265663261626162626432316562313631336262373131356436303561 Dec 13 02:37:07.482000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.482000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.482000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.482000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.482000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.482000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.482000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.482000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.482000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.482000 audit: BPF prog-id=108 op=LOAD Dec 13 02:37:07.482000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000347fe8 items=0 ppid=2276 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:07.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265663261626162626432316562313631336262373131356436303561 Dec 13 02:37:07.482000 audit: BPF prog-id=108 op=UNLOAD Dec 13 02:37:07.482000 audit: BPF prog-id=107 op=UNLOAD Dec 13 02:37:07.482000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.482000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.482000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.482000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.482000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.482000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.482000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.482000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.482000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.482000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.482000 audit: BPF prog-id=109 op=LOAD Dec 13 02:37:07.482000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0003b8078 items=0 ppid=2276 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:07.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265663261626162626432316562313631336262373131356436303561 Dec 13 02:37:07.493048 env[1255]: time="2024-12-13T02:37:07.493017647Z" level=info msg="StartContainer for \"2ef2ababbd21eb1613bb7115d605ac5997ca1ef563fbaf004263255262a2fe25\" returns successfully" Dec 13 02:37:07.556536 env[1255]: time="2024-12-13T02:37:07.556497038Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7bc55997bb-z4kpm,Uid:24fa2281-53d2-4ffb-8601-0c59ce35b631,Namespace:tigera-operator,Attempt:0,}" Dec 13 02:37:07.584649 env[1255]: time="2024-12-13T02:37:07.584516187Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:37:07.584649 env[1255]: time="2024-12-13T02:37:07.584545233Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:37:07.584649 env[1255]: time="2024-12-13T02:37:07.584555572Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:37:07.584873 env[1255]: time="2024-12-13T02:37:07.584842210Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ab67b61cb6d9b9122d001bb624536a37de32466230475e443376f221da73158b pid=2350 runtime=io.containerd.runc.v2 Dec 13 02:37:07.592798 systemd[1]: Started cri-containerd-ab67b61cb6d9b9122d001bb624536a37de32466230475e443376f221da73158b.scope. Dec 13 02:37:07.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.601000 audit: BPF prog-id=110 op=LOAD Dec 13 02:37:07.601000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.601000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2350 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:07.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162363762363163623664396239313232643030316262363234353336 Dec 13 02:37:07.601000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.601000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2350 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:07.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162363762363163623664396239313232643030316262363234353336 Dec 13 02:37:07.601000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.601000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.601000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.601000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.601000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.601000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.601000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.601000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.601000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.601000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.601000 audit: BPF prog-id=111 op=LOAD Dec 13 02:37:07.601000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002afd10 items=0 ppid=2350 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:07.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162363762363163623664396239313232643030316262363234353336 Dec 13 02:37:07.601000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.601000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.601000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.601000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.601000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.601000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.601000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.601000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.601000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.601000 audit: BPF prog-id=112 op=LOAD Dec 13 02:37:07.601000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002afd58 items=0 ppid=2350 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:07.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162363762363163623664396239313232643030316262363234353336 Dec 13 02:37:07.601000 audit: BPF prog-id=112 op=UNLOAD Dec 13 02:37:07.601000 audit: BPF prog-id=111 op=UNLOAD Dec 13 02:37:07.601000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.601000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.601000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.601000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.601000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.601000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.601000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.601000 audit[2361]: AVC avc: denied { perfmon } for pid=2361 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.601000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.601000 audit[2361]: AVC avc: denied { bpf } for pid=2361 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:07.601000 audit: BPF prog-id=113 op=LOAD Dec 13 02:37:07.601000 audit[2361]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000332168 items=0 ppid=2350 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:07.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162363762363163623664396239313232643030316262363234353336 Dec 13 02:37:07.629245 env[1255]: time="2024-12-13T02:37:07.629008785Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7bc55997bb-z4kpm,Uid:24fa2281-53d2-4ffb-8601-0c59ce35b631,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"ab67b61cb6d9b9122d001bb624536a37de32466230475e443376f221da73158b\"" Dec 13 02:37:07.630413 env[1255]: time="2024-12-13T02:37:07.630398980Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 02:37:08.070000 audit[2406]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2406 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:37:08.070000 audit[2406]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff59e538d0 a2=0 a3=7fff59e538bc items=0 ppid=2327 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.070000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 02:37:08.071000 audit[2407]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=2407 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:37:08.071000 audit[2407]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc1c05c5b0 a2=0 a3=7ffc1c05c59c items=0 ppid=2327 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.071000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 02:37:08.071000 audit[2408]: NETFILTER_CFG table=filter:40 family=10 entries=1 op=nft_register_chain pid=2408 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:37:08.071000 audit[2408]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffff5b32000 a2=0 a3=7ffff5b31fec items=0 ppid=2327 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.071000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 02:37:08.072000 audit[2409]: NETFILTER_CFG table=mangle:41 family=2 entries=1 op=nft_register_chain pid=2409 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:37:08.072000 audit[2409]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdec4c7870 a2=0 a3=7ffdec4c785c items=0 ppid=2327 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.072000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 02:37:08.073000 audit[2410]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2410 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:37:08.073000 audit[2410]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe7c15ce00 a2=0 a3=7ffe7c15cdec items=0 ppid=2327 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.073000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 02:37:08.075000 audit[2411]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2411 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:37:08.075000 audit[2411]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffede4d7010 a2=0 a3=7ffede4d6ffc items=0 ppid=2327 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.075000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 02:37:08.174000 audit[2412]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2412 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:37:08.174000 audit[2412]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe3d7eede0 a2=0 a3=7ffe3d7eedcc items=0 ppid=2327 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.174000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 02:37:08.182134 systemd[1]: run-containerd-runc-k8s.io-c8a21541be2ac7bfdb6918a7fef8ecad8a5a4d3bff08ebe1849e2eda48f24139-runc.dA3AoF.mount: Deactivated successfully. Dec 13 02:37:08.188000 audit[2414]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2414 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:37:08.188000 audit[2414]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd85993050 a2=0 a3=7ffd8599303c items=0 ppid=2327 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.188000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 02:37:08.196000 audit[2417]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2417 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:37:08.196000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffcd9f75570 a2=0 a3=7ffcd9f7555c items=0 ppid=2327 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.196000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 02:37:08.196000 audit[2418]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2418 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:37:08.196000 audit[2418]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffffd64d6c0 a2=0 a3=7ffffd64d6ac items=0 ppid=2327 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.196000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 02:37:08.198000 audit[2420]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2420 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:37:08.198000 audit[2420]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc3b283c70 a2=0 a3=7ffc3b283c5c items=0 ppid=2327 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.198000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 02:37:08.198000 audit[2421]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2421 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:37:08.198000 audit[2421]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd4bb66d70 a2=0 a3=7ffd4bb66d5c items=0 ppid=2327 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.198000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 02:37:08.200000 audit[2423]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2423 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:37:08.200000 audit[2423]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc558d2840 a2=0 a3=7ffc558d282c items=0 ppid=2327 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.200000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 02:37:08.202000 audit[2426]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2426 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:37:08.202000 audit[2426]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc5f2b7cf0 a2=0 a3=7ffc5f2b7cdc items=0 ppid=2327 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.202000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 02:37:08.203000 audit[2427]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2427 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:37:08.203000 audit[2427]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff494539a0 a2=0 a3=7fff4945398c items=0 ppid=2327 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.203000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 02:37:08.204000 audit[2429]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2429 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:37:08.204000 audit[2429]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdb2c79e90 a2=0 a3=7ffdb2c79e7c items=0 ppid=2327 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.204000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 02:37:08.205000 audit[2430]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2430 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:37:08.205000 audit[2430]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeb633ad90 a2=0 a3=7ffeb633ad7c items=0 ppid=2327 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.205000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 02:37:08.207000 audit[2432]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2432 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:37:08.207000 audit[2432]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd7465e220 a2=0 a3=7ffd7465e20c items=0 ppid=2327 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.207000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:37:08.210000 audit[2435]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2435 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:37:08.210000 audit[2435]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff89363840 a2=0 a3=7fff8936382c items=0 ppid=2327 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.210000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:37:08.213000 audit[2438]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2438 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:37:08.213000 audit[2438]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdadea97d0 a2=0 a3=7ffdadea97bc items=0 ppid=2327 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.213000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 02:37:08.214000 audit[2439]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2439 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:37:08.214000 audit[2439]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff2e9d56b0 a2=0 a3=7fff2e9d569c items=0 ppid=2327 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.214000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 02:37:08.218000 audit[2441]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2441 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:37:08.218000 audit[2441]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffee3f5b120 a2=0 a3=7ffee3f5b10c items=0 ppid=2327 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.218000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:37:08.220000 audit[2444]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2444 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:37:08.220000 audit[2444]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffea40be2d0 a2=0 a3=7ffea40be2bc items=0 ppid=2327 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.220000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:37:08.221000 audit[2445]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2445 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:37:08.221000 audit[2445]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff351b6bf0 a2=0 a3=7fff351b6bdc items=0 ppid=2327 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.221000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 02:37:08.222000 audit[2447]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2447 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:37:08.222000 audit[2447]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd97703940 a2=0 a3=7ffd9770392c items=0 ppid=2327 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.222000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 02:37:08.239000 audit[2453]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2453 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:37:08.239000 audit[2453]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fff522c4600 a2=0 a3=7fff522c45ec items=0 ppid=2327 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.239000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:37:08.247000 audit[2453]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2453 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:37:08.247000 audit[2453]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fff522c4600 a2=0 a3=7fff522c45ec items=0 ppid=2327 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.247000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:37:08.248000 audit[2458]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2458 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:37:08.248000 audit[2458]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffce80a3000 a2=0 a3=7ffce80a2fec items=0 ppid=2327 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.248000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 02:37:08.250000 audit[2460]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2460 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:37:08.250000 audit[2460]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff5a8cb420 a2=0 a3=7fff5a8cb40c items=0 ppid=2327 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.250000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 02:37:08.252000 audit[2463]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2463 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:37:08.252000 audit[2463]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc086e7930 a2=0 a3=7ffc086e791c items=0 ppid=2327 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.252000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 02:37:08.253000 audit[2464]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2464 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:37:08.253000 audit[2464]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdf1f45690 a2=0 a3=7ffdf1f4567c items=0 ppid=2327 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.253000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 02:37:08.255000 audit[2466]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2466 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:37:08.255000 audit[2466]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcca9c23e0 a2=0 a3=7ffcca9c23cc items=0 ppid=2327 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.255000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 02:37:08.256000 audit[2467]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2467 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:37:08.256000 audit[2467]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff2ae11780 a2=0 a3=7fff2ae1176c items=0 ppid=2327 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.256000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 02:37:08.257000 audit[2469]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2469 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:37:08.257000 audit[2469]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd95303910 a2=0 a3=7ffd953038fc items=0 ppid=2327 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.257000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 02:37:08.260000 audit[2472]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2472 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:37:08.260000 audit[2472]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffdf89d3590 a2=0 a3=7ffdf89d357c items=0 ppid=2327 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.260000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 02:37:08.261000 audit[2473]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2473 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:37:08.261000 audit[2473]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffca3dcc30 a2=0 a3=7fffca3dcc1c items=0 ppid=2327 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.261000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 02:37:08.263000 audit[2475]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2475 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:37:08.263000 audit[2475]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcac36ca70 a2=0 a3=7ffcac36ca5c items=0 ppid=2327 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.263000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 02:37:08.263000 audit[2476]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2476 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:37:08.263000 audit[2476]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffea6fc2850 a2=0 a3=7ffea6fc283c items=0 ppid=2327 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.263000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 02:37:08.265000 audit[2478]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2478 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:37:08.265000 audit[2478]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc27c54a00 a2=0 a3=7ffc27c549ec items=0 ppid=2327 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.265000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:37:08.267000 audit[2481]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2481 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:37:08.267000 audit[2481]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd51b28840 a2=0 a3=7ffd51b2882c items=0 ppid=2327 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.267000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 02:37:08.270000 audit[2484]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2484 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:37:08.270000 audit[2484]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe1f4af460 a2=0 a3=7ffe1f4af44c items=0 ppid=2327 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.270000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 02:37:08.270000 audit[2485]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2485 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:37:08.270000 audit[2485]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe9d5d8e40 a2=0 a3=7ffe9d5d8e2c items=0 ppid=2327 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.270000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 02:37:08.272000 audit[2487]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2487 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:37:08.272000 audit[2487]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd28513e50 a2=0 a3=7ffd28513e3c items=0 ppid=2327 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.272000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:37:08.274000 audit[2490]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2490 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:37:08.274000 audit[2490]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe9ac097e0 a2=0 a3=7ffe9ac097cc items=0 ppid=2327 pid=2490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.274000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:37:08.275000 audit[2491]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2491 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:37:08.275000 audit[2491]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffcf788110 a2=0 a3=7fffcf7880fc items=0 ppid=2327 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.275000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 02:37:08.276000 audit[2493]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2493 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:37:08.276000 audit[2493]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffca993d740 a2=0 a3=7ffca993d72c items=0 ppid=2327 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.276000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 02:37:08.277000 audit[2494]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2494 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:37:08.277000 audit[2494]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc32a139f0 a2=0 a3=7ffc32a139dc items=0 ppid=2327 pid=2494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.277000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 02:37:08.279000 audit[2496]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2496 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:37:08.279000 audit[2496]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffedce66260 a2=0 a3=7ffedce6624c items=0 ppid=2327 pid=2496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.279000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:37:08.281000 audit[2499]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2499 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:37:08.281000 audit[2499]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff1346da50 a2=0 a3=7fff1346da3c items=0 ppid=2327 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.281000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:37:08.282000 audit[2501]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2501 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 02:37:08.282000 audit[2501]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffc5c5a4ce0 a2=0 a3=7ffc5c5a4ccc items=0 ppid=2327 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.282000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:37:08.283000 audit[2501]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2501 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 02:37:08.283000 audit[2501]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc5c5a4ce0 a2=0 a3=7ffc5c5a4ccc items=0 ppid=2327 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:08.283000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:37:11.715759 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3916908027.mount: Deactivated successfully. Dec 13 02:37:12.317813 env[1255]: time="2024-12-13T02:37:12.317761694Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:12.318552 env[1255]: time="2024-12-13T02:37:12.318534824Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:12.319221 env[1255]: time="2024-12-13T02:37:12.319206867Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:12.320010 env[1255]: time="2024-12-13T02:37:12.319994634Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:12.320436 env[1255]: time="2024-12-13T02:37:12.320417946Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 02:37:12.322754 env[1255]: time="2024-12-13T02:37:12.322735767Z" level=info msg="CreateContainer within sandbox \"ab67b61cb6d9b9122d001bb624536a37de32466230475e443376f221da73158b\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 02:37:12.328039 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4271474860.mount: Deactivated successfully. Dec 13 02:37:12.331292 env[1255]: time="2024-12-13T02:37:12.331271371Z" level=info msg="CreateContainer within sandbox \"ab67b61cb6d9b9122d001bb624536a37de32466230475e443376f221da73158b\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"cf6586e496a4a65e462d6360e225a9e566e5466530e62256e0bef8fa35b778e1\"" Dec 13 02:37:12.331717 env[1255]: time="2024-12-13T02:37:12.331704395Z" level=info msg="StartContainer for \"cf6586e496a4a65e462d6360e225a9e566e5466530e62256e0bef8fa35b778e1\"" Dec 13 02:37:12.342640 systemd[1]: Started cri-containerd-cf6586e496a4a65e462d6360e225a9e566e5466530e62256e0bef8fa35b778e1.scope. Dec 13 02:37:12.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit: BPF prog-id=114 op=LOAD Dec 13 02:37:12.352000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[2509]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2350 pid=2509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:12.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366363538366534393661346136356534363264363336306532323561 Dec 13 02:37:12.352000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[2509]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2350 pid=2509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:12.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366363538366534393661346136356534363264363336306532323561 Dec 13 02:37:12.352000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit: BPF prog-id=115 op=LOAD Dec 13 02:37:12.352000 audit[2509]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000251d10 items=0 ppid=2350 pid=2509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:12.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366363538366534393661346136356534363264363336306532323561 Dec 13 02:37:12.352000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit: BPF prog-id=116 op=LOAD Dec 13 02:37:12.352000 audit[2509]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000251d58 items=0 ppid=2350 pid=2509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:12.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366363538366534393661346136356534363264363336306532323561 Dec 13 02:37:12.352000 audit: BPF prog-id=116 op=UNLOAD Dec 13 02:37:12.352000 audit: BPF prog-id=115 op=UNLOAD Dec 13 02:37:12.352000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[2509]: AVC avc: denied { perfmon } for pid=2509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit[2509]: AVC avc: denied { bpf } for pid=2509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:12.352000 audit: BPF prog-id=117 op=LOAD Dec 13 02:37:12.352000 audit[2509]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003bc168 items=0 ppid=2350 pid=2509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:12.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366363538366534393661346136356534363264363336306532323561 Dec 13 02:37:12.363231 env[1255]: time="2024-12-13T02:37:12.362793985Z" level=info msg="StartContainer for \"cf6586e496a4a65e462d6360e225a9e566e5466530e62256e0bef8fa35b778e1\" returns successfully" Dec 13 02:37:12.683360 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3825012742.mount: Deactivated successfully. Dec 13 02:37:12.854631 kubelet[2191]: I1213 02:37:12.854600 2191 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-ht2gf" podStartSLOduration=5.854589394 podStartE2EDuration="5.854589394s" podCreationTimestamp="2024-12-13 02:37:07 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:37:07.873845789 +0000 UTC m=+15.205717048" watchObservedRunningTime="2024-12-13 02:37:12.854589394 +0000 UTC m=+20.186460644" Dec 13 02:37:14.941748 kernel: kauditd_printk_skb: 357 callbacks suppressed Dec 13 02:37:14.941851 kernel: audit: type=1325 audit(1734057434.937:897): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2542 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:37:14.937000 audit[2542]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2542 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:37:14.945803 kernel: audit: type=1300 audit(1734057434.937:897): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc11c52680 a2=0 a3=7ffc11c5266c items=0 ppid=2327 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:14.937000 audit[2542]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc11c52680 a2=0 a3=7ffc11c5266c items=0 ppid=2327 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:14.937000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:37:14.948213 kernel: audit: type=1327 audit(1734057434.937:897): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:37:14.945000 audit[2542]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2542 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:37:14.954807 kernel: audit: type=1325 audit(1734057434.945:898): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2542 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:37:14.954901 kernel: audit: type=1300 audit(1734057434.945:898): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc11c52680 a2=0 a3=0 items=0 ppid=2327 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:14.945000 audit[2542]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc11c52680 a2=0 a3=0 items=0 ppid=2327 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:14.956841 kernel: audit: type=1327 audit(1734057434.945:898): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:37:14.945000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:37:14.958786 kernel: audit: type=1325 audit(1734057434.953:899): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2544 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:37:14.953000 audit[2544]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2544 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:37:14.962682 kernel: audit: type=1300 audit(1734057434.953:899): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff51a38dc0 a2=0 a3=7fff51a38dac items=0 ppid=2327 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:14.953000 audit[2544]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff51a38dc0 a2=0 a3=7fff51a38dac items=0 ppid=2327 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:14.953000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:37:14.964662 kernel: audit: type=1327 audit(1734057434.953:899): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:37:14.964774 kernel: audit: type=1325 audit(1734057434.962:900): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2544 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:37:14.962000 audit[2544]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2544 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:37:14.962000 audit[2544]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff51a38dc0 a2=0 a3=0 items=0 ppid=2327 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:14.962000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:37:15.164088 kubelet[2191]: I1213 02:37:15.164048 2191 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7bc55997bb-z4kpm" podStartSLOduration=3.47274343 podStartE2EDuration="8.164036229s" podCreationTimestamp="2024-12-13 02:37:07 +0000 UTC" firstStartedPulling="2024-12-13 02:37:07.630015142 +0000 UTC m=+14.961886390" lastFinishedPulling="2024-12-13 02:37:12.32130794 +0000 UTC m=+19.653179189" observedRunningTime="2024-12-13 02:37:12.880312662 +0000 UTC m=+20.212183921" watchObservedRunningTime="2024-12-13 02:37:15.164036229 +0000 UTC m=+22.495907484" Dec 13 02:37:15.165909 kubelet[2191]: I1213 02:37:15.165880 2191 topology_manager.go:215] "Topology Admit Handler" podUID="c581b982-ef20-46cd-8928-e2c13ac3c3c3" podNamespace="calico-system" podName="calico-typha-5664544fc-9xxfx" Dec 13 02:37:15.194461 systemd[1]: Created slice kubepods-besteffort-podc581b982_ef20_46cd_8928_e2c13ac3c3c3.slice. Dec 13 02:37:15.249388 kubelet[2191]: I1213 02:37:15.249361 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qd5r8\" (UniqueName: \"kubernetes.io/projected/c581b982-ef20-46cd-8928-e2c13ac3c3c3-kube-api-access-qd5r8\") pod \"calico-typha-5664544fc-9xxfx\" (UID: \"c581b982-ef20-46cd-8928-e2c13ac3c3c3\") " pod="calico-system/calico-typha-5664544fc-9xxfx" Dec 13 02:37:15.249388 kubelet[2191]: I1213 02:37:15.249389 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/c581b982-ef20-46cd-8928-e2c13ac3c3c3-typha-certs\") pod \"calico-typha-5664544fc-9xxfx\" (UID: \"c581b982-ef20-46cd-8928-e2c13ac3c3c3\") " pod="calico-system/calico-typha-5664544fc-9xxfx" Dec 13 02:37:15.249526 kubelet[2191]: I1213 02:37:15.249401 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c581b982-ef20-46cd-8928-e2c13ac3c3c3-tigera-ca-bundle\") pod \"calico-typha-5664544fc-9xxfx\" (UID: \"c581b982-ef20-46cd-8928-e2c13ac3c3c3\") " pod="calico-system/calico-typha-5664544fc-9xxfx" Dec 13 02:37:15.317153 kubelet[2191]: I1213 02:37:15.317124 2191 topology_manager.go:215] "Topology Admit Handler" podUID="a36b6963-c328-4fd1-a445-2660f6ea6578" podNamespace="calico-system" podName="calico-node-wzv8n" Dec 13 02:37:15.320578 systemd[1]: Created slice kubepods-besteffort-poda36b6963_c328_4fd1_a445_2660f6ea6578.slice. Dec 13 02:37:15.450494 kubelet[2191]: I1213 02:37:15.450412 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/a36b6963-c328-4fd1-a445-2660f6ea6578-cni-net-dir\") pod \"calico-node-wzv8n\" (UID: \"a36b6963-c328-4fd1-a445-2660f6ea6578\") " pod="calico-system/calico-node-wzv8n" Dec 13 02:37:15.450494 kubelet[2191]: I1213 02:37:15.450439 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/a36b6963-c328-4fd1-a445-2660f6ea6578-policysync\") pod \"calico-node-wzv8n\" (UID: \"a36b6963-c328-4fd1-a445-2660f6ea6578\") " pod="calico-system/calico-node-wzv8n" Dec 13 02:37:15.450494 kubelet[2191]: I1213 02:37:15.450451 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a36b6963-c328-4fd1-a445-2660f6ea6578-tigera-ca-bundle\") pod \"calico-node-wzv8n\" (UID: \"a36b6963-c328-4fd1-a445-2660f6ea6578\") " pod="calico-system/calico-node-wzv8n" Dec 13 02:37:15.450494 kubelet[2191]: I1213 02:37:15.450460 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/a36b6963-c328-4fd1-a445-2660f6ea6578-var-run-calico\") pod \"calico-node-wzv8n\" (UID: \"a36b6963-c328-4fd1-a445-2660f6ea6578\") " pod="calico-system/calico-node-wzv8n" Dec 13 02:37:15.450494 kubelet[2191]: I1213 02:37:15.450470 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a36b6963-c328-4fd1-a445-2660f6ea6578-lib-modules\") pod \"calico-node-wzv8n\" (UID: \"a36b6963-c328-4fd1-a445-2660f6ea6578\") " pod="calico-system/calico-node-wzv8n" Dec 13 02:37:15.450668 kubelet[2191]: I1213 02:37:15.450480 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/a36b6963-c328-4fd1-a445-2660f6ea6578-node-certs\") pod \"calico-node-wzv8n\" (UID: \"a36b6963-c328-4fd1-a445-2660f6ea6578\") " pod="calico-system/calico-node-wzv8n" Dec 13 02:37:15.450668 kubelet[2191]: I1213 02:37:15.450489 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xs8r5\" (UniqueName: \"kubernetes.io/projected/a36b6963-c328-4fd1-a445-2660f6ea6578-kube-api-access-xs8r5\") pod \"calico-node-wzv8n\" (UID: \"a36b6963-c328-4fd1-a445-2660f6ea6578\") " pod="calico-system/calico-node-wzv8n" Dec 13 02:37:15.450668 kubelet[2191]: I1213 02:37:15.450500 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/a36b6963-c328-4fd1-a445-2660f6ea6578-var-lib-calico\") pod \"calico-node-wzv8n\" (UID: \"a36b6963-c328-4fd1-a445-2660f6ea6578\") " pod="calico-system/calico-node-wzv8n" Dec 13 02:37:15.450668 kubelet[2191]: I1213 02:37:15.450508 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/a36b6963-c328-4fd1-a445-2660f6ea6578-cni-log-dir\") pod \"calico-node-wzv8n\" (UID: \"a36b6963-c328-4fd1-a445-2660f6ea6578\") " pod="calico-system/calico-node-wzv8n" Dec 13 02:37:15.450668 kubelet[2191]: I1213 02:37:15.450517 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/a36b6963-c328-4fd1-a445-2660f6ea6578-cni-bin-dir\") pod \"calico-node-wzv8n\" (UID: \"a36b6963-c328-4fd1-a445-2660f6ea6578\") " pod="calico-system/calico-node-wzv8n" Dec 13 02:37:15.450766 kubelet[2191]: I1213 02:37:15.450527 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a36b6963-c328-4fd1-a445-2660f6ea6578-xtables-lock\") pod \"calico-node-wzv8n\" (UID: \"a36b6963-c328-4fd1-a445-2660f6ea6578\") " pod="calico-system/calico-node-wzv8n" Dec 13 02:37:15.450766 kubelet[2191]: I1213 02:37:15.450537 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/a36b6963-c328-4fd1-a445-2660f6ea6578-flexvol-driver-host\") pod \"calico-node-wzv8n\" (UID: \"a36b6963-c328-4fd1-a445-2660f6ea6578\") " pod="calico-system/calico-node-wzv8n" Dec 13 02:37:15.467663 kubelet[2191]: I1213 02:37:15.467636 2191 topology_manager.go:215] "Topology Admit Handler" podUID="63f11487-359c-4b4b-808e-af281c2987db" podNamespace="calico-system" podName="csi-node-driver-kmgrt" Dec 13 02:37:15.467867 kubelet[2191]: E1213 02:37:15.467852 2191 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kmgrt" podUID="63f11487-359c-4b4b-808e-af281c2987db" Dec 13 02:37:15.518669 env[1255]: time="2024-12-13T02:37:15.518405275Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5664544fc-9xxfx,Uid:c581b982-ef20-46cd-8928-e2c13ac3c3c3,Namespace:calico-system,Attempt:0,}" Dec 13 02:37:15.551154 kubelet[2191]: I1213 02:37:15.551127 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/63f11487-359c-4b4b-808e-af281c2987db-varrun\") pod \"csi-node-driver-kmgrt\" (UID: \"63f11487-359c-4b4b-808e-af281c2987db\") " pod="calico-system/csi-node-driver-kmgrt" Dec 13 02:37:15.551252 kubelet[2191]: I1213 02:37:15.551168 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/63f11487-359c-4b4b-808e-af281c2987db-registration-dir\") pod \"csi-node-driver-kmgrt\" (UID: \"63f11487-359c-4b4b-808e-af281c2987db\") " pod="calico-system/csi-node-driver-kmgrt" Dec 13 02:37:15.551252 kubelet[2191]: I1213 02:37:15.551207 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/63f11487-359c-4b4b-808e-af281c2987db-kubelet-dir\") pod \"csi-node-driver-kmgrt\" (UID: \"63f11487-359c-4b4b-808e-af281c2987db\") " pod="calico-system/csi-node-driver-kmgrt" Dec 13 02:37:15.551252 kubelet[2191]: I1213 02:37:15.551229 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rrnlk\" (UniqueName: \"kubernetes.io/projected/63f11487-359c-4b4b-808e-af281c2987db-kube-api-access-rrnlk\") pod \"csi-node-driver-kmgrt\" (UID: \"63f11487-359c-4b4b-808e-af281c2987db\") " pod="calico-system/csi-node-driver-kmgrt" Dec 13 02:37:15.551252 kubelet[2191]: I1213 02:37:15.551250 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/63f11487-359c-4b4b-808e-af281c2987db-socket-dir\") pod \"csi-node-driver-kmgrt\" (UID: \"63f11487-359c-4b4b-808e-af281c2987db\") " pod="calico-system/csi-node-driver-kmgrt" Dec 13 02:37:15.573870 env[1255]: time="2024-12-13T02:37:15.573831473Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:37:15.574025 env[1255]: time="2024-12-13T02:37:15.574009597Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:37:15.574089 env[1255]: time="2024-12-13T02:37:15.574076127Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:37:15.574257 env[1255]: time="2024-12-13T02:37:15.574241339Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1728d99ba5f9ae38849395a23f17f2245b07b86a8bb847d649724e2450547c6c pid=2555 runtime=io.containerd.runc.v2 Dec 13 02:37:15.582239 kubelet[2191]: E1213 02:37:15.582166 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:15.582239 kubelet[2191]: W1213 02:37:15.582180 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:15.582460 kubelet[2191]: E1213 02:37:15.582195 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:15.586722 systemd[1]: Started cri-containerd-1728d99ba5f9ae38849395a23f17f2245b07b86a8bb847d649724e2450547c6c.scope. Dec 13 02:37:15.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.614000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.614000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.614000 audit: BPF prog-id=118 op=LOAD Dec 13 02:37:15.615000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.615000 audit[2565]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2555 pid=2565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:15.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137323864393962613566396165333838343933393561323366313766 Dec 13 02:37:15.615000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.615000 audit[2565]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2555 pid=2565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:15.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137323864393962613566396165333838343933393561323366313766 Dec 13 02:37:15.615000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.615000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.615000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.615000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.615000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.615000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.615000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.615000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.615000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.615000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.615000 audit: BPF prog-id=119 op=LOAD Dec 13 02:37:15.615000 audit[2565]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0000251f0 items=0 ppid=2555 pid=2565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:15.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137323864393962613566396165333838343933393561323366313766 Dec 13 02:37:15.615000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.615000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.615000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.615000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.615000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.615000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.615000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.615000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.615000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.615000 audit: BPF prog-id=120 op=LOAD Dec 13 02:37:15.615000 audit[2565]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000025238 items=0 ppid=2555 pid=2565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:15.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137323864393962613566396165333838343933393561323366313766 Dec 13 02:37:15.615000 audit: BPF prog-id=120 op=UNLOAD Dec 13 02:37:15.615000 audit: BPF prog-id=119 op=UNLOAD Dec 13 02:37:15.615000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.615000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.615000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.615000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.615000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.615000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.615000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.615000 audit[2565]: AVC avc: denied { perfmon } for pid=2565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.615000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.615000 audit[2565]: AVC avc: denied { bpf } for pid=2565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.615000 audit: BPF prog-id=121 op=LOAD Dec 13 02:37:15.615000 audit[2565]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000025648 items=0 ppid=2555 pid=2565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:15.615000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137323864393962613566396165333838343933393561323366313766 Dec 13 02:37:15.623190 env[1255]: time="2024-12-13T02:37:15.623163715Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-wzv8n,Uid:a36b6963-c328-4fd1-a445-2660f6ea6578,Namespace:calico-system,Attempt:0,}" Dec 13 02:37:15.633316 env[1255]: time="2024-12-13T02:37:15.633271035Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:37:15.633430 env[1255]: time="2024-12-13T02:37:15.633295958Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:37:15.633507 env[1255]: time="2024-12-13T02:37:15.633421192Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:37:15.633651 env[1255]: time="2024-12-13T02:37:15.633628397Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dfa425b59624bf60dc317c53aecc0c316d17da0ab354c9a10d3cc7753b8b8613 pid=2592 runtime=io.containerd.runc.v2 Dec 13 02:37:15.645331 systemd[1]: Started cri-containerd-dfa425b59624bf60dc317c53aecc0c316d17da0ab354c9a10d3cc7753b8b8613.scope. Dec 13 02:37:15.652310 kubelet[2191]: E1213 02:37:15.651972 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:15.652310 kubelet[2191]: W1213 02:37:15.651986 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:15.652310 kubelet[2191]: E1213 02:37:15.652000 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:15.652310 kubelet[2191]: E1213 02:37:15.652110 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:15.652310 kubelet[2191]: W1213 02:37:15.652115 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:15.652310 kubelet[2191]: E1213 02:37:15.652126 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:15.656699 kubelet[2191]: E1213 02:37:15.652653 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:15.656699 kubelet[2191]: W1213 02:37:15.652659 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:15.656699 kubelet[2191]: E1213 02:37:15.652668 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:15.656699 kubelet[2191]: E1213 02:37:15.652773 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:15.656699 kubelet[2191]: W1213 02:37:15.652777 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:15.656699 kubelet[2191]: E1213 02:37:15.652782 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:15.656699 kubelet[2191]: E1213 02:37:15.652874 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:15.656699 kubelet[2191]: W1213 02:37:15.652879 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:15.656699 kubelet[2191]: E1213 02:37:15.652884 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:15.656699 kubelet[2191]: E1213 02:37:15.652985 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:15.656998 kubelet[2191]: W1213 02:37:15.652990 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:15.656998 kubelet[2191]: E1213 02:37:15.652995 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:15.656998 kubelet[2191]: E1213 02:37:15.653079 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:15.656998 kubelet[2191]: W1213 02:37:15.653084 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:15.656998 kubelet[2191]: E1213 02:37:15.653089 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:15.656998 kubelet[2191]: E1213 02:37:15.653168 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:15.656998 kubelet[2191]: W1213 02:37:15.653172 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:15.656998 kubelet[2191]: E1213 02:37:15.653177 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:15.656998 kubelet[2191]: E1213 02:37:15.653274 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:15.656998 kubelet[2191]: W1213 02:37:15.653279 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:15.657178 kubelet[2191]: E1213 02:37:15.653285 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:15.657178 kubelet[2191]: E1213 02:37:15.654169 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:15.657178 kubelet[2191]: W1213 02:37:15.654177 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:15.657178 kubelet[2191]: E1213 02:37:15.654188 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:15.657178 kubelet[2191]: E1213 02:37:15.654524 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:15.657178 kubelet[2191]: W1213 02:37:15.654533 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:15.657178 kubelet[2191]: E1213 02:37:15.654542 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:15.657178 kubelet[2191]: E1213 02:37:15.654728 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:15.657178 kubelet[2191]: W1213 02:37:15.654737 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:15.657178 kubelet[2191]: E1213 02:37:15.654745 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:15.657388 kubelet[2191]: E1213 02:37:15.655420 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:15.657388 kubelet[2191]: W1213 02:37:15.655428 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:15.657388 kubelet[2191]: E1213 02:37:15.655436 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:15.657388 kubelet[2191]: E1213 02:37:15.655510 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:15.657388 kubelet[2191]: W1213 02:37:15.655515 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:15.657388 kubelet[2191]: E1213 02:37:15.655519 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:15.657388 kubelet[2191]: E1213 02:37:15.655596 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:15.657388 kubelet[2191]: W1213 02:37:15.655600 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:15.657388 kubelet[2191]: E1213 02:37:15.655605 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:15.657388 kubelet[2191]: E1213 02:37:15.655701 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:15.657579 kubelet[2191]: W1213 02:37:15.655705 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:15.657579 kubelet[2191]: E1213 02:37:15.655710 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:15.657579 kubelet[2191]: E1213 02:37:15.655793 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:15.657579 kubelet[2191]: W1213 02:37:15.655797 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:15.657579 kubelet[2191]: E1213 02:37:15.655802 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:15.657579 kubelet[2191]: E1213 02:37:15.655869 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:15.657579 kubelet[2191]: W1213 02:37:15.655873 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:15.657579 kubelet[2191]: E1213 02:37:15.655877 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:15.657579 kubelet[2191]: E1213 02:37:15.655941 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:15.657579 kubelet[2191]: W1213 02:37:15.655945 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:15.657751 kubelet[2191]: E1213 02:37:15.655949 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:15.657751 kubelet[2191]: E1213 02:37:15.656027 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:15.657751 kubelet[2191]: W1213 02:37:15.656031 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:15.657751 kubelet[2191]: E1213 02:37:15.656035 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:15.657751 kubelet[2191]: E1213 02:37:15.656104 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:15.657751 kubelet[2191]: W1213 02:37:15.656108 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:15.657751 kubelet[2191]: E1213 02:37:15.656113 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:15.657751 kubelet[2191]: E1213 02:37:15.656179 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:15.657751 kubelet[2191]: W1213 02:37:15.656183 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:15.657751 kubelet[2191]: E1213 02:37:15.656187 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:15.657923 kubelet[2191]: E1213 02:37:15.656267 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:15.657923 kubelet[2191]: W1213 02:37:15.656271 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:15.657923 kubelet[2191]: E1213 02:37:15.656276 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:15.657923 kubelet[2191]: E1213 02:37:15.657364 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:15.657923 kubelet[2191]: W1213 02:37:15.657370 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:15.657923 kubelet[2191]: E1213 02:37:15.657377 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:15.658311 kubelet[2191]: E1213 02:37:15.658273 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:15.658311 kubelet[2191]: W1213 02:37:15.658281 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:15.658311 kubelet[2191]: E1213 02:37:15.658287 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:15.659460 kubelet[2191]: E1213 02:37:15.659421 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:15.659460 kubelet[2191]: W1213 02:37:15.659429 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:15.659460 kubelet[2191]: E1213 02:37:15.659435 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:15.659747 env[1255]: time="2024-12-13T02:37:15.659712005Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5664544fc-9xxfx,Uid:c581b982-ef20-46cd-8928-e2c13ac3c3c3,Namespace:calico-system,Attempt:0,} returns sandbox id \"1728d99ba5f9ae38849395a23f17f2245b07b86a8bb847d649724e2450547c6c\"" Dec 13 02:37:15.668014 env[1255]: time="2024-12-13T02:37:15.665904711Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 02:37:15.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.668000 audit: BPF prog-id=122 op=LOAD Dec 13 02:37:15.669000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.669000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2592 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:15.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466613432356235393632346266363064633331376335336165636330 Dec 13 02:37:15.669000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.669000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2592 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:15.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466613432356235393632346266363064633331376335336165636330 Dec 13 02:37:15.669000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.669000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.669000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.669000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.669000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.669000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.669000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.669000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.669000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.669000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.669000 audit: BPF prog-id=123 op=LOAD Dec 13 02:37:15.669000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000253ce0 items=0 ppid=2592 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:15.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466613432356235393632346266363064633331376335336165636330 Dec 13 02:37:15.670000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.670000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.670000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.670000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.670000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.670000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.670000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.670000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.670000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.670000 audit: BPF prog-id=124 op=LOAD Dec 13 02:37:15.670000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000253d28 items=0 ppid=2592 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:15.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466613432356235393632346266363064633331376335336165636330 Dec 13 02:37:15.670000 audit: BPF prog-id=124 op=UNLOAD Dec 13 02:37:15.671000 audit: BPF prog-id=123 op=UNLOAD Dec 13 02:37:15.671000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.671000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.671000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.671000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.671000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.671000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.671000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.671000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.671000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.671000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:15.671000 audit: BPF prog-id=125 op=LOAD Dec 13 02:37:15.671000 audit[2599]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000342138 items=0 ppid=2592 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:15.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466613432356235393632346266363064633331376335336165636330 Dec 13 02:37:15.684940 env[1255]: time="2024-12-13T02:37:15.684649481Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-wzv8n,Uid:a36b6963-c328-4fd1-a445-2660f6ea6578,Namespace:calico-system,Attempt:0,} returns sandbox id \"dfa425b59624bf60dc317c53aecc0c316d17da0ab354c9a10d3cc7753b8b8613\"" Dec 13 02:37:15.971000 audit[2658]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2658 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:37:15.971000 audit[2658]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7fffa0d5e360 a2=0 a3=7fffa0d5e34c items=0 ppid=2327 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:15.971000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:37:15.976000 audit[2658]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2658 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:37:15.976000 audit[2658]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffa0d5e360 a2=0 a3=0 items=0 ppid=2327 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:15.976000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:37:16.846021 kubelet[2191]: E1213 02:37:16.845996 2191 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kmgrt" podUID="63f11487-359c-4b4b-808e-af281c2987db" Dec 13 02:37:17.077360 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount291906557.mount: Deactivated successfully. Dec 13 02:37:18.296320 env[1255]: time="2024-12-13T02:37:18.296293077Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:18.323856 env[1255]: time="2024-12-13T02:37:18.323828272Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:18.330423 env[1255]: time="2024-12-13T02:37:18.330408456Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:18.342008 env[1255]: time="2024-12-13T02:37:18.341987188Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:18.342299 env[1255]: time="2024-12-13T02:37:18.342281519Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 02:37:18.343220 env[1255]: time="2024-12-13T02:37:18.343207055Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 02:37:18.406439 env[1255]: time="2024-12-13T02:37:18.406410668Z" level=info msg="CreateContainer within sandbox \"1728d99ba5f9ae38849395a23f17f2245b07b86a8bb847d649724e2450547c6c\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 02:37:18.430635 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1398858571.mount: Deactivated successfully. Dec 13 02:37:18.431819 env[1255]: time="2024-12-13T02:37:18.431744247Z" level=info msg="CreateContainer within sandbox \"1728d99ba5f9ae38849395a23f17f2245b07b86a8bb847d649724e2450547c6c\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"f40ff7d13463ec3380b0870fd7a973d7972bd9f02b5f372a3bfcb58d890e6572\"" Dec 13 02:37:18.434737 env[1255]: time="2024-12-13T02:37:18.434716207Z" level=info msg="StartContainer for \"f40ff7d13463ec3380b0870fd7a973d7972bd9f02b5f372a3bfcb58d890e6572\"" Dec 13 02:37:18.449454 systemd[1]: Started cri-containerd-f40ff7d13463ec3380b0870fd7a973d7972bd9f02b5f372a3bfcb58d890e6572.scope. Dec 13 02:37:18.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.461000 audit: BPF prog-id=126 op=LOAD Dec 13 02:37:18.462000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.462000 audit[2670]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2555 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:18.462000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634306666376431333436336563333338306230383730666437613937 Dec 13 02:37:18.462000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.462000 audit[2670]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2555 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:18.462000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634306666376431333436336563333338306230383730666437613937 Dec 13 02:37:18.462000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.462000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.462000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.462000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.462000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.462000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.462000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.462000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.462000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.462000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.462000 audit: BPF prog-id=127 op=LOAD Dec 13 02:37:18.462000 audit[2670]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00037e950 items=0 ppid=2555 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:18.462000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634306666376431333436336563333338306230383730666437613937 Dec 13 02:37:18.463000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.463000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.463000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.463000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.463000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.463000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.463000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.463000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.463000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.463000 audit: BPF prog-id=128 op=LOAD Dec 13 02:37:18.463000 audit[2670]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00037e998 items=0 ppid=2555 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:18.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634306666376431333436336563333338306230383730666437613937 Dec 13 02:37:18.463000 audit: BPF prog-id=128 op=UNLOAD Dec 13 02:37:18.463000 audit: BPF prog-id=127 op=UNLOAD Dec 13 02:37:18.463000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.463000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.463000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.463000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.463000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.463000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.463000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.463000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.463000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.463000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:18.463000 audit: BPF prog-id=129 op=LOAD Dec 13 02:37:18.463000 audit[2670]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00037eda8 items=0 ppid=2555 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:18.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634306666376431333436336563333338306230383730666437613937 Dec 13 02:37:18.486301 env[1255]: time="2024-12-13T02:37:18.486274346Z" level=info msg="StartContainer for \"f40ff7d13463ec3380b0870fd7a973d7972bd9f02b5f372a3bfcb58d890e6572\" returns successfully" Dec 13 02:37:18.849561 kubelet[2191]: E1213 02:37:18.849540 2191 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kmgrt" podUID="63f11487-359c-4b4b-808e-af281c2987db" Dec 13 02:37:18.934958 kubelet[2191]: E1213 02:37:18.934943 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:18.935060 kubelet[2191]: W1213 02:37:18.935050 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:18.935129 kubelet[2191]: E1213 02:37:18.935113 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:18.935298 kubelet[2191]: E1213 02:37:18.935292 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:18.935344 kubelet[2191]: W1213 02:37:18.935336 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:18.935403 kubelet[2191]: E1213 02:37:18.935396 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:18.935560 kubelet[2191]: E1213 02:37:18.935553 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:18.935609 kubelet[2191]: W1213 02:37:18.935601 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:18.935660 kubelet[2191]: E1213 02:37:18.935653 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:18.935812 kubelet[2191]: E1213 02:37:18.935806 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:18.935856 kubelet[2191]: W1213 02:37:18.935848 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:18.935912 kubelet[2191]: E1213 02:37:18.935905 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:18.936078 kubelet[2191]: E1213 02:37:18.936072 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:18.936123 kubelet[2191]: W1213 02:37:18.936115 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:18.936176 kubelet[2191]: E1213 02:37:18.936169 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:18.936339 kubelet[2191]: E1213 02:37:18.936332 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:18.936395 kubelet[2191]: W1213 02:37:18.936388 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:18.936444 kubelet[2191]: E1213 02:37:18.936436 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:18.936598 kubelet[2191]: E1213 02:37:18.936591 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:18.936648 kubelet[2191]: W1213 02:37:18.936635 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:18.936835 kubelet[2191]: E1213 02:37:18.936743 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:18.936982 kubelet[2191]: E1213 02:37:18.936976 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:18.937034 kubelet[2191]: W1213 02:37:18.937026 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:18.937090 kubelet[2191]: E1213 02:37:18.937082 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:18.937310 kubelet[2191]: E1213 02:37:18.937303 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:18.937411 kubelet[2191]: W1213 02:37:18.937403 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:18.937462 kubelet[2191]: E1213 02:37:18.937454 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:18.937624 kubelet[2191]: E1213 02:37:18.937617 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:18.937676 kubelet[2191]: W1213 02:37:18.937662 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:18.937770 kubelet[2191]: E1213 02:37:18.937763 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:18.937913 kubelet[2191]: E1213 02:37:18.937907 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:18.937966 kubelet[2191]: W1213 02:37:18.937958 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:18.938010 kubelet[2191]: E1213 02:37:18.938002 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:18.938157 kubelet[2191]: E1213 02:37:18.938151 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:18.938215 kubelet[2191]: W1213 02:37:18.938194 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:18.938269 kubelet[2191]: E1213 02:37:18.938261 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:18.938395 kubelet[2191]: E1213 02:37:18.938389 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:18.938495 kubelet[2191]: W1213 02:37:18.938487 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:18.938551 kubelet[2191]: E1213 02:37:18.938544 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:18.939637 kubelet[2191]: E1213 02:37:18.939629 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:18.939738 kubelet[2191]: W1213 02:37:18.939730 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:18.939788 kubelet[2191]: E1213 02:37:18.939779 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:18.939910 kubelet[2191]: E1213 02:37:18.939904 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:18.939970 kubelet[2191]: W1213 02:37:18.939962 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:18.940021 kubelet[2191]: E1213 02:37:18.940012 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:18.972970 kubelet[2191]: E1213 02:37:18.972953 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:18.973079 kubelet[2191]: W1213 02:37:18.973068 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:18.973133 kubelet[2191]: E1213 02:37:18.973123 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:18.973325 kubelet[2191]: E1213 02:37:18.973317 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:18.973377 kubelet[2191]: W1213 02:37:18.973369 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:18.973430 kubelet[2191]: E1213 02:37:18.973422 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:18.973598 kubelet[2191]: E1213 02:37:18.973591 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:18.973644 kubelet[2191]: W1213 02:37:18.973636 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:18.973693 kubelet[2191]: E1213 02:37:18.973685 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:18.973830 kubelet[2191]: E1213 02:37:18.973822 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:18.973879 kubelet[2191]: W1213 02:37:18.973870 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:18.973928 kubelet[2191]: E1213 02:37:18.973920 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:18.974059 kubelet[2191]: E1213 02:37:18.974053 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:18.974103 kubelet[2191]: W1213 02:37:18.974095 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:18.974155 kubelet[2191]: E1213 02:37:18.974146 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:18.974288 kubelet[2191]: E1213 02:37:18.974283 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:18.974330 kubelet[2191]: W1213 02:37:18.974322 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:18.974384 kubelet[2191]: E1213 02:37:18.974376 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:18.974475 kubelet[2191]: E1213 02:37:18.974463 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:18.974475 kubelet[2191]: W1213 02:37:18.974473 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:18.974534 kubelet[2191]: E1213 02:37:18.974483 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:18.974577 kubelet[2191]: E1213 02:37:18.974564 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:18.974577 kubelet[2191]: W1213 02:37:18.974572 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:18.974577 kubelet[2191]: E1213 02:37:18.974577 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:18.974678 kubelet[2191]: E1213 02:37:18.974647 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:18.974678 kubelet[2191]: W1213 02:37:18.974651 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:18.974678 kubelet[2191]: E1213 02:37:18.974656 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:18.974745 kubelet[2191]: E1213 02:37:18.974735 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:18.974745 kubelet[2191]: W1213 02:37:18.974741 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:18.974798 kubelet[2191]: E1213 02:37:18.974749 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:18.974924 kubelet[2191]: E1213 02:37:18.974918 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:18.974969 kubelet[2191]: W1213 02:37:18.974961 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:18.975021 kubelet[2191]: E1213 02:37:18.975013 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:18.975113 kubelet[2191]: E1213 02:37:18.975100 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:18.975113 kubelet[2191]: W1213 02:37:18.975108 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:18.975169 kubelet[2191]: E1213 02:37:18.975116 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:18.975307 kubelet[2191]: E1213 02:37:18.975301 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:18.975356 kubelet[2191]: W1213 02:37:18.975348 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:18.975407 kubelet[2191]: E1213 02:37:18.975399 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:18.975487 kubelet[2191]: E1213 02:37:18.975476 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:18.975487 kubelet[2191]: W1213 02:37:18.975485 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:18.975544 kubelet[2191]: E1213 02:37:18.975492 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:18.975571 kubelet[2191]: E1213 02:37:18.975565 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:18.975571 kubelet[2191]: W1213 02:37:18.975570 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:18.975617 kubelet[2191]: E1213 02:37:18.975575 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:18.975663 kubelet[2191]: E1213 02:37:18.975651 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:18.975663 kubelet[2191]: W1213 02:37:18.975659 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:18.975663 kubelet[2191]: E1213 02:37:18.975666 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:18.975851 kubelet[2191]: E1213 02:37:18.975844 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:18.975900 kubelet[2191]: W1213 02:37:18.975892 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:18.975948 kubelet[2191]: E1213 02:37:18.975941 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:18.976097 kubelet[2191]: E1213 02:37:18.976090 2191 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:37:18.976145 kubelet[2191]: W1213 02:37:18.976137 2191 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:37:18.976214 kubelet[2191]: E1213 02:37:18.976192 2191 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:37:19.656656 env[1255]: time="2024-12-13T02:37:19.656603679Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:19.657404 env[1255]: time="2024-12-13T02:37:19.657389857Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:19.658552 env[1255]: time="2024-12-13T02:37:19.658539248Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:19.659215 env[1255]: time="2024-12-13T02:37:19.659193482Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:19.659554 env[1255]: time="2024-12-13T02:37:19.659539645Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 02:37:19.664891 env[1255]: time="2024-12-13T02:37:19.664869718Z" level=info msg="CreateContainer within sandbox \"dfa425b59624bf60dc317c53aecc0c316d17da0ab354c9a10d3cc7753b8b8613\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 02:37:19.676441 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount145596363.mount: Deactivated successfully. Dec 13 02:37:19.677949 env[1255]: time="2024-12-13T02:37:19.677928006Z" level=info msg="CreateContainer within sandbox \"dfa425b59624bf60dc317c53aecc0c316d17da0ab354c9a10d3cc7753b8b8613\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"358d1cbcc332195bbea405309de5de358eab494cf89ab9baf7c91cd1e0ac26bd\"" Dec 13 02:37:19.678866 env[1255]: time="2024-12-13T02:37:19.678849030Z" level=info msg="StartContainer for \"358d1cbcc332195bbea405309de5de358eab494cf89ab9baf7c91cd1e0ac26bd\"" Dec 13 02:37:19.693732 systemd[1]: Started cri-containerd-358d1cbcc332195bbea405309de5de358eab494cf89ab9baf7c91cd1e0ac26bd.scope. Dec 13 02:37:19.706000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:19.706000 audit[2739]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f2ef0101018 items=0 ppid=2592 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:19.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335386431636263633333323139356262656134303533303964653564 Dec 13 02:37:19.706000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:19.706000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:19.706000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:19.706000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:19.706000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:19.706000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:19.706000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:19.706000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:19.706000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:19.706000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:19.706000 audit: BPF prog-id=130 op=LOAD Dec 13 02:37:19.706000 audit[2739]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002ffd48 items=0 ppid=2592 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:19.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335386431636263633333323139356262656134303533303964653564 Dec 13 02:37:19.706000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:19.706000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:19.706000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:19.706000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:19.706000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:19.706000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:19.706000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:19.706000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:19.706000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:19.706000 audit: BPF prog-id=131 op=LOAD Dec 13 02:37:19.706000 audit[2739]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002ffd98 items=0 ppid=2592 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:19.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335386431636263633333323139356262656134303533303964653564 Dec 13 02:37:19.707000 audit: BPF prog-id=131 op=UNLOAD Dec 13 02:37:19.707000 audit: BPF prog-id=130 op=UNLOAD Dec 13 02:37:19.707000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:19.707000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:19.707000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:19.707000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:19.707000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:19.707000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:19.707000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:19.707000 audit[2739]: AVC avc: denied { perfmon } for pid=2739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:19.707000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:19.707000 audit[2739]: AVC avc: denied { bpf } for pid=2739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:19.707000 audit: BPF prog-id=132 op=LOAD Dec 13 02:37:19.707000 audit[2739]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002ffe28 items=0 ppid=2592 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:19.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335386431636263633333323139356262656134303533303964653564 Dec 13 02:37:19.725882 env[1255]: time="2024-12-13T02:37:19.725854649Z" level=info msg="StartContainer for \"358d1cbcc332195bbea405309de5de358eab494cf89ab9baf7c91cd1e0ac26bd\" returns successfully" Dec 13 02:37:19.734047 systemd[1]: cri-containerd-358d1cbcc332195bbea405309de5de358eab494cf89ab9baf7c91cd1e0ac26bd.scope: Deactivated successfully. Dec 13 02:37:19.737000 audit: BPF prog-id=132 op=UNLOAD Dec 13 02:37:19.883553 kubelet[2191]: I1213 02:37:19.883035 2191 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:37:20.152103 kubelet[2191]: I1213 02:37:20.152067 2191 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-5664544fc-9xxfx" podStartSLOduration=2.474635609 podStartE2EDuration="5.152054974s" podCreationTimestamp="2024-12-13 02:37:15 +0000 UTC" firstStartedPulling="2024-12-13 02:37:15.665624185 +0000 UTC m=+22.997495431" lastFinishedPulling="2024-12-13 02:37:18.343043551 +0000 UTC m=+25.674914796" observedRunningTime="2024-12-13 02:37:18.892646039 +0000 UTC m=+26.224517296" watchObservedRunningTime="2024-12-13 02:37:20.152054974 +0000 UTC m=+27.483926231" Dec 13 02:37:20.293164 env[1255]: time="2024-12-13T02:37:20.293123528Z" level=info msg="shim disconnected" id=358d1cbcc332195bbea405309de5de358eab494cf89ab9baf7c91cd1e0ac26bd Dec 13 02:37:20.293298 env[1255]: time="2024-12-13T02:37:20.293164294Z" level=warning msg="cleaning up after shim disconnected" id=358d1cbcc332195bbea405309de5de358eab494cf89ab9baf7c91cd1e0ac26bd namespace=k8s.io Dec 13 02:37:20.293298 env[1255]: time="2024-12-13T02:37:20.293176803Z" level=info msg="cleaning up dead shim" Dec 13 02:37:20.299783 env[1255]: time="2024-12-13T02:37:20.299760918Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:37:20Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2782 runtime=io.containerd.runc.v2\n" Dec 13 02:37:20.356150 systemd[1]: run-containerd-runc-k8s.io-358d1cbcc332195bbea405309de5de358eab494cf89ab9baf7c91cd1e0ac26bd-runc.xY5bKo.mount: Deactivated successfully. Dec 13 02:37:20.356239 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-358d1cbcc332195bbea405309de5de358eab494cf89ab9baf7c91cd1e0ac26bd-rootfs.mount: Deactivated successfully. Dec 13 02:37:20.846271 kubelet[2191]: E1213 02:37:20.846251 2191 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kmgrt" podUID="63f11487-359c-4b4b-808e-af281c2987db" Dec 13 02:37:20.885509 env[1255]: time="2024-12-13T02:37:20.885486613Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 02:37:22.846717 kubelet[2191]: E1213 02:37:22.846690 2191 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kmgrt" podUID="63f11487-359c-4b4b-808e-af281c2987db" Dec 13 02:37:24.310563 env[1255]: time="2024-12-13T02:37:24.310534563Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:24.322937 env[1255]: time="2024-12-13T02:37:24.322913277Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:24.327670 env[1255]: time="2024-12-13T02:37:24.327648296Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:24.329389 env[1255]: time="2024-12-13T02:37:24.329374848Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:24.329560 env[1255]: time="2024-12-13T02:37:24.329540424Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 02:37:24.332154 env[1255]: time="2024-12-13T02:37:24.332134473Z" level=info msg="CreateContainer within sandbox \"dfa425b59624bf60dc317c53aecc0c316d17da0ab354c9a10d3cc7753b8b8613\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 02:37:24.338752 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4125572741.mount: Deactivated successfully. Dec 13 02:37:24.340422 env[1255]: time="2024-12-13T02:37:24.340395697Z" level=info msg="CreateContainer within sandbox \"dfa425b59624bf60dc317c53aecc0c316d17da0ab354c9a10d3cc7753b8b8613\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"48b674f06fe29bd38a0298f8daea620d0469d97c992ac6f3ca3c723ba14bfa41\"" Dec 13 02:37:24.341677 env[1255]: time="2024-12-13T02:37:24.341651169Z" level=info msg="StartContainer for \"48b674f06fe29bd38a0298f8daea620d0469d97c992ac6f3ca3c723ba14bfa41\"" Dec 13 02:37:24.357239 systemd[1]: Started cri-containerd-48b674f06fe29bd38a0298f8daea620d0469d97c992ac6f3ca3c723ba14bfa41.scope. Dec 13 02:37:24.389000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.391264 kernel: kauditd_printk_skb: 223 callbacks suppressed Dec 13 02:37:24.391369 kernel: audit: type=1400 audit(1734057444.389:964): avc: denied { perfmon } for pid=2803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.389000 audit[2803]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f59c81dcc38 items=0 ppid=2592 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:24.398893 kernel: audit: type=1300 audit(1734057444.389:964): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f59c81dcc38 items=0 ppid=2592 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:24.402842 kernel: audit: type=1327 audit(1734057444.389:964): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438623637346630366665323962643338613032393866386461656136 Dec 13 02:37:24.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438623637346630366665323962643338613032393866386461656136 Dec 13 02:37:24.408298 kernel: audit: type=1400 audit(1734057444.389:965): avc: denied { bpf } for pid=2803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.389000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.389000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.411223 kernel: audit: type=1400 audit(1734057444.389:965): avc: denied { bpf } for pid=2803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.389000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.418962 kernel: audit: type=1400 audit(1734057444.389:965): avc: denied { bpf } for pid=2803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.419024 kernel: audit: type=1400 audit(1734057444.389:965): avc: denied { perfmon } for pid=2803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.389000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.389000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.423315 kernel: audit: type=1400 audit(1734057444.389:965): avc: denied { perfmon } for pid=2803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.389000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.426299 kernel: audit: type=1400 audit(1734057444.389:965): avc: denied { perfmon } for pid=2803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.389000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.389000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.389000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.389000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.429225 kernel: audit: type=1400 audit(1734057444.389:965): avc: denied { perfmon } for pid=2803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.389000 audit: BPF prog-id=133 op=LOAD Dec 13 02:37:24.389000 audit[2803]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000383c58 items=0 ppid=2592 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:24.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438623637346630366665323962643338613032393866386461656136 Dec 13 02:37:24.389000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.389000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.389000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.389000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.389000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.389000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.389000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.389000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.389000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.389000 audit: BPF prog-id=134 op=LOAD Dec 13 02:37:24.389000 audit[2803]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000383ca8 items=0 ppid=2592 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:24.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438623637346630366665323962643338613032393866386461656136 Dec 13 02:37:24.389000 audit: BPF prog-id=134 op=UNLOAD Dec 13 02:37:24.389000 audit: BPF prog-id=133 op=UNLOAD Dec 13 02:37:24.389000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.389000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.389000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.389000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.389000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.389000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.389000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.389000 audit[2803]: AVC avc: denied { perfmon } for pid=2803 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.389000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.389000 audit[2803]: AVC avc: denied { bpf } for pid=2803 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:24.389000 audit: BPF prog-id=135 op=LOAD Dec 13 02:37:24.389000 audit[2803]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000383d38 items=0 ppid=2592 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:24.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438623637346630366665323962643338613032393866386461656136 Dec 13 02:37:24.439187 env[1255]: time="2024-12-13T02:37:24.439163856Z" level=info msg="StartContainer for \"48b674f06fe29bd38a0298f8daea620d0469d97c992ac6f3ca3c723ba14bfa41\" returns successfully" Dec 13 02:37:24.846014 kubelet[2191]: E1213 02:37:24.845980 2191 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kmgrt" podUID="63f11487-359c-4b4b-808e-af281c2987db" Dec 13 02:37:25.978268 env[1255]: time="2024-12-13T02:37:25.978231520Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 02:37:25.980299 systemd[1]: cri-containerd-48b674f06fe29bd38a0298f8daea620d0469d97c992ac6f3ca3c723ba14bfa41.scope: Deactivated successfully. Dec 13 02:37:25.982000 audit: BPF prog-id=135 op=UNLOAD Dec 13 02:37:25.991267 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-48b674f06fe29bd38a0298f8daea620d0469d97c992ac6f3ca3c723ba14bfa41-rootfs.mount: Deactivated successfully. Dec 13 02:37:25.995420 env[1255]: time="2024-12-13T02:37:25.995396092Z" level=info msg="shim disconnected" id=48b674f06fe29bd38a0298f8daea620d0469d97c992ac6f3ca3c723ba14bfa41 Dec 13 02:37:25.995545 env[1255]: time="2024-12-13T02:37:25.995533221Z" level=warning msg="cleaning up after shim disconnected" id=48b674f06fe29bd38a0298f8daea620d0469d97c992ac6f3ca3c723ba14bfa41 namespace=k8s.io Dec 13 02:37:25.995614 env[1255]: time="2024-12-13T02:37:25.995605317Z" level=info msg="cleaning up dead shim" Dec 13 02:37:26.000484 env[1255]: time="2024-12-13T02:37:26.000460643Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:37:25Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2840 runtime=io.containerd.runc.v2\n" Dec 13 02:37:26.032680 kubelet[2191]: I1213 02:37:26.032658 2191 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 02:37:26.048440 kubelet[2191]: I1213 02:37:26.048395 2191 topology_manager.go:215] "Topology Admit Handler" podUID="011e69b1-6ba1-45b9-baab-a1b5873b9984" podNamespace="kube-system" podName="coredns-7db6d8ff4d-m6sv5" Dec 13 02:37:26.063694 kubelet[2191]: I1213 02:37:26.063671 2191 topology_manager.go:215] "Topology Admit Handler" podUID="049a69b1-19e4-47a5-9d0a-afb8d1ea62a8" podNamespace="kube-system" podName="coredns-7db6d8ff4d-jrp2n" Dec 13 02:37:26.063970 kubelet[2191]: I1213 02:37:26.063958 2191 topology_manager.go:215] "Topology Admit Handler" podUID="5741a8e0-bb09-43e6-8da2-fba27a6e1250" podNamespace="calico-apiserver" podName="calico-apiserver-7dfb7b6b59-pdtd9" Dec 13 02:37:26.064459 kubelet[2191]: I1213 02:37:26.064113 2191 topology_manager.go:215] "Topology Admit Handler" podUID="9a772036-63d2-4fbd-b90f-e00c4c528987" podNamespace="calico-apiserver" podName="calico-apiserver-7dfb7b6b59-sf2c7" Dec 13 02:37:26.064459 kubelet[2191]: I1213 02:37:26.064175 2191 topology_manager.go:215] "Topology Admit Handler" podUID="357f714f-1c9f-4765-8e1c-8659524fb9c0" podNamespace="calico-system" podName="calico-kube-controllers-6bb7fd499-v5d2m" Dec 13 02:37:26.085885 systemd[1]: Created slice kubepods-burstable-pod011e69b1_6ba1_45b9_baab_a1b5873b9984.slice. Dec 13 02:37:26.094129 systemd[1]: Created slice kubepods-besteffort-pod357f714f_1c9f_4765_8e1c_8659524fb9c0.slice. Dec 13 02:37:26.099646 systemd[1]: Created slice kubepods-burstable-pod049a69b1_19e4_47a5_9d0a_afb8d1ea62a8.slice. Dec 13 02:37:26.103672 systemd[1]: Created slice kubepods-besteffort-pod5741a8e0_bb09_43e6_8da2_fba27a6e1250.slice. Dec 13 02:37:26.108877 systemd[1]: Created slice kubepods-besteffort-pod9a772036_63d2_4fbd_b90f_e00c4c528987.slice. Dec 13 02:37:26.176812 kubelet[2191]: I1213 02:37:26.176786 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/357f714f-1c9f-4765-8e1c-8659524fb9c0-tigera-ca-bundle\") pod \"calico-kube-controllers-6bb7fd499-v5d2m\" (UID: \"357f714f-1c9f-4765-8e1c-8659524fb9c0\") " pod="calico-system/calico-kube-controllers-6bb7fd499-v5d2m" Dec 13 02:37:26.176964 kubelet[2191]: I1213 02:37:26.176953 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bh46v\" (UniqueName: \"kubernetes.io/projected/9a772036-63d2-4fbd-b90f-e00c4c528987-kube-api-access-bh46v\") pod \"calico-apiserver-7dfb7b6b59-sf2c7\" (UID: \"9a772036-63d2-4fbd-b90f-e00c4c528987\") " pod="calico-apiserver/calico-apiserver-7dfb7b6b59-sf2c7" Dec 13 02:37:26.177035 kubelet[2191]: I1213 02:37:26.177026 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-c6bv5\" (UniqueName: \"kubernetes.io/projected/011e69b1-6ba1-45b9-baab-a1b5873b9984-kube-api-access-c6bv5\") pod \"coredns-7db6d8ff4d-m6sv5\" (UID: \"011e69b1-6ba1-45b9-baab-a1b5873b9984\") " pod="kube-system/coredns-7db6d8ff4d-m6sv5" Dec 13 02:37:26.177096 kubelet[2191]: I1213 02:37:26.177087 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hp5gc\" (UniqueName: \"kubernetes.io/projected/049a69b1-19e4-47a5-9d0a-afb8d1ea62a8-kube-api-access-hp5gc\") pod \"coredns-7db6d8ff4d-jrp2n\" (UID: \"049a69b1-19e4-47a5-9d0a-afb8d1ea62a8\") " pod="kube-system/coredns-7db6d8ff4d-jrp2n" Dec 13 02:37:26.177159 kubelet[2191]: I1213 02:37:26.177149 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/049a69b1-19e4-47a5-9d0a-afb8d1ea62a8-config-volume\") pod \"coredns-7db6d8ff4d-jrp2n\" (UID: \"049a69b1-19e4-47a5-9d0a-afb8d1ea62a8\") " pod="kube-system/coredns-7db6d8ff4d-jrp2n" Dec 13 02:37:26.177264 kubelet[2191]: I1213 02:37:26.177255 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8zbn8\" (UniqueName: \"kubernetes.io/projected/357f714f-1c9f-4765-8e1c-8659524fb9c0-kube-api-access-8zbn8\") pod \"calico-kube-controllers-6bb7fd499-v5d2m\" (UID: \"357f714f-1c9f-4765-8e1c-8659524fb9c0\") " pod="calico-system/calico-kube-controllers-6bb7fd499-v5d2m" Dec 13 02:37:26.177344 kubelet[2191]: I1213 02:37:26.177319 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/011e69b1-6ba1-45b9-baab-a1b5873b9984-config-volume\") pod \"coredns-7db6d8ff4d-m6sv5\" (UID: \"011e69b1-6ba1-45b9-baab-a1b5873b9984\") " pod="kube-system/coredns-7db6d8ff4d-m6sv5" Dec 13 02:37:26.177403 kubelet[2191]: I1213 02:37:26.177394 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/5741a8e0-bb09-43e6-8da2-fba27a6e1250-calico-apiserver-certs\") pod \"calico-apiserver-7dfb7b6b59-pdtd9\" (UID: \"5741a8e0-bb09-43e6-8da2-fba27a6e1250\") " pod="calico-apiserver/calico-apiserver-7dfb7b6b59-pdtd9" Dec 13 02:37:26.177462 kubelet[2191]: I1213 02:37:26.177448 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/9a772036-63d2-4fbd-b90f-e00c4c528987-calico-apiserver-certs\") pod \"calico-apiserver-7dfb7b6b59-sf2c7\" (UID: \"9a772036-63d2-4fbd-b90f-e00c4c528987\") " pod="calico-apiserver/calico-apiserver-7dfb7b6b59-sf2c7" Dec 13 02:37:26.177520 kubelet[2191]: I1213 02:37:26.177512 2191 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ltv88\" (UniqueName: \"kubernetes.io/projected/5741a8e0-bb09-43e6-8da2-fba27a6e1250-kube-api-access-ltv88\") pod \"calico-apiserver-7dfb7b6b59-pdtd9\" (UID: \"5741a8e0-bb09-43e6-8da2-fba27a6e1250\") " pod="calico-apiserver/calico-apiserver-7dfb7b6b59-pdtd9" Dec 13 02:37:26.393910 env[1255]: time="2024-12-13T02:37:26.393584258Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-m6sv5,Uid:011e69b1-6ba1-45b9-baab-a1b5873b9984,Namespace:kube-system,Attempt:0,}" Dec 13 02:37:26.398874 env[1255]: time="2024-12-13T02:37:26.398851665Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6bb7fd499-v5d2m,Uid:357f714f-1c9f-4765-8e1c-8659524fb9c0,Namespace:calico-system,Attempt:0,}" Dec 13 02:37:26.404247 env[1255]: time="2024-12-13T02:37:26.403869618Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-jrp2n,Uid:049a69b1-19e4-47a5-9d0a-afb8d1ea62a8,Namespace:kube-system,Attempt:0,}" Dec 13 02:37:26.407563 env[1255]: time="2024-12-13T02:37:26.407543646Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7dfb7b6b59-pdtd9,Uid:5741a8e0-bb09-43e6-8da2-fba27a6e1250,Namespace:calico-apiserver,Attempt:0,}" Dec 13 02:37:26.410701 env[1255]: time="2024-12-13T02:37:26.410678519Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7dfb7b6b59-sf2c7,Uid:9a772036-63d2-4fbd-b90f-e00c4c528987,Namespace:calico-apiserver,Attempt:0,}" Dec 13 02:37:26.629330 env[1255]: time="2024-12-13T02:37:26.629282936Z" level=error msg="Failed to destroy network for sandbox \"e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:37:26.629723 env[1255]: time="2024-12-13T02:37:26.629700583Z" level=error msg="encountered an error cleaning up failed sandbox \"e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:37:26.630307 env[1255]: time="2024-12-13T02:37:26.630287592Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-m6sv5,Uid:011e69b1-6ba1-45b9-baab-a1b5873b9984,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:37:26.635464 kubelet[2191]: E1213 02:37:26.630506 2191 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:37:26.637756 kubelet[2191]: E1213 02:37:26.637595 2191 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-m6sv5" Dec 13 02:37:26.637756 kubelet[2191]: E1213 02:37:26.637632 2191 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-m6sv5" Dec 13 02:37:26.637756 kubelet[2191]: E1213 02:37:26.637671 2191 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-m6sv5_kube-system(011e69b1-6ba1-45b9-baab-a1b5873b9984)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-m6sv5_kube-system(011e69b1-6ba1-45b9-baab-a1b5873b9984)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-m6sv5" podUID="011e69b1-6ba1-45b9-baab-a1b5873b9984" Dec 13 02:37:26.642846 env[1255]: time="2024-12-13T02:37:26.642809028Z" level=error msg="Failed to destroy network for sandbox \"ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:37:26.643078 env[1255]: time="2024-12-13T02:37:26.643051736Z" level=error msg="encountered an error cleaning up failed sandbox \"ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:37:26.646704 env[1255]: time="2024-12-13T02:37:26.643095886Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6bb7fd499-v5d2m,Uid:357f714f-1c9f-4765-8e1c-8659524fb9c0,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:37:26.646774 kubelet[2191]: E1213 02:37:26.643259 2191 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:37:26.646774 kubelet[2191]: E1213 02:37:26.643296 2191 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6bb7fd499-v5d2m" Dec 13 02:37:26.646774 kubelet[2191]: E1213 02:37:26.643309 2191 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6bb7fd499-v5d2m" Dec 13 02:37:26.646850 kubelet[2191]: E1213 02:37:26.643335 2191 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-6bb7fd499-v5d2m_calico-system(357f714f-1c9f-4765-8e1c-8659524fb9c0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-6bb7fd499-v5d2m_calico-system(357f714f-1c9f-4765-8e1c-8659524fb9c0)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6bb7fd499-v5d2m" podUID="357f714f-1c9f-4765-8e1c-8659524fb9c0" Dec 13 02:37:26.654539 env[1255]: time="2024-12-13T02:37:26.654497722Z" level=error msg="Failed to destroy network for sandbox \"b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:37:26.654918 env[1255]: time="2024-12-13T02:37:26.654896521Z" level=error msg="encountered an error cleaning up failed sandbox \"b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:37:26.655050 env[1255]: time="2024-12-13T02:37:26.655028042Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-jrp2n,Uid:049a69b1-19e4-47a5-9d0a-afb8d1ea62a8,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:37:26.655146 env[1255]: time="2024-12-13T02:37:26.655001422Z" level=error msg="Failed to destroy network for sandbox \"3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:37:26.655399 env[1255]: time="2024-12-13T02:37:26.655383511Z" level=error msg="encountered an error cleaning up failed sandbox \"3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:37:26.655798 kubelet[2191]: E1213 02:37:26.655708 2191 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:37:26.655798 kubelet[2191]: E1213 02:37:26.655736 2191 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-jrp2n" Dec 13 02:37:26.655798 kubelet[2191]: E1213 02:37:26.655749 2191 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-jrp2n" Dec 13 02:37:26.655884 kubelet[2191]: E1213 02:37:26.655771 2191 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-jrp2n_kube-system(049a69b1-19e4-47a5-9d0a-afb8d1ea62a8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-jrp2n_kube-system(049a69b1-19e4-47a5-9d0a-afb8d1ea62a8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-jrp2n" podUID="049a69b1-19e4-47a5-9d0a-afb8d1ea62a8" Dec 13 02:37:26.655982 env[1255]: time="2024-12-13T02:37:26.655962853Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7dfb7b6b59-pdtd9,Uid:5741a8e0-bb09-43e6-8da2-fba27a6e1250,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:37:26.656187 kubelet[2191]: E1213 02:37:26.656112 2191 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:37:26.656187 kubelet[2191]: E1213 02:37:26.656131 2191 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7dfb7b6b59-pdtd9" Dec 13 02:37:26.656187 kubelet[2191]: E1213 02:37:26.656142 2191 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7dfb7b6b59-pdtd9" Dec 13 02:37:26.656287 kubelet[2191]: E1213 02:37:26.656157 2191 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7dfb7b6b59-pdtd9_calico-apiserver(5741a8e0-bb09-43e6-8da2-fba27a6e1250)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7dfb7b6b59-pdtd9_calico-apiserver(5741a8e0-bb09-43e6-8da2-fba27a6e1250)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7dfb7b6b59-pdtd9" podUID="5741a8e0-bb09-43e6-8da2-fba27a6e1250" Dec 13 02:37:26.660832 env[1255]: time="2024-12-13T02:37:26.660797240Z" level=error msg="Failed to destroy network for sandbox \"ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:37:26.661163 env[1255]: time="2024-12-13T02:37:26.661142154Z" level=error msg="encountered an error cleaning up failed sandbox \"ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:37:26.661276 env[1255]: time="2024-12-13T02:37:26.661253399Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7dfb7b6b59-sf2c7,Uid:9a772036-63d2-4fbd-b90f-e00c4c528987,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:37:26.661648 kubelet[2191]: E1213 02:37:26.661514 2191 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:37:26.661648 kubelet[2191]: E1213 02:37:26.661561 2191 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7dfb7b6b59-sf2c7" Dec 13 02:37:26.661648 kubelet[2191]: E1213 02:37:26.661578 2191 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7dfb7b6b59-sf2c7" Dec 13 02:37:26.661792 kubelet[2191]: E1213 02:37:26.661605 2191 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7dfb7b6b59-sf2c7_calico-apiserver(9a772036-63d2-4fbd-b90f-e00c4c528987)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7dfb7b6b59-sf2c7_calico-apiserver(9a772036-63d2-4fbd-b90f-e00c4c528987)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7dfb7b6b59-sf2c7" podUID="9a772036-63d2-4fbd-b90f-e00c4c528987" Dec 13 02:37:26.851444 systemd[1]: Created slice kubepods-besteffort-pod63f11487_359c_4b4b_808e_af281c2987db.slice. Dec 13 02:37:26.853283 env[1255]: time="2024-12-13T02:37:26.853241681Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kmgrt,Uid:63f11487-359c-4b4b-808e-af281c2987db,Namespace:calico-system,Attempt:0,}" Dec 13 02:37:26.894898 kubelet[2191]: I1213 02:37:26.894593 2191 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" Dec 13 02:37:26.896510 kubelet[2191]: I1213 02:37:26.895899 2191 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" Dec 13 02:37:26.899165 env[1255]: time="2024-12-13T02:37:26.899089324Z" level=error msg="Failed to destroy network for sandbox \"cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:37:26.901031 env[1255]: time="2024-12-13T02:37:26.900489129Z" level=error msg="encountered an error cleaning up failed sandbox \"cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:37:26.901031 env[1255]: time="2024-12-13T02:37:26.900525410Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kmgrt,Uid:63f11487-359c-4b4b-808e-af281c2987db,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:37:26.906245 kubelet[2191]: E1213 02:37:26.905551 2191 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:37:26.906245 kubelet[2191]: E1213 02:37:26.905578 2191 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-kmgrt" Dec 13 02:37:26.906245 kubelet[2191]: E1213 02:37:26.905594 2191 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-kmgrt" Dec 13 02:37:26.906392 kubelet[2191]: E1213 02:37:26.905616 2191 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-kmgrt_calico-system(63f11487-359c-4b4b-808e-af281c2987db)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-kmgrt_calico-system(63f11487-359c-4b4b-808e-af281c2987db)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-kmgrt" podUID="63f11487-359c-4b4b-808e-af281c2987db" Dec 13 02:37:26.906392 kubelet[2191]: I1213 02:37:26.905867 2191 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" Dec 13 02:37:26.911691 env[1255]: time="2024-12-13T02:37:26.911666507Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 02:37:26.913346 kubelet[2191]: I1213 02:37:26.913329 2191 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" Dec 13 02:37:26.914752 kubelet[2191]: I1213 02:37:26.914737 2191 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" Dec 13 02:37:26.915571 env[1255]: time="2024-12-13T02:37:26.915542249Z" level=info msg="StopPodSandbox for \"b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9\"" Dec 13 02:37:26.917361 env[1255]: time="2024-12-13T02:37:26.917328847Z" level=info msg="StopPodSandbox for \"ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae\"" Dec 13 02:37:26.920381 env[1255]: time="2024-12-13T02:37:26.920344302Z" level=info msg="StopPodSandbox for \"3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d\"" Dec 13 02:37:26.920654 env[1255]: time="2024-12-13T02:37:26.920631189Z" level=info msg="StopPodSandbox for \"ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b\"" Dec 13 02:37:26.920854 env[1255]: time="2024-12-13T02:37:26.920824786Z" level=info msg="StopPodSandbox for \"e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63\"" Dec 13 02:37:26.950321 env[1255]: time="2024-12-13T02:37:26.950274639Z" level=error msg="StopPodSandbox for \"ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b\" failed" error="failed to destroy network for sandbox \"ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:37:26.950677 kubelet[2191]: E1213 02:37:26.950535 2191 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" Dec 13 02:37:26.950677 kubelet[2191]: E1213 02:37:26.950585 2191 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b"} Dec 13 02:37:26.950677 kubelet[2191]: E1213 02:37:26.950628 2191 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9a772036-63d2-4fbd-b90f-e00c4c528987\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:37:26.950677 kubelet[2191]: E1213 02:37:26.950642 2191 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9a772036-63d2-4fbd-b90f-e00c4c528987\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7dfb7b6b59-sf2c7" podUID="9a772036-63d2-4fbd-b90f-e00c4c528987" Dec 13 02:37:26.962834 env[1255]: time="2024-12-13T02:37:26.962798632Z" level=error msg="StopPodSandbox for \"b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9\" failed" error="failed to destroy network for sandbox \"b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:37:26.963132 kubelet[2191]: E1213 02:37:26.963006 2191 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" Dec 13 02:37:26.963132 kubelet[2191]: E1213 02:37:26.963058 2191 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9"} Dec 13 02:37:26.963132 kubelet[2191]: E1213 02:37:26.963080 2191 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"049a69b1-19e4-47a5-9d0a-afb8d1ea62a8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:37:26.963132 kubelet[2191]: E1213 02:37:26.963097 2191 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"049a69b1-19e4-47a5-9d0a-afb8d1ea62a8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-jrp2n" podUID="049a69b1-19e4-47a5-9d0a-afb8d1ea62a8" Dec 13 02:37:26.974510 env[1255]: time="2024-12-13T02:37:26.974474139Z" level=error msg="StopPodSandbox for \"e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63\" failed" error="failed to destroy network for sandbox \"e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:37:26.974838 kubelet[2191]: E1213 02:37:26.974726 2191 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" Dec 13 02:37:26.974838 kubelet[2191]: E1213 02:37:26.974767 2191 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63"} Dec 13 02:37:26.974838 kubelet[2191]: E1213 02:37:26.974790 2191 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"011e69b1-6ba1-45b9-baab-a1b5873b9984\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:37:26.974838 kubelet[2191]: E1213 02:37:26.974804 2191 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"011e69b1-6ba1-45b9-baab-a1b5873b9984\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-m6sv5" podUID="011e69b1-6ba1-45b9-baab-a1b5873b9984" Dec 13 02:37:26.979065 env[1255]: time="2024-12-13T02:37:26.979021972Z" level=error msg="StopPodSandbox for \"3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d\" failed" error="failed to destroy network for sandbox \"3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:37:26.979684 env[1255]: time="2024-12-13T02:37:26.979484164Z" level=error msg="StopPodSandbox for \"ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae\" failed" error="failed to destroy network for sandbox \"ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:37:26.979734 kubelet[2191]: E1213 02:37:26.979489 2191 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" Dec 13 02:37:26.979734 kubelet[2191]: E1213 02:37:26.979539 2191 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d"} Dec 13 02:37:26.979734 kubelet[2191]: E1213 02:37:26.979559 2191 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5741a8e0-bb09-43e6-8da2-fba27a6e1250\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:37:26.979734 kubelet[2191]: E1213 02:37:26.979603 2191 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" Dec 13 02:37:26.979734 kubelet[2191]: E1213 02:37:26.979617 2191 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae"} Dec 13 02:37:26.980452 kubelet[2191]: E1213 02:37:26.979630 2191 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"357f714f-1c9f-4765-8e1c-8659524fb9c0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:37:26.980452 kubelet[2191]: E1213 02:37:26.979655 2191 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5741a8e0-bb09-43e6-8da2-fba27a6e1250\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7dfb7b6b59-pdtd9" podUID="5741a8e0-bb09-43e6-8da2-fba27a6e1250" Dec 13 02:37:26.980452 kubelet[2191]: E1213 02:37:26.979642 2191 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"357f714f-1c9f-4765-8e1c-8659524fb9c0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6bb7fd499-v5d2m" podUID="357f714f-1c9f-4765-8e1c-8659524fb9c0" Dec 13 02:37:27.917099 kubelet[2191]: I1213 02:37:27.917076 2191 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" Dec 13 02:37:27.918311 env[1255]: time="2024-12-13T02:37:27.918290947Z" level=info msg="StopPodSandbox for \"cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9\"" Dec 13 02:37:27.937014 env[1255]: time="2024-12-13T02:37:27.936975138Z" level=error msg="StopPodSandbox for \"cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9\" failed" error="failed to destroy network for sandbox \"cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:37:27.937291 kubelet[2191]: E1213 02:37:27.937264 2191 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" Dec 13 02:37:27.937363 kubelet[2191]: E1213 02:37:27.937297 2191 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9"} Dec 13 02:37:27.937363 kubelet[2191]: E1213 02:37:27.937321 2191 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"63f11487-359c-4b4b-808e-af281c2987db\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:37:27.937363 kubelet[2191]: E1213 02:37:27.937335 2191 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"63f11487-359c-4b4b-808e-af281c2987db\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-kmgrt" podUID="63f11487-359c-4b4b-808e-af281c2987db" Dec 13 02:37:32.480500 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1832810658.mount: Deactivated successfully. Dec 13 02:37:32.585477 env[1255]: time="2024-12-13T02:37:32.585447282Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:32.611696 env[1255]: time="2024-12-13T02:37:32.611673301Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:32.624530 env[1255]: time="2024-12-13T02:37:32.624513834Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:32.630456 env[1255]: time="2024-12-13T02:37:32.630441836Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:32.638712 env[1255]: time="2024-12-13T02:37:32.630631146Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 02:37:32.722687 env[1255]: time="2024-12-13T02:37:32.722664941Z" level=info msg="CreateContainer within sandbox \"dfa425b59624bf60dc317c53aecc0c316d17da0ab354c9a10d3cc7753b8b8613\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 02:37:32.732797 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount804856727.mount: Deactivated successfully. Dec 13 02:37:32.734831 env[1255]: time="2024-12-13T02:37:32.734805719Z" level=info msg="CreateContainer within sandbox \"dfa425b59624bf60dc317c53aecc0c316d17da0ab354c9a10d3cc7753b8b8613\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"897a4f65abeef673ef887fd3b490be3aa68eb87da652d9dfc04682b030613935\"" Dec 13 02:37:32.736945 env[1255]: time="2024-12-13T02:37:32.736927836Z" level=info msg="StartContainer for \"897a4f65abeef673ef887fd3b490be3aa68eb87da652d9dfc04682b030613935\"" Dec 13 02:37:32.752720 systemd[1]: Started cri-containerd-897a4f65abeef673ef887fd3b490be3aa68eb87da652d9dfc04682b030613935.scope. Dec 13 02:37:32.765000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.806302 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 02:37:32.816611 kernel: audit: type=1400 audit(1734057452.765:971): avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.816652 kernel: audit: type=1300 audit(1734057452.765:971): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fe5640c7268 items=0 ppid=2592 pid=3174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:32.816673 kernel: audit: type=1327 audit(1734057452.765:971): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839376134663635616265656636373365663838376664336234393062 Dec 13 02:37:32.816689 kernel: audit: type=1400 audit(1734057452.765:972): avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.816704 kernel: audit: type=1400 audit(1734057452.765:972): avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.820716 kernel: audit: type=1400 audit(1734057452.765:972): avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.820742 kernel: audit: type=1400 audit(1734057452.765:972): avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.820825 kernel: audit: type=1400 audit(1734057452.765:972): avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.820843 kernel: audit: type=1400 audit(1734057452.765:972): avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.820856 kernel: audit: type=1400 audit(1734057452.765:972): avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.765000 audit[3174]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fe5640c7268 items=0 ppid=2592 pid=3174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:32.765000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839376134663635616265656636373365663838376664336234393062 Dec 13 02:37:32.765000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.765000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.765000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.765000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.765000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.765000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.765000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.765000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.765000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.765000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.765000 audit: BPF prog-id=136 op=LOAD Dec 13 02:37:32.765000 audit[3174]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000352438 items=0 ppid=2592 pid=3174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:32.765000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839376134663635616265656636373365663838376664336234393062 Dec 13 02:37:32.772000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.772000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.772000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.772000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.772000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.772000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.772000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.772000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.772000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.772000 audit: BPF prog-id=137 op=LOAD Dec 13 02:37:32.772000 audit[3174]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000352488 items=0 ppid=2592 pid=3174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:32.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839376134663635616265656636373365663838376664336234393062 Dec 13 02:37:32.775000 audit: BPF prog-id=137 op=UNLOAD Dec 13 02:37:32.775000 audit: BPF prog-id=136 op=UNLOAD Dec 13 02:37:32.775000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.775000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.775000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.775000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.775000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.775000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.775000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.775000 audit[3174]: AVC avc: denied { perfmon } for pid=3174 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.775000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.775000 audit[3174]: AVC avc: denied { bpf } for pid=3174 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:32.775000 audit: BPF prog-id=138 op=LOAD Dec 13 02:37:32.775000 audit[3174]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000352518 items=0 ppid=2592 pid=3174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:32.775000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839376134663635616265656636373365663838376664336234393062 Dec 13 02:37:32.861482 env[1255]: time="2024-12-13T02:37:32.801684154Z" level=info msg="StartContainer for \"897a4f65abeef673ef887fd3b490be3aa68eb87da652d9dfc04682b030613935\" returns successfully" Dec 13 02:37:33.034159 kubelet[2191]: I1213 02:37:33.032046 2191 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-wzv8n" podStartSLOduration=1.082662118 podStartE2EDuration="18.028501467s" podCreationTimestamp="2024-12-13 02:37:15 +0000 UTC" firstStartedPulling="2024-12-13 02:37:15.685406128 +0000 UTC m=+23.017277377" lastFinishedPulling="2024-12-13 02:37:32.631245477 +0000 UTC m=+39.963116726" observedRunningTime="2024-12-13 02:37:33.028275386 +0000 UTC m=+40.360146643" watchObservedRunningTime="2024-12-13 02:37:33.028501467 +0000 UTC m=+40.360372712" Dec 13 02:37:33.568569 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 02:37:33.568673 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 02:37:33.939376 systemd[1]: run-containerd-runc-k8s.io-897a4f65abeef673ef887fd3b490be3aa68eb87da652d9dfc04682b030613935-runc.3Ac24y.mount: Deactivated successfully. Dec 13 02:37:34.847000 audit[3357]: AVC avc: denied { write } for pid=3357 comm="tee" name="fd" dev="proc" ino=36181 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:37:34.847000 audit[3357]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd39a75a16 a2=241 a3=1b6 items=1 ppid=3300 pid=3357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:34.847000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 02:37:34.847000 audit: PATH item=0 name="/dev/fd/63" inode=35572 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:37:34.847000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:37:34.848000 audit[3353]: AVC avc: denied { write } for pid=3353 comm="tee" name="fd" dev="proc" ino=35576 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:37:34.848000 audit[3353]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc3a121a26 a2=241 a3=1b6 items=1 ppid=3295 pid=3353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:34.848000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 02:37:34.848000 audit: PATH item=0 name="/dev/fd/63" inode=36177 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:37:34.848000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:37:34.848000 audit[3360]: AVC avc: denied { write } for pid=3360 comm="tee" name="fd" dev="proc" ino=36185 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:37:34.848000 audit[3360]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc9b3fca27 a2=241 a3=1b6 items=1 ppid=3292 pid=3360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:34.848000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 02:37:34.848000 audit: PATH item=0 name="/dev/fd/63" inode=35573 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:37:34.848000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:37:34.849000 audit[3347]: AVC avc: denied { write } for pid=3347 comm="tee" name="fd" dev="proc" ino=36189 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:37:34.849000 audit[3347]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe922eba26 a2=241 a3=1b6 items=1 ppid=3299 pid=3347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:34.849000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 02:37:34.849000 audit: PATH item=0 name="/dev/fd/63" inode=36174 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:37:34.849000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:37:34.849000 audit[3351]: AVC avc: denied { write } for pid=3351 comm="tee" name="fd" dev="proc" ino=36193 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:37:34.849000 audit[3351]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd550e3a17 a2=241 a3=1b6 items=1 ppid=3291 pid=3351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:34.849000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 02:37:34.849000 audit: PATH item=0 name="/dev/fd/63" inode=36176 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:37:34.849000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:37:34.850000 audit[3355]: AVC avc: denied { write } for pid=3355 comm="tee" name="fd" dev="proc" ino=36197 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:37:34.850000 audit[3355]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc22e12a26 a2=241 a3=1b6 items=1 ppid=3288 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:34.850000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 02:37:34.850000 audit: PATH item=0 name="/dev/fd/63" inode=36178 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:37:34.850000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:37:34.851000 audit[3349]: AVC avc: denied { write } for pid=3349 comm="tee" name="fd" dev="proc" ino=36201 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:37:34.851000 audit[3349]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffed431a28 a2=241 a3=1b6 items=1 ppid=3287 pid=3349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:34.851000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 02:37:34.851000 audit: PATH item=0 name="/dev/fd/63" inode=36175 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:37:34.851000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:37:38.380382 kubelet[2191]: I1213 02:37:38.380356 2191 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:37:38.685000 audit[3436]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=3436 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:37:38.687687 kernel: kauditd_printk_skb: 68 callbacks suppressed Dec 13 02:37:38.687816 kernel: audit: type=1325 audit(1734057458.685:984): table=filter:95 family=2 entries=17 op=nft_register_rule pid=3436 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:37:38.691132 kernel: audit: type=1300 audit(1734057458.685:984): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff44984c40 a2=0 a3=7fff44984c2c items=0 ppid=2327 pid=3436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:38.685000 audit[3436]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff44984c40 a2=0 a3=7fff44984c2c items=0 ppid=2327 pid=3436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:38.685000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:37:38.697994 kernel: audit: type=1327 audit(1734057458.685:984): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:37:38.698051 kernel: audit: type=1325 audit(1734057458.694:985): table=nat:96 family=2 entries=19 op=nft_register_chain pid=3436 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:37:38.694000 audit[3436]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3436 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:37:38.694000 audit[3436]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fff44984c40 a2=0 a3=7fff44984c2c items=0 ppid=2327 pid=3436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:38.705370 kernel: audit: type=1300 audit(1734057458.694:985): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fff44984c40 a2=0 a3=7fff44984c2c items=0 ppid=2327 pid=3436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:38.705431 kernel: audit: type=1327 audit(1734057458.694:985): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:37:38.694000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:37:38.847033 env[1255]: time="2024-12-13T02:37:38.847007413Z" level=info msg="StopPodSandbox for \"b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9\"" Dec 13 02:37:38.847300 env[1255]: time="2024-12-13T02:37:38.847250540Z" level=info msg="StopPodSandbox for \"cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9\"" Dec 13 02:37:39.174000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.174000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.181625 kernel: audit: type=1400 audit(1734057459.174:986): avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.181721 kernel: audit: type=1400 audit(1734057459.174:986): avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.174000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.185219 kernel: audit: type=1400 audit(1734057459.174:986): avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.174000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.189447 kernel: audit: type=1400 audit(1734057459.174:986): avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.174000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.174000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.174000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.174000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.174000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.174000 audit: BPF prog-id=139 op=LOAD Dec 13 02:37:39.174000 audit[3523]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffef5ad6a20 a2=98 a3=3 items=0 ppid=3494 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.174000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:37:39.188000 audit: BPF prog-id=139 op=UNLOAD Dec 13 02:37:39.194000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.194000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.194000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.194000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.194000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.194000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.194000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.194000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.194000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.194000 audit: BPF prog-id=140 op=LOAD Dec 13 02:37:39.194000 audit[3523]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffef5ad6800 a2=74 a3=540051 items=0 ppid=3494 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.194000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:37:39.205000 audit: BPF prog-id=140 op=UNLOAD Dec 13 02:37:39.205000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.205000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.205000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.205000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.205000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.205000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.205000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.205000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.205000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.205000 audit: BPF prog-id=141 op=LOAD Dec 13 02:37:39.205000 audit[3523]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffef5ad6830 a2=94 a3=2 items=0 ppid=3494 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.205000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:37:39.206000 audit: BPF prog-id=141 op=UNLOAD Dec 13 02:37:39.295000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.295000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.295000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.295000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.295000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.295000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.295000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.295000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.295000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.295000 audit: BPF prog-id=142 op=LOAD Dec 13 02:37:39.295000 audit[3523]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffef5ad66f0 a2=40 a3=1 items=0 ppid=3494 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.295000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:37:39.295000 audit: BPF prog-id=142 op=UNLOAD Dec 13 02:37:39.295000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.295000 audit[3523]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffef5ad67c0 a2=50 a3=7ffef5ad68a0 items=0 ppid=3494 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.295000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:37:39.302000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.302000 audit[3523]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef5ad6700 a2=28 a3=0 items=0 ppid=3494 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.302000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:37:39.302000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.302000 audit[3523]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef5ad6730 a2=28 a3=0 items=0 ppid=3494 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.302000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:37:39.302000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.302000 audit[3523]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef5ad6640 a2=28 a3=0 items=0 ppid=3494 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.302000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:37:39.302000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.302000 audit[3523]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef5ad6750 a2=28 a3=0 items=0 ppid=3494 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.302000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:37:39.302000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.302000 audit[3523]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef5ad6730 a2=28 a3=0 items=0 ppid=3494 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.302000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:37:39.302000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.302000 audit[3523]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef5ad6720 a2=28 a3=0 items=0 ppid=3494 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.302000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:37:39.302000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.302000 audit[3523]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef5ad6750 a2=28 a3=0 items=0 ppid=3494 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.302000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:37:39.302000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.302000 audit[3523]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef5ad6730 a2=28 a3=0 items=0 ppid=3494 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.302000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:37:39.302000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.302000 audit[3523]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef5ad6750 a2=28 a3=0 items=0 ppid=3494 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.302000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:37:39.302000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.302000 audit[3523]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef5ad6720 a2=28 a3=0 items=0 ppid=3494 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.302000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:37:39.302000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.302000 audit[3523]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef5ad6790 a2=28 a3=0 items=0 ppid=3494 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.302000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:37:39.302000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.302000 audit[3523]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffef5ad6540 a2=50 a3=1 items=0 ppid=3494 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.302000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:37:39.302000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.302000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.302000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.302000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.302000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.302000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.302000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.302000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.302000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.302000 audit: BPF prog-id=143 op=LOAD Dec 13 02:37:39.302000 audit[3523]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffef5ad6540 a2=94 a3=5 items=0 ppid=3494 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.302000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:37:39.302000 audit: BPF prog-id=143 op=UNLOAD Dec 13 02:37:39.302000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.302000 audit[3523]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffef5ad65f0 a2=50 a3=1 items=0 ppid=3494 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.302000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:37:39.302000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.302000 audit[3523]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffef5ad6710 a2=4 a3=38 items=0 ppid=3494 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.302000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:37:39.302000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.302000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.302000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.302000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.302000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.302000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.302000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.302000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.302000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.302000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.302000 audit[3523]: AVC avc: denied { confidentiality } for pid=3523 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:37:39.302000 audit[3523]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffef5ad6760 a2=94 a3=6 items=0 ppid=3494 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.302000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:37:39.303000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.303000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.303000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.303000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.303000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.303000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.303000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.303000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.303000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.303000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.303000 audit[3523]: AVC avc: denied { confidentiality } for pid=3523 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:37:39.303000 audit[3523]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffef5ad5f10 a2=94 a3=83 items=0 ppid=3494 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.303000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:37:39.303000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.303000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.303000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.303000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.303000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.303000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.303000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.303000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.303000 audit[3523]: AVC avc: denied { perfmon } for pid=3523 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.303000 audit[3523]: AVC avc: denied { bpf } for pid=3523 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.303000 audit[3523]: AVC avc: denied { confidentiality } for pid=3523 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:37:39.303000 audit[3523]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffef5ad5f10 a2=94 a3=83 items=0 ppid=3494 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.303000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:37:39.332000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.332000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.332000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.332000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.332000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.332000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.332000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.332000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.332000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.332000 audit: BPF prog-id=144 op=LOAD Dec 13 02:37:39.332000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffea73bc200 a2=98 a3=1999999999999999 items=0 ppid=3494 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.332000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:37:39.333000 audit: BPF prog-id=144 op=UNLOAD Dec 13 02:37:39.333000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.333000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.333000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.333000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.333000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.333000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.333000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.333000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.333000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.333000 audit: BPF prog-id=145 op=LOAD Dec 13 02:37:39.333000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffea73bc0e0 a2=74 a3=ffff items=0 ppid=3494 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.333000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:37:39.333000 audit: BPF prog-id=145 op=UNLOAD Dec 13 02:37:39.333000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.333000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.333000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.333000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.333000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.333000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.333000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.333000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.333000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.333000 audit: BPF prog-id=146 op=LOAD Dec 13 02:37:39.333000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffea73bc120 a2=40 a3=7ffea73bc300 items=0 ppid=3494 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.333000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:37:39.333000 audit: BPF prog-id=146 op=UNLOAD Dec 13 02:37:39.414984 env[1255]: 2024-12-13 02:37:38.938 [INFO][3466] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" Dec 13 02:37:39.414984 env[1255]: 2024-12-13 02:37:38.938 [INFO][3466] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" iface="eth0" netns="/var/run/netns/cni-3f668bc8-4254-250f-e8f0-267f88349350" Dec 13 02:37:39.414984 env[1255]: 2024-12-13 02:37:38.938 [INFO][3466] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" iface="eth0" netns="/var/run/netns/cni-3f668bc8-4254-250f-e8f0-267f88349350" Dec 13 02:37:39.414984 env[1255]: 2024-12-13 02:37:38.939 [INFO][3466] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" iface="eth0" netns="/var/run/netns/cni-3f668bc8-4254-250f-e8f0-267f88349350" Dec 13 02:37:39.414984 env[1255]: 2024-12-13 02:37:38.939 [INFO][3466] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" Dec 13 02:37:39.414984 env[1255]: 2024-12-13 02:37:38.939 [INFO][3466] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" Dec 13 02:37:39.414984 env[1255]: 2024-12-13 02:37:39.392 [INFO][3479] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" HandleID="k8s-pod-network.b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" Workload="localhost-k8s-coredns--7db6d8ff4d--jrp2n-eth0" Dec 13 02:37:39.414984 env[1255]: 2024-12-13 02:37:39.393 [INFO][3479] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:37:39.414984 env[1255]: 2024-12-13 02:37:39.393 [INFO][3479] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:37:39.414984 env[1255]: 2024-12-13 02:37:39.403 [WARNING][3479] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" HandleID="k8s-pod-network.b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" Workload="localhost-k8s-coredns--7db6d8ff4d--jrp2n-eth0" Dec 13 02:37:39.414984 env[1255]: 2024-12-13 02:37:39.403 [INFO][3479] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" HandleID="k8s-pod-network.b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" Workload="localhost-k8s-coredns--7db6d8ff4d--jrp2n-eth0" Dec 13 02:37:39.414984 env[1255]: 2024-12-13 02:37:39.404 [INFO][3479] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:37:39.414984 env[1255]: 2024-12-13 02:37:39.407 [INFO][3466] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" Dec 13 02:37:39.416662 systemd[1]: run-netns-cni\x2d3f668bc8\x2d4254\x2d250f\x2de8f0\x2d267f88349350.mount: Deactivated successfully. Dec 13 02:37:39.420460 systemd-networkd[1060]: vxlan.calico: Link UP Dec 13 02:37:39.420467 systemd-networkd[1060]: vxlan.calico: Gained carrier Dec 13 02:37:39.421459 env[1255]: time="2024-12-13T02:37:39.421357657Z" level=info msg="TearDown network for sandbox \"b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9\" successfully" Dec 13 02:37:39.421459 env[1255]: time="2024-12-13T02:37:39.421390307Z" level=info msg="StopPodSandbox for \"b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9\" returns successfully" Dec 13 02:37:39.425092 env[1255]: time="2024-12-13T02:37:39.425049854Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-jrp2n,Uid:049a69b1-19e4-47a5-9d0a-afb8d1ea62a8,Namespace:kube-system,Attempt:1,}" Dec 13 02:37:39.439720 env[1255]: 2024-12-13 02:37:38.935 [INFO][3467] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" Dec 13 02:37:39.439720 env[1255]: 2024-12-13 02:37:38.937 [INFO][3467] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" iface="eth0" netns="/var/run/netns/cni-854c86ad-26b8-8cdc-a937-c0701407ea4f" Dec 13 02:37:39.439720 env[1255]: 2024-12-13 02:37:38.937 [INFO][3467] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" iface="eth0" netns="/var/run/netns/cni-854c86ad-26b8-8cdc-a937-c0701407ea4f" Dec 13 02:37:39.439720 env[1255]: 2024-12-13 02:37:38.939 [INFO][3467] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" iface="eth0" netns="/var/run/netns/cni-854c86ad-26b8-8cdc-a937-c0701407ea4f" Dec 13 02:37:39.439720 env[1255]: 2024-12-13 02:37:38.939 [INFO][3467] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" Dec 13 02:37:39.439720 env[1255]: 2024-12-13 02:37:38.939 [INFO][3467] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" Dec 13 02:37:39.439720 env[1255]: 2024-12-13 02:37:39.392 [INFO][3478] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" HandleID="k8s-pod-network.cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" Workload="localhost-k8s-csi--node--driver--kmgrt-eth0" Dec 13 02:37:39.439720 env[1255]: 2024-12-13 02:37:39.393 [INFO][3478] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:37:39.439720 env[1255]: 2024-12-13 02:37:39.405 [INFO][3478] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:37:39.439720 env[1255]: 2024-12-13 02:37:39.426 [WARNING][3478] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" HandleID="k8s-pod-network.cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" Workload="localhost-k8s-csi--node--driver--kmgrt-eth0" Dec 13 02:37:39.439720 env[1255]: 2024-12-13 02:37:39.426 [INFO][3478] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" HandleID="k8s-pod-network.cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" Workload="localhost-k8s-csi--node--driver--kmgrt-eth0" Dec 13 02:37:39.439720 env[1255]: 2024-12-13 02:37:39.430 [INFO][3478] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:37:39.439720 env[1255]: 2024-12-13 02:37:39.435 [INFO][3467] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" Dec 13 02:37:39.444954 env[1255]: time="2024-12-13T02:37:39.442483420Z" level=info msg="TearDown network for sandbox \"cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9\" successfully" Dec 13 02:37:39.444954 env[1255]: time="2024-12-13T02:37:39.442515477Z" level=info msg="StopPodSandbox for \"cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9\" returns successfully" Dec 13 02:37:39.444954 env[1255]: time="2024-12-13T02:37:39.443400180Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kmgrt,Uid:63f11487-359c-4b4b-808e-af281c2987db,Namespace:calico-system,Attempt:1,}" Dec 13 02:37:39.441550 systemd[1]: run-netns-cni\x2d854c86ad\x2d26b8\x2d8cdc\x2da937\x2dc0701407ea4f.mount: Deactivated successfully. Dec 13 02:37:39.462000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.462000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.462000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.462000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.462000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.462000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.462000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.462000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.462000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.462000 audit: BPF prog-id=147 op=LOAD Dec 13 02:37:39.462000 audit[3574]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9a652fb0 a2=98 a3=ffffffff items=0 ppid=3494 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.462000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:37:39.462000 audit: BPF prog-id=147 op=UNLOAD Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit: BPF prog-id=148 op=LOAD Dec 13 02:37:39.466000 audit[3574]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9a652dc0 a2=74 a3=540051 items=0 ppid=3494 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.466000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:37:39.466000 audit: BPF prog-id=148 op=UNLOAD Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit: BPF prog-id=149 op=LOAD Dec 13 02:37:39.466000 audit[3574]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe9a652df0 a2=94 a3=2 items=0 ppid=3494 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.466000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:37:39.466000 audit: BPF prog-id=149 op=UNLOAD Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe9a652cc0 a2=28 a3=0 items=0 ppid=3494 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.466000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9a652cf0 a2=28 a3=0 items=0 ppid=3494 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.466000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9a652c00 a2=28 a3=0 items=0 ppid=3494 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.466000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe9a652d10 a2=28 a3=0 items=0 ppid=3494 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.466000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe9a652cf0 a2=28 a3=0 items=0 ppid=3494 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.466000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe9a652ce0 a2=28 a3=0 items=0 ppid=3494 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.466000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe9a652d10 a2=28 a3=0 items=0 ppid=3494 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.466000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9a652cf0 a2=28 a3=0 items=0 ppid=3494 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.466000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9a652d10 a2=28 a3=0 items=0 ppid=3494 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.466000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe9a652ce0 a2=28 a3=0 items=0 ppid=3494 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.466000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe9a652d50 a2=28 a3=0 items=0 ppid=3494 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.466000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit: BPF prog-id=150 op=LOAD Dec 13 02:37:39.466000 audit[3574]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe9a652bc0 a2=40 a3=0 items=0 ppid=3494 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.466000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:37:39.466000 audit: BPF prog-id=150 op=UNLOAD Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe9a652bb0 a2=50 a3=2800 items=0 ppid=3494 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.466000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffe9a652bb0 a2=50 a3=2800 items=0 ppid=3494 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.466000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit: BPF prog-id=151 op=LOAD Dec 13 02:37:39.466000 audit[3574]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe9a6523d0 a2=94 a3=2 items=0 ppid=3494 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.466000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:37:39.466000 audit: BPF prog-id=151 op=UNLOAD Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.466000 audit: BPF prog-id=152 op=LOAD Dec 13 02:37:39.466000 audit[3574]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe9a6524d0 a2=94 a3=2d items=0 ppid=3494 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.466000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:37:39.469000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.469000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.469000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.469000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.469000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.469000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.469000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.469000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.469000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.469000 audit: BPF prog-id=153 op=LOAD Dec 13 02:37:39.469000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcbb53ce20 a2=98 a3=0 items=0 ppid=3494 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.469000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:37:39.471000 audit: BPF prog-id=153 op=UNLOAD Dec 13 02:37:39.471000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.471000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.471000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.471000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.471000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.471000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.471000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.471000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.471000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.471000 audit: BPF prog-id=154 op=LOAD Dec 13 02:37:39.471000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcbb53cc00 a2=74 a3=540051 items=0 ppid=3494 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.471000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:37:39.471000 audit: BPF prog-id=154 op=UNLOAD Dec 13 02:37:39.471000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.471000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.471000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.471000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.471000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.471000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.471000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.471000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.471000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.471000 audit: BPF prog-id=155 op=LOAD Dec 13 02:37:39.471000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcbb53cc30 a2=94 a3=2 items=0 ppid=3494 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.471000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:37:39.471000 audit: BPF prog-id=155 op=UNLOAD Dec 13 02:37:39.592000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.592000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.592000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.592000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.592000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.592000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.592000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.592000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.592000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.592000 audit: BPF prog-id=156 op=LOAD Dec 13 02:37:39.592000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcbb53caf0 a2=40 a3=1 items=0 ppid=3494 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.592000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:37:39.594000 audit: BPF prog-id=156 op=UNLOAD Dec 13 02:37:39.594000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.594000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcbb53cbc0 a2=50 a3=7ffcbb53cca0 items=0 ppid=3494 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.594000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:37:39.605000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.605000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbb53cb00 a2=28 a3=0 items=0 ppid=3494 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.605000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:37:39.605000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.605000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbb53cb30 a2=28 a3=0 items=0 ppid=3494 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.605000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:37:39.605000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.605000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbb53ca40 a2=28 a3=0 items=0 ppid=3494 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.605000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:37:39.605000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.605000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbb53cb50 a2=28 a3=0 items=0 ppid=3494 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.605000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:37:39.605000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.605000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbb53cb30 a2=28 a3=0 items=0 ppid=3494 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.605000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:37:39.605000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.605000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbb53cb20 a2=28 a3=0 items=0 ppid=3494 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.605000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:37:39.605000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.605000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbb53cb50 a2=28 a3=0 items=0 ppid=3494 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.605000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:37:39.605000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.605000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbb53cb30 a2=28 a3=0 items=0 ppid=3494 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.605000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:37:39.605000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.605000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbb53cb50 a2=28 a3=0 items=0 ppid=3494 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.605000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:37:39.605000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.605000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcbb53cb20 a2=28 a3=0 items=0 ppid=3494 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.605000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:37:39.605000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.605000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcbb53cb90 a2=28 a3=0 items=0 ppid=3494 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.605000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:37:39.605000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.605000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcbb53c940 a2=50 a3=1 items=0 ppid=3494 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.605000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:37:39.605000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.605000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.605000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.605000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.605000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.605000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.605000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.605000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.605000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.605000 audit: BPF prog-id=157 op=LOAD Dec 13 02:37:39.605000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcbb53c940 a2=94 a3=5 items=0 ppid=3494 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.605000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:37:39.606000 audit: BPF prog-id=157 op=UNLOAD Dec 13 02:37:39.606000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.606000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcbb53c9f0 a2=50 a3=1 items=0 ppid=3494 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.606000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:37:39.606000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.606000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffcbb53cb10 a2=4 a3=38 items=0 ppid=3494 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.606000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:37:39.606000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.606000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.606000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.606000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.606000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.606000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.606000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.606000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.606000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.606000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.606000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:37:39.606000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcbb53cb60 a2=94 a3=6 items=0 ppid=3494 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.606000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:37:39.606000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.606000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.606000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.606000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.606000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.606000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.606000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.606000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.606000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.606000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.606000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:37:39.606000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcbb53c310 a2=94 a3=83 items=0 ppid=3494 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.606000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:37:39.606000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.606000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.606000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.606000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.606000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.606000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.606000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.606000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.606000 audit[3578]: AVC avc: denied { perfmon } for pid=3578 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.606000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.606000 audit[3578]: AVC avc: denied { confidentiality } for pid=3578 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:37:39.606000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcbb53c310 a2=94 a3=83 items=0 ppid=3494 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.606000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:37:39.607000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.607000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcbb53dd50 a2=10 a3=f1f00800 items=0 ppid=3494 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.607000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:37:39.607000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.607000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcbb53dbf0 a2=10 a3=3 items=0 ppid=3494 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.607000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:37:39.607000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.607000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcbb53db90 a2=10 a3=3 items=0 ppid=3494 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.607000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:37:39.607000 audit[3578]: AVC avc: denied { bpf } for pid=3578 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.607000 audit[3578]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffcbb53db90 a2=10 a3=7 items=0 ppid=3494 pid=3578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.607000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:37:39.618000 audit: BPF prog-id=152 op=UNLOAD Dec 13 02:37:39.618000 audit[3572]: SYSCALL arch=c000003e syscall=257 success=yes exit=17 a0=ffffff9c a1=7f884c6c8ba0 a2=290000 a3=0 items=1 ppid=1053 pid=3572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.618000 audit: CWD cwd="/" Dec 13 02:37:39.618000 audit: PATH item=0 name="/" inode=2 dev=08:09 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:37:39.618000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 02:37:39.727763 systemd-networkd[1060]: cali013ed8b7951: Link UP Dec 13 02:37:39.732109 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali013ed8b7951: link becomes ready Dec 13 02:37:39.729796 systemd-networkd[1060]: cali013ed8b7951: Gained carrier Dec 13 02:37:39.743305 env[1255]: 2024-12-13 02:37:39.589 [INFO][3579] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--kmgrt-eth0 csi-node-driver- calico-system 63f11487-359c-4b4b-808e-af281c2987db 752 0 2024-12-13 02:37:15 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:65bf684474 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-kmgrt eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali013ed8b7951 [] []}} ContainerID="482b132e76c8ade3345e04e6118cedf99acc240aced9066243a3b42b3a19e952" Namespace="calico-system" Pod="csi-node-driver-kmgrt" WorkloadEndpoint="localhost-k8s-csi--node--driver--kmgrt-" Dec 13 02:37:39.743305 env[1255]: 2024-12-13 02:37:39.589 [INFO][3579] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="482b132e76c8ade3345e04e6118cedf99acc240aced9066243a3b42b3a19e952" Namespace="calico-system" Pod="csi-node-driver-kmgrt" WorkloadEndpoint="localhost-k8s-csi--node--driver--kmgrt-eth0" Dec 13 02:37:39.743305 env[1255]: 2024-12-13 02:37:39.681 [INFO][3621] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="482b132e76c8ade3345e04e6118cedf99acc240aced9066243a3b42b3a19e952" HandleID="k8s-pod-network.482b132e76c8ade3345e04e6118cedf99acc240aced9066243a3b42b3a19e952" Workload="localhost-k8s-csi--node--driver--kmgrt-eth0" Dec 13 02:37:39.743305 env[1255]: 2024-12-13 02:37:39.690 [INFO][3621] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="482b132e76c8ade3345e04e6118cedf99acc240aced9066243a3b42b3a19e952" HandleID="k8s-pod-network.482b132e76c8ade3345e04e6118cedf99acc240aced9066243a3b42b3a19e952" Workload="localhost-k8s-csi--node--driver--kmgrt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000313380), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-kmgrt", "timestamp":"2024-12-13 02:37:39.681011092 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:37:39.743305 env[1255]: 2024-12-13 02:37:39.690 [INFO][3621] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:37:39.743305 env[1255]: 2024-12-13 02:37:39.691 [INFO][3621] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:37:39.743305 env[1255]: 2024-12-13 02:37:39.691 [INFO][3621] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 02:37:39.743305 env[1255]: 2024-12-13 02:37:39.693 [INFO][3621] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.482b132e76c8ade3345e04e6118cedf99acc240aced9066243a3b42b3a19e952" host="localhost" Dec 13 02:37:39.743305 env[1255]: 2024-12-13 02:37:39.701 [INFO][3621] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 02:37:39.743305 env[1255]: 2024-12-13 02:37:39.705 [INFO][3621] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 02:37:39.743305 env[1255]: 2024-12-13 02:37:39.706 [INFO][3621] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 02:37:39.743305 env[1255]: 2024-12-13 02:37:39.707 [INFO][3621] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 02:37:39.743305 env[1255]: 2024-12-13 02:37:39.707 [INFO][3621] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.482b132e76c8ade3345e04e6118cedf99acc240aced9066243a3b42b3a19e952" host="localhost" Dec 13 02:37:39.743305 env[1255]: 2024-12-13 02:37:39.709 [INFO][3621] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.482b132e76c8ade3345e04e6118cedf99acc240aced9066243a3b42b3a19e952 Dec 13 02:37:39.743305 env[1255]: 2024-12-13 02:37:39.715 [INFO][3621] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.482b132e76c8ade3345e04e6118cedf99acc240aced9066243a3b42b3a19e952" host="localhost" Dec 13 02:37:39.743305 env[1255]: 2024-12-13 02:37:39.720 [INFO][3621] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.482b132e76c8ade3345e04e6118cedf99acc240aced9066243a3b42b3a19e952" host="localhost" Dec 13 02:37:39.743305 env[1255]: 2024-12-13 02:37:39.720 [INFO][3621] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.482b132e76c8ade3345e04e6118cedf99acc240aced9066243a3b42b3a19e952" host="localhost" Dec 13 02:37:39.743305 env[1255]: 2024-12-13 02:37:39.720 [INFO][3621] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:37:39.743305 env[1255]: 2024-12-13 02:37:39.720 [INFO][3621] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="482b132e76c8ade3345e04e6118cedf99acc240aced9066243a3b42b3a19e952" HandleID="k8s-pod-network.482b132e76c8ade3345e04e6118cedf99acc240aced9066243a3b42b3a19e952" Workload="localhost-k8s-csi--node--driver--kmgrt-eth0" Dec 13 02:37:39.745451 env[1255]: 2024-12-13 02:37:39.721 [INFO][3579] cni-plugin/k8s.go 386: Populated endpoint ContainerID="482b132e76c8ade3345e04e6118cedf99acc240aced9066243a3b42b3a19e952" Namespace="calico-system" Pod="csi-node-driver-kmgrt" WorkloadEndpoint="localhost-k8s-csi--node--driver--kmgrt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--kmgrt-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"63f11487-359c-4b4b-808e-af281c2987db", ResourceVersion:"752", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 37, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-kmgrt", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali013ed8b7951", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:37:39.745451 env[1255]: 2024-12-13 02:37:39.721 [INFO][3579] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="482b132e76c8ade3345e04e6118cedf99acc240aced9066243a3b42b3a19e952" Namespace="calico-system" Pod="csi-node-driver-kmgrt" WorkloadEndpoint="localhost-k8s-csi--node--driver--kmgrt-eth0" Dec 13 02:37:39.745451 env[1255]: 2024-12-13 02:37:39.721 [INFO][3579] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali013ed8b7951 ContainerID="482b132e76c8ade3345e04e6118cedf99acc240aced9066243a3b42b3a19e952" Namespace="calico-system" Pod="csi-node-driver-kmgrt" WorkloadEndpoint="localhost-k8s-csi--node--driver--kmgrt-eth0" Dec 13 02:37:39.745451 env[1255]: 2024-12-13 02:37:39.733 [INFO][3579] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="482b132e76c8ade3345e04e6118cedf99acc240aced9066243a3b42b3a19e952" Namespace="calico-system" Pod="csi-node-driver-kmgrt" WorkloadEndpoint="localhost-k8s-csi--node--driver--kmgrt-eth0" Dec 13 02:37:39.745451 env[1255]: 2024-12-13 02:37:39.734 [INFO][3579] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="482b132e76c8ade3345e04e6118cedf99acc240aced9066243a3b42b3a19e952" Namespace="calico-system" Pod="csi-node-driver-kmgrt" WorkloadEndpoint="localhost-k8s-csi--node--driver--kmgrt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--kmgrt-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"63f11487-359c-4b4b-808e-af281c2987db", ResourceVersion:"752", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 37, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"482b132e76c8ade3345e04e6118cedf99acc240aced9066243a3b42b3a19e952", Pod:"csi-node-driver-kmgrt", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali013ed8b7951", MAC:"02:b0:0f:c9:04:84", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:37:39.745451 env[1255]: 2024-12-13 02:37:39.740 [INFO][3579] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="482b132e76c8ade3345e04e6118cedf99acc240aced9066243a3b42b3a19e952" Namespace="calico-system" Pod="csi-node-driver-kmgrt" WorkloadEndpoint="localhost-k8s-csi--node--driver--kmgrt-eth0" Dec 13 02:37:39.744000 audit[3647]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3647 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:37:39.744000 audit[3647]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe90242a70 a2=0 a3=7ffe90242a5c items=0 ppid=3494 pid=3647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.744000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:37:39.760000 audit[3646]: NETFILTER_CFG table=raw:98 family=2 entries=21 op=nft_register_chain pid=3646 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:37:39.760000 audit[3646]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc44851a00 a2=0 a3=7ffc448519ec items=0 ppid=3494 pid=3646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.760000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:37:39.764000 audit[3650]: NETFILTER_CFG table=nat:99 family=2 entries=15 op=nft_register_chain pid=3650 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:37:39.764000 audit[3650]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd306bae80 a2=0 a3=7ffd306bae6c items=0 ppid=3494 pid=3650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.764000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:37:39.777309 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif1360ec88a9: link becomes ready Dec 13 02:37:39.768000 audit[3651]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=3651 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:37:39.768000 audit[3651]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffdba227510 a2=0 a3=7ffdba2274fc items=0 ppid=3494 pid=3651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.768000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:37:39.775033 systemd-networkd[1060]: calif1360ec88a9: Link UP Dec 13 02:37:39.777288 systemd-networkd[1060]: calif1360ec88a9: Gained carrier Dec 13 02:37:39.787095 env[1255]: 2024-12-13 02:37:39.641 [INFO][3590] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7db6d8ff4d--jrp2n-eth0 coredns-7db6d8ff4d- kube-system 049a69b1-19e4-47a5-9d0a-afb8d1ea62a8 753 0 2024-12-13 02:37:07 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7db6d8ff4d-jrp2n eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calif1360ec88a9 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="0c19ea4fa69b1a3cb2535991adea167d5ac4051ba10c9b2e5d22a127213f8f95" Namespace="kube-system" Pod="coredns-7db6d8ff4d-jrp2n" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--jrp2n-" Dec 13 02:37:39.787095 env[1255]: 2024-12-13 02:37:39.641 [INFO][3590] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="0c19ea4fa69b1a3cb2535991adea167d5ac4051ba10c9b2e5d22a127213f8f95" Namespace="kube-system" Pod="coredns-7db6d8ff4d-jrp2n" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--jrp2n-eth0" Dec 13 02:37:39.787095 env[1255]: 2024-12-13 02:37:39.699 [INFO][3628] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0c19ea4fa69b1a3cb2535991adea167d5ac4051ba10c9b2e5d22a127213f8f95" HandleID="k8s-pod-network.0c19ea4fa69b1a3cb2535991adea167d5ac4051ba10c9b2e5d22a127213f8f95" Workload="localhost-k8s-coredns--7db6d8ff4d--jrp2n-eth0" Dec 13 02:37:39.787095 env[1255]: 2024-12-13 02:37:39.719 [INFO][3628] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0c19ea4fa69b1a3cb2535991adea167d5ac4051ba10c9b2e5d22a127213f8f95" HandleID="k8s-pod-network.0c19ea4fa69b1a3cb2535991adea167d5ac4051ba10c9b2e5d22a127213f8f95" Workload="localhost-k8s-coredns--7db6d8ff4d--jrp2n-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318e90), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7db6d8ff4d-jrp2n", "timestamp":"2024-12-13 02:37:39.699640413 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:37:39.787095 env[1255]: 2024-12-13 02:37:39.719 [INFO][3628] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:37:39.787095 env[1255]: 2024-12-13 02:37:39.721 [INFO][3628] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:37:39.787095 env[1255]: 2024-12-13 02:37:39.721 [INFO][3628] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 02:37:39.787095 env[1255]: 2024-12-13 02:37:39.734 [INFO][3628] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0c19ea4fa69b1a3cb2535991adea167d5ac4051ba10c9b2e5d22a127213f8f95" host="localhost" Dec 13 02:37:39.787095 env[1255]: 2024-12-13 02:37:39.741 [INFO][3628] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 02:37:39.787095 env[1255]: 2024-12-13 02:37:39.750 [INFO][3628] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 02:37:39.787095 env[1255]: 2024-12-13 02:37:39.752 [INFO][3628] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 02:37:39.787095 env[1255]: 2024-12-13 02:37:39.755 [INFO][3628] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 02:37:39.787095 env[1255]: 2024-12-13 02:37:39.756 [INFO][3628] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.0c19ea4fa69b1a3cb2535991adea167d5ac4051ba10c9b2e5d22a127213f8f95" host="localhost" Dec 13 02:37:39.787095 env[1255]: 2024-12-13 02:37:39.758 [INFO][3628] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.0c19ea4fa69b1a3cb2535991adea167d5ac4051ba10c9b2e5d22a127213f8f95 Dec 13 02:37:39.787095 env[1255]: 2024-12-13 02:37:39.766 [INFO][3628] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.0c19ea4fa69b1a3cb2535991adea167d5ac4051ba10c9b2e5d22a127213f8f95" host="localhost" Dec 13 02:37:39.787095 env[1255]: 2024-12-13 02:37:39.770 [INFO][3628] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.0c19ea4fa69b1a3cb2535991adea167d5ac4051ba10c9b2e5d22a127213f8f95" host="localhost" Dec 13 02:37:39.787095 env[1255]: 2024-12-13 02:37:39.770 [INFO][3628] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.0c19ea4fa69b1a3cb2535991adea167d5ac4051ba10c9b2e5d22a127213f8f95" host="localhost" Dec 13 02:37:39.787095 env[1255]: 2024-12-13 02:37:39.770 [INFO][3628] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:37:39.787095 env[1255]: 2024-12-13 02:37:39.770 [INFO][3628] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="0c19ea4fa69b1a3cb2535991adea167d5ac4051ba10c9b2e5d22a127213f8f95" HandleID="k8s-pod-network.0c19ea4fa69b1a3cb2535991adea167d5ac4051ba10c9b2e5d22a127213f8f95" Workload="localhost-k8s-coredns--7db6d8ff4d--jrp2n-eth0" Dec 13 02:37:39.787589 env[1255]: 2024-12-13 02:37:39.772 [INFO][3590] cni-plugin/k8s.go 386: Populated endpoint ContainerID="0c19ea4fa69b1a3cb2535991adea167d5ac4051ba10c9b2e5d22a127213f8f95" Namespace="kube-system" Pod="coredns-7db6d8ff4d-jrp2n" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--jrp2n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--jrp2n-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"049a69b1-19e4-47a5-9d0a-afb8d1ea62a8", ResourceVersion:"753", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 37, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7db6d8ff4d-jrp2n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif1360ec88a9", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:37:39.787589 env[1255]: 2024-12-13 02:37:39.772 [INFO][3590] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="0c19ea4fa69b1a3cb2535991adea167d5ac4051ba10c9b2e5d22a127213f8f95" Namespace="kube-system" Pod="coredns-7db6d8ff4d-jrp2n" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--jrp2n-eth0" Dec 13 02:37:39.787589 env[1255]: 2024-12-13 02:37:39.772 [INFO][3590] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif1360ec88a9 ContainerID="0c19ea4fa69b1a3cb2535991adea167d5ac4051ba10c9b2e5d22a127213f8f95" Namespace="kube-system" Pod="coredns-7db6d8ff4d-jrp2n" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--jrp2n-eth0" Dec 13 02:37:39.787589 env[1255]: 2024-12-13 02:37:39.777 [INFO][3590] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0c19ea4fa69b1a3cb2535991adea167d5ac4051ba10c9b2e5d22a127213f8f95" Namespace="kube-system" Pod="coredns-7db6d8ff4d-jrp2n" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--jrp2n-eth0" Dec 13 02:37:39.787589 env[1255]: 2024-12-13 02:37:39.777 [INFO][3590] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="0c19ea4fa69b1a3cb2535991adea167d5ac4051ba10c9b2e5d22a127213f8f95" Namespace="kube-system" Pod="coredns-7db6d8ff4d-jrp2n" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--jrp2n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--jrp2n-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"049a69b1-19e4-47a5-9d0a-afb8d1ea62a8", ResourceVersion:"753", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 37, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0c19ea4fa69b1a3cb2535991adea167d5ac4051ba10c9b2e5d22a127213f8f95", Pod:"coredns-7db6d8ff4d-jrp2n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif1360ec88a9", MAC:"d6:a3:e1:d4:51:d5", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:37:39.787589 env[1255]: 2024-12-13 02:37:39.783 [INFO][3590] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="0c19ea4fa69b1a3cb2535991adea167d5ac4051ba10c9b2e5d22a127213f8f95" Namespace="kube-system" Pod="coredns-7db6d8ff4d-jrp2n" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--jrp2n-eth0" Dec 13 02:37:39.791619 env[1255]: time="2024-12-13T02:37:39.791291580Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:37:39.791619 env[1255]: time="2024-12-13T02:37:39.791327497Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:37:39.791619 env[1255]: time="2024-12-13T02:37:39.791335088Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:37:39.791619 env[1255]: time="2024-12-13T02:37:39.791543882Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/482b132e76c8ade3345e04e6118cedf99acc240aced9066243a3b42b3a19e952 pid=3674 runtime=io.containerd.runc.v2 Dec 13 02:37:39.804902 systemd[1]: Started cri-containerd-482b132e76c8ade3345e04e6118cedf99acc240aced9066243a3b42b3a19e952.scope. Dec 13 02:37:39.807080 env[1255]: time="2024-12-13T02:37:39.805866314Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:37:39.807080 env[1255]: time="2024-12-13T02:37:39.805907873Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:37:39.807080 env[1255]: time="2024-12-13T02:37:39.805915429Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:37:39.807080 env[1255]: time="2024-12-13T02:37:39.806185279Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0c19ea4fa69b1a3cb2535991adea167d5ac4051ba10c9b2e5d22a127213f8f95 pid=3706 runtime=io.containerd.runc.v2 Dec 13 02:37:39.816137 systemd[1]: Started cri-containerd-0c19ea4fa69b1a3cb2535991adea167d5ac4051ba10c9b2e5d22a127213f8f95.scope. Dec 13 02:37:39.824000 audit[3733]: NETFILTER_CFG table=filter:101 family=2 entries=64 op=nft_register_chain pid=3733 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:37:39.824000 audit[3733]: SYSCALL arch=c000003e syscall=46 success=yes exit=36584 a0=3 a1=7ffea1412270 a2=0 a3=7ffea141225c items=0 ppid=3494 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.824000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:37:39.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.829000 audit: BPF prog-id=158 op=LOAD Dec 13 02:37:39.829000 audit[3722]: AVC avc: denied { bpf } for pid=3722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.829000 audit[3722]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3706 pid=3722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063313965613466613639623161336362323533353939316164656131 Dec 13 02:37:39.829000 audit[3722]: AVC avc: denied { perfmon } for pid=3722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.829000 audit[3722]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3706 pid=3722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063313965613466613639623161336362323533353939316164656131 Dec 13 02:37:39.829000 audit[3722]: AVC avc: denied { bpf } for pid=3722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.829000 audit[3722]: AVC avc: denied { bpf } for pid=3722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.829000 audit[3722]: AVC avc: denied { bpf } for pid=3722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.829000 audit[3722]: AVC avc: denied { perfmon } for pid=3722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.829000 audit[3722]: AVC avc: denied { perfmon } for pid=3722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.829000 audit[3722]: AVC avc: denied { perfmon } for pid=3722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.829000 audit[3722]: AVC avc: denied { perfmon } for pid=3722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.829000 audit[3722]: AVC avc: denied { perfmon } for pid=3722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.829000 audit[3722]: AVC avc: denied { bpf } for pid=3722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.829000 audit[3722]: AVC avc: denied { bpf } for pid=3722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.829000 audit: BPF prog-id=159 op=LOAD Dec 13 02:37:39.829000 audit[3722]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00029bb20 items=0 ppid=3706 pid=3722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063313965613466613639623161336362323533353939316164656131 Dec 13 02:37:39.829000 audit[3722]: AVC avc: denied { bpf } for pid=3722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.829000 audit[3722]: AVC avc: denied { bpf } for pid=3722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.829000 audit[3722]: AVC avc: denied { perfmon } for pid=3722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.829000 audit[3722]: AVC avc: denied { perfmon } for pid=3722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.829000 audit[3722]: AVC avc: denied { perfmon } for pid=3722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.829000 audit[3722]: AVC avc: denied { perfmon } for pid=3722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.829000 audit[3722]: AVC avc: denied { perfmon } for pid=3722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.829000 audit[3722]: AVC avc: denied { bpf } for pid=3722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.829000 audit[3722]: AVC avc: denied { bpf } for pid=3722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.829000 audit: BPF prog-id=160 op=LOAD Dec 13 02:37:39.829000 audit[3722]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00029bb68 items=0 ppid=3706 pid=3722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063313965613466613639623161336362323533353939316164656131 Dec 13 02:37:39.830000 audit: BPF prog-id=160 op=UNLOAD Dec 13 02:37:39.830000 audit: BPF prog-id=159 op=UNLOAD Dec 13 02:37:39.830000 audit[3722]: AVC avc: denied { bpf } for pid=3722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.830000 audit[3722]: AVC avc: denied { bpf } for pid=3722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.830000 audit[3722]: AVC avc: denied { bpf } for pid=3722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.830000 audit[3722]: AVC avc: denied { perfmon } for pid=3722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.830000 audit[3722]: AVC avc: denied { perfmon } for pid=3722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.830000 audit[3722]: AVC avc: denied { perfmon } for pid=3722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.830000 audit[3722]: AVC avc: denied { perfmon } for pid=3722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.830000 audit[3722]: AVC avc: denied { perfmon } for pid=3722 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.830000 audit[3722]: AVC avc: denied { bpf } for pid=3722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.830000 audit[3722]: AVC avc: denied { bpf } for pid=3722 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.830000 audit: BPF prog-id=161 op=LOAD Dec 13 02:37:39.830000 audit[3722]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00029bf78 items=0 ppid=3706 pid=3722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063313965613466613639623161336362323533353939316164656131 Dec 13 02:37:39.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit: BPF prog-id=162 op=LOAD Dec 13 02:37:39.836000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[3695]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3674 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438326231333265373663386164653333343565303465363131386365 Dec 13 02:37:39.836000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[3695]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3674 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438326231333265373663386164653333343565303465363131386365 Dec 13 02:37:39.836000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit: BPF prog-id=163 op=LOAD Dec 13 02:37:39.836000 audit[3695]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a06b0 items=0 ppid=3674 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438326231333265373663386164653333343565303465363131386365 Dec 13 02:37:39.836000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit: BPF prog-id=164 op=LOAD Dec 13 02:37:39.836000 audit[3695]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a06f8 items=0 ppid=3674 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438326231333265373663386164653333343565303465363131386365 Dec 13 02:37:39.836000 audit: BPF prog-id=164 op=UNLOAD Dec 13 02:37:39.836000 audit: BPF prog-id=163 op=UNLOAD Dec 13 02:37:39.836000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.836000 audit: BPF prog-id=165 op=LOAD Dec 13 02:37:39.836000 audit[3695]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a0b08 items=0 ppid=3674 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.836000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438326231333265373663386164653333343565303465363131386365 Dec 13 02:37:39.831799 systemd-resolved[1194]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:37:39.842410 systemd-resolved[1194]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:37:39.855333 env[1255]: time="2024-12-13T02:37:39.855304660Z" level=info msg="StopPodSandbox for \"e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63\"" Dec 13 02:37:39.860373 env[1255]: time="2024-12-13T02:37:39.860338216Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-jrp2n,Uid:049a69b1-19e4-47a5-9d0a-afb8d1ea62a8,Namespace:kube-system,Attempt:1,} returns sandbox id \"0c19ea4fa69b1a3cb2535991adea167d5ac4051ba10c9b2e5d22a127213f8f95\"" Dec 13 02:37:39.866026 env[1255]: time="2024-12-13T02:37:39.865992678Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kmgrt,Uid:63f11487-359c-4b4b-808e-af281c2987db,Namespace:calico-system,Attempt:1,} returns sandbox id \"482b132e76c8ade3345e04e6118cedf99acc240aced9066243a3b42b3a19e952\"" Dec 13 02:37:39.913514 env[1255]: time="2024-12-13T02:37:39.913485748Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 02:37:39.918870 env[1255]: time="2024-12-13T02:37:39.918840141Z" level=info msg="CreateContainer within sandbox \"0c19ea4fa69b1a3cb2535991adea167d5ac4051ba10c9b2e5d22a127213f8f95\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 02:37:39.937555 env[1255]: time="2024-12-13T02:37:39.937519700Z" level=info msg="CreateContainer within sandbox \"0c19ea4fa69b1a3cb2535991adea167d5ac4051ba10c9b2e5d22a127213f8f95\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"7c83abef53e281d6c78a0eb3c68c569542280326ccd2d1f8ec3aae14a6c79c9c\"" Dec 13 02:37:39.939223 env[1255]: time="2024-12-13T02:37:39.939164245Z" level=info msg="StartContainer for \"7c83abef53e281d6c78a0eb3c68c569542280326ccd2d1f8ec3aae14a6c79c9c\"" Dec 13 02:37:39.957333 systemd[1]: Started cri-containerd-7c83abef53e281d6c78a0eb3c68c569542280326ccd2d1f8ec3aae14a6c79c9c.scope. Dec 13 02:37:39.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.981000 audit: BPF prog-id=166 op=LOAD Dec 13 02:37:39.985000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.985000 audit[3791]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3706 pid=3791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763383361626566353365323831643663373861306562336336386335 Dec 13 02:37:39.985000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.985000 audit[3791]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3706 pid=3791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763383361626566353365323831643663373861306562336336386335 Dec 13 02:37:39.985000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.985000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.985000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.985000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.985000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.985000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.985000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.985000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.985000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.985000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.985000 audit: BPF prog-id=167 op=LOAD Dec 13 02:37:39.985000 audit[3791]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000025130 items=0 ppid=3706 pid=3791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763383361626566353365323831643663373861306562336336386335 Dec 13 02:37:39.986000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.986000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.986000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.986000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.986000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.986000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.986000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.986000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.986000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.986000 audit: BPF prog-id=168 op=LOAD Dec 13 02:37:39.986000 audit[3791]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000025178 items=0 ppid=3706 pid=3791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763383361626566353365323831643663373861306562336336386335 Dec 13 02:37:39.986000 audit: BPF prog-id=168 op=UNLOAD Dec 13 02:37:39.986000 audit: BPF prog-id=167 op=UNLOAD Dec 13 02:37:39.986000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.986000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.986000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.986000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.986000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.986000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.986000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.986000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.986000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.986000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:39.986000 audit: BPF prog-id=169 op=LOAD Dec 13 02:37:39.986000 audit[3791]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000025588 items=0 ppid=3706 pid=3791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:39.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763383361626566353365323831643663373861306562336336386335 Dec 13 02:37:40.011245 env[1255]: time="2024-12-13T02:37:40.011210601Z" level=info msg="StartContainer for \"7c83abef53e281d6c78a0eb3c68c569542280326ccd2d1f8ec3aae14a6c79c9c\" returns successfully" Dec 13 02:37:40.019191 env[1255]: 2024-12-13 02:37:39.969 [INFO][3777] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" Dec 13 02:37:40.019191 env[1255]: 2024-12-13 02:37:39.970 [INFO][3777] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" iface="eth0" netns="/var/run/netns/cni-656739fc-73bd-05c4-47d9-2b8cd665dd3a" Dec 13 02:37:40.019191 env[1255]: 2024-12-13 02:37:39.970 [INFO][3777] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" iface="eth0" netns="/var/run/netns/cni-656739fc-73bd-05c4-47d9-2b8cd665dd3a" Dec 13 02:37:40.019191 env[1255]: 2024-12-13 02:37:39.971 [INFO][3777] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" iface="eth0" netns="/var/run/netns/cni-656739fc-73bd-05c4-47d9-2b8cd665dd3a" Dec 13 02:37:40.019191 env[1255]: 2024-12-13 02:37:39.971 [INFO][3777] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" Dec 13 02:37:40.019191 env[1255]: 2024-12-13 02:37:39.971 [INFO][3777] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" Dec 13 02:37:40.019191 env[1255]: 2024-12-13 02:37:40.000 [INFO][3808] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" HandleID="k8s-pod-network.e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" Workload="localhost-k8s-coredns--7db6d8ff4d--m6sv5-eth0" Dec 13 02:37:40.019191 env[1255]: 2024-12-13 02:37:40.000 [INFO][3808] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:37:40.019191 env[1255]: 2024-12-13 02:37:40.000 [INFO][3808] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:37:40.019191 env[1255]: 2024-12-13 02:37:40.015 [WARNING][3808] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" HandleID="k8s-pod-network.e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" Workload="localhost-k8s-coredns--7db6d8ff4d--m6sv5-eth0" Dec 13 02:37:40.019191 env[1255]: 2024-12-13 02:37:40.015 [INFO][3808] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" HandleID="k8s-pod-network.e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" Workload="localhost-k8s-coredns--7db6d8ff4d--m6sv5-eth0" Dec 13 02:37:40.019191 env[1255]: 2024-12-13 02:37:40.016 [INFO][3808] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:37:40.019191 env[1255]: 2024-12-13 02:37:40.017 [INFO][3777] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" Dec 13 02:37:40.025476 env[1255]: time="2024-12-13T02:37:40.019409369Z" level=info msg="TearDown network for sandbox \"e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63\" successfully" Dec 13 02:37:40.025476 env[1255]: time="2024-12-13T02:37:40.019430635Z" level=info msg="StopPodSandbox for \"e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63\" returns successfully" Dec 13 02:37:40.025476 env[1255]: time="2024-12-13T02:37:40.019866184Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-m6sv5,Uid:011e69b1-6ba1-45b9-baab-a1b5873b9984,Namespace:kube-system,Attempt:1,}" Dec 13 02:37:40.218099 systemd-networkd[1060]: cali4043f1d8f5f: Link UP Dec 13 02:37:40.218263 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4043f1d8f5f: link becomes ready Dec 13 02:37:40.218243 systemd-networkd[1060]: cali4043f1d8f5f: Gained carrier Dec 13 02:37:40.244702 env[1255]: 2024-12-13 02:37:40.132 [INFO][3822] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7db6d8ff4d--m6sv5-eth0 coredns-7db6d8ff4d- kube-system 011e69b1-6ba1-45b9-baab-a1b5873b9984 766 0 2024-12-13 02:37:07 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7db6d8ff4d-m6sv5 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali4043f1d8f5f [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="4a5d7f01ccc2a402cf09828009f5c69d3f2bc56bb4668900f6e62e3a372dcc2b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-m6sv5" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--m6sv5-" Dec 13 02:37:40.244702 env[1255]: 2024-12-13 02:37:40.132 [INFO][3822] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="4a5d7f01ccc2a402cf09828009f5c69d3f2bc56bb4668900f6e62e3a372dcc2b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-m6sv5" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--m6sv5-eth0" Dec 13 02:37:40.244702 env[1255]: 2024-12-13 02:37:40.150 [INFO][3833] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4a5d7f01ccc2a402cf09828009f5c69d3f2bc56bb4668900f6e62e3a372dcc2b" HandleID="k8s-pod-network.4a5d7f01ccc2a402cf09828009f5c69d3f2bc56bb4668900f6e62e3a372dcc2b" Workload="localhost-k8s-coredns--7db6d8ff4d--m6sv5-eth0" Dec 13 02:37:40.244702 env[1255]: 2024-12-13 02:37:40.164 [INFO][3833] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4a5d7f01ccc2a402cf09828009f5c69d3f2bc56bb4668900f6e62e3a372dcc2b" HandleID="k8s-pod-network.4a5d7f01ccc2a402cf09828009f5c69d3f2bc56bb4668900f6e62e3a372dcc2b" Workload="localhost-k8s-coredns--7db6d8ff4d--m6sv5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318fd0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7db6d8ff4d-m6sv5", "timestamp":"2024-12-13 02:37:40.150801576 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:37:40.244702 env[1255]: 2024-12-13 02:37:40.165 [INFO][3833] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:37:40.244702 env[1255]: 2024-12-13 02:37:40.165 [INFO][3833] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:37:40.244702 env[1255]: 2024-12-13 02:37:40.165 [INFO][3833] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 02:37:40.244702 env[1255]: 2024-12-13 02:37:40.173 [INFO][3833] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4a5d7f01ccc2a402cf09828009f5c69d3f2bc56bb4668900f6e62e3a372dcc2b" host="localhost" Dec 13 02:37:40.244702 env[1255]: 2024-12-13 02:37:40.186 [INFO][3833] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 02:37:40.244702 env[1255]: 2024-12-13 02:37:40.189 [INFO][3833] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 02:37:40.244702 env[1255]: 2024-12-13 02:37:40.190 [INFO][3833] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 02:37:40.244702 env[1255]: 2024-12-13 02:37:40.192 [INFO][3833] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 02:37:40.244702 env[1255]: 2024-12-13 02:37:40.192 [INFO][3833] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.4a5d7f01ccc2a402cf09828009f5c69d3f2bc56bb4668900f6e62e3a372dcc2b" host="localhost" Dec 13 02:37:40.244702 env[1255]: 2024-12-13 02:37:40.192 [INFO][3833] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.4a5d7f01ccc2a402cf09828009f5c69d3f2bc56bb4668900f6e62e3a372dcc2b Dec 13 02:37:40.244702 env[1255]: 2024-12-13 02:37:40.195 [INFO][3833] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.4a5d7f01ccc2a402cf09828009f5c69d3f2bc56bb4668900f6e62e3a372dcc2b" host="localhost" Dec 13 02:37:40.244702 env[1255]: 2024-12-13 02:37:40.212 [INFO][3833] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.4a5d7f01ccc2a402cf09828009f5c69d3f2bc56bb4668900f6e62e3a372dcc2b" host="localhost" Dec 13 02:37:40.244702 env[1255]: 2024-12-13 02:37:40.212 [INFO][3833] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.4a5d7f01ccc2a402cf09828009f5c69d3f2bc56bb4668900f6e62e3a372dcc2b" host="localhost" Dec 13 02:37:40.244702 env[1255]: 2024-12-13 02:37:40.212 [INFO][3833] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:37:40.244702 env[1255]: 2024-12-13 02:37:40.212 [INFO][3833] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="4a5d7f01ccc2a402cf09828009f5c69d3f2bc56bb4668900f6e62e3a372dcc2b" HandleID="k8s-pod-network.4a5d7f01ccc2a402cf09828009f5c69d3f2bc56bb4668900f6e62e3a372dcc2b" Workload="localhost-k8s-coredns--7db6d8ff4d--m6sv5-eth0" Dec 13 02:37:40.250743 env[1255]: 2024-12-13 02:37:40.214 [INFO][3822] cni-plugin/k8s.go 386: Populated endpoint ContainerID="4a5d7f01ccc2a402cf09828009f5c69d3f2bc56bb4668900f6e62e3a372dcc2b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-m6sv5" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--m6sv5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--m6sv5-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"011e69b1-6ba1-45b9-baab-a1b5873b9984", ResourceVersion:"766", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 37, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7db6d8ff4d-m6sv5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4043f1d8f5f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:37:40.250743 env[1255]: 2024-12-13 02:37:40.214 [INFO][3822] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="4a5d7f01ccc2a402cf09828009f5c69d3f2bc56bb4668900f6e62e3a372dcc2b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-m6sv5" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--m6sv5-eth0" Dec 13 02:37:40.250743 env[1255]: 2024-12-13 02:37:40.214 [INFO][3822] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4043f1d8f5f ContainerID="4a5d7f01ccc2a402cf09828009f5c69d3f2bc56bb4668900f6e62e3a372dcc2b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-m6sv5" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--m6sv5-eth0" Dec 13 02:37:40.250743 env[1255]: 2024-12-13 02:37:40.218 [INFO][3822] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4a5d7f01ccc2a402cf09828009f5c69d3f2bc56bb4668900f6e62e3a372dcc2b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-m6sv5" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--m6sv5-eth0" Dec 13 02:37:40.250743 env[1255]: 2024-12-13 02:37:40.218 [INFO][3822] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="4a5d7f01ccc2a402cf09828009f5c69d3f2bc56bb4668900f6e62e3a372dcc2b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-m6sv5" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--m6sv5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--m6sv5-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"011e69b1-6ba1-45b9-baab-a1b5873b9984", ResourceVersion:"766", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 37, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4a5d7f01ccc2a402cf09828009f5c69d3f2bc56bb4668900f6e62e3a372dcc2b", Pod:"coredns-7db6d8ff4d-m6sv5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4043f1d8f5f", MAC:"c2:bb:3a:cb:38:dc", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:37:40.250743 env[1255]: 2024-12-13 02:37:40.242 [INFO][3822] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="4a5d7f01ccc2a402cf09828009f5c69d3f2bc56bb4668900f6e62e3a372dcc2b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-m6sv5" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--m6sv5-eth0" Dec 13 02:37:40.255000 audit[3854]: NETFILTER_CFG table=filter:102 family=2 entries=34 op=nft_register_chain pid=3854 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:37:40.255000 audit[3854]: SYSCALL arch=c000003e syscall=46 success=yes exit=18220 a0=3 a1=7ffe048c7c90 a2=0 a3=7ffe048c7c7c items=0 ppid=3494 pid=3854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:40.255000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:37:40.262096 env[1255]: time="2024-12-13T02:37:40.257557292Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:37:40.262096 env[1255]: time="2024-12-13T02:37:40.257590599Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:37:40.262096 env[1255]: time="2024-12-13T02:37:40.257598276Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:37:40.262096 env[1255]: time="2024-12-13T02:37:40.257701015Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4a5d7f01ccc2a402cf09828009f5c69d3f2bc56bb4668900f6e62e3a372dcc2b pid=3862 runtime=io.containerd.runc.v2 Dec 13 02:37:40.266741 systemd[1]: Started cri-containerd-4a5d7f01ccc2a402cf09828009f5c69d3f2bc56bb4668900f6e62e3a372dcc2b.scope. Dec 13 02:37:40.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.276000 audit: BPF prog-id=170 op=LOAD Dec 13 02:37:40.277000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.277000 audit[3872]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3862 pid=3872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:40.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461356437663031636363326134303263663039383238303039663563 Dec 13 02:37:40.277000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.277000 audit[3872]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3862 pid=3872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:40.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461356437663031636363326134303263663039383238303039663563 Dec 13 02:37:40.277000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.277000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.277000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.277000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.277000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.277000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.277000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.277000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.277000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.277000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.277000 audit: BPF prog-id=171 op=LOAD Dec 13 02:37:40.277000 audit[3872]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000024380 items=0 ppid=3862 pid=3872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:40.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461356437663031636363326134303263663039383238303039663563 Dec 13 02:37:40.277000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.277000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.277000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.277000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.277000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.277000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.277000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.277000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.277000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.277000 audit: BPF prog-id=172 op=LOAD Dec 13 02:37:40.277000 audit[3872]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0000243c8 items=0 ppid=3862 pid=3872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:40.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461356437663031636363326134303263663039383238303039663563 Dec 13 02:37:40.277000 audit: BPF prog-id=172 op=UNLOAD Dec 13 02:37:40.277000 audit: BPF prog-id=171 op=UNLOAD Dec 13 02:37:40.277000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.277000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.277000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.277000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.277000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.277000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.277000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.277000 audit[3872]: AVC avc: denied { perfmon } for pid=3872 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.277000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.277000 audit[3872]: AVC avc: denied { bpf } for pid=3872 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.277000 audit: BPF prog-id=173 op=LOAD Dec 13 02:37:40.277000 audit[3872]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0000247d8 items=0 ppid=3862 pid=3872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:40.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461356437663031636363326134303263663039383238303039663563 Dec 13 02:37:40.279305 systemd-resolved[1194]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:37:40.302421 env[1255]: time="2024-12-13T02:37:40.302388898Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-m6sv5,Uid:011e69b1-6ba1-45b9-baab-a1b5873b9984,Namespace:kube-system,Attempt:1,} returns sandbox id \"4a5d7f01ccc2a402cf09828009f5c69d3f2bc56bb4668900f6e62e3a372dcc2b\"" Dec 13 02:37:40.313177 env[1255]: time="2024-12-13T02:37:40.313148045Z" level=info msg="CreateContainer within sandbox \"4a5d7f01ccc2a402cf09828009f5c69d3f2bc56bb4668900f6e62e3a372dcc2b\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 02:37:40.397127 env[1255]: time="2024-12-13T02:37:40.397091371Z" level=info msg="CreateContainer within sandbox \"4a5d7f01ccc2a402cf09828009f5c69d3f2bc56bb4668900f6e62e3a372dcc2b\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"b5c05923a0114fc2a3adf5ef6d83b02bee6a789f7100a69af434789c563e0c77\"" Dec 13 02:37:40.398699 env[1255]: time="2024-12-13T02:37:40.398252437Z" level=info msg="StartContainer for \"b5c05923a0114fc2a3adf5ef6d83b02bee6a789f7100a69af434789c563e0c77\"" Dec 13 02:37:40.411222 systemd[1]: Started cri-containerd-b5c05923a0114fc2a3adf5ef6d83b02bee6a789f7100a69af434789c563e0c77.scope. Dec 13 02:37:40.419913 systemd[1]: run-netns-cni\x2d656739fc\x2d73bd\x2d05c4\x2d47d9\x2d2b8cd665dd3a.mount: Deactivated successfully. Dec 13 02:37:40.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.429000 audit: BPF prog-id=174 op=LOAD Dec 13 02:37:40.429000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.429000 audit[3903]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3862 pid=3903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:40.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235633035393233613031313466633261336164663565663664383362 Dec 13 02:37:40.429000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.429000 audit[3903]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3862 pid=3903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:40.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235633035393233613031313466633261336164663565663664383362 Dec 13 02:37:40.429000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.429000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.429000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.429000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.429000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.429000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.429000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.429000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.429000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.429000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.429000 audit: BPF prog-id=175 op=LOAD Dec 13 02:37:40.429000 audit[3903]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000224dc0 items=0 ppid=3862 pid=3903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:40.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235633035393233613031313466633261336164663565663664383362 Dec 13 02:37:40.429000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.429000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.429000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.429000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.429000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.429000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.429000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.429000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.429000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.429000 audit: BPF prog-id=176 op=LOAD Dec 13 02:37:40.429000 audit[3903]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000224e08 items=0 ppid=3862 pid=3903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:40.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235633035393233613031313466633261336164663565663664383362 Dec 13 02:37:40.429000 audit: BPF prog-id=176 op=UNLOAD Dec 13 02:37:40.429000 audit: BPF prog-id=175 op=UNLOAD Dec 13 02:37:40.429000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.429000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.429000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.429000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.429000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.429000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.429000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.429000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.429000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.429000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:40.429000 audit: BPF prog-id=177 op=LOAD Dec 13 02:37:40.429000 audit[3903]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000225218 items=0 ppid=3862 pid=3903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:40.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235633035393233613031313466633261336164663565663664383362 Dec 13 02:37:40.543710 env[1255]: time="2024-12-13T02:37:40.541089984Z" level=info msg="StartContainer for \"b5c05923a0114fc2a3adf5ef6d83b02bee6a789f7100a69af434789c563e0c77\" returns successfully" Dec 13 02:37:40.696411 systemd-networkd[1060]: vxlan.calico: Gained IPv6LL Dec 13 02:37:40.847505 env[1255]: time="2024-12-13T02:37:40.847437837Z" level=info msg="StopPodSandbox for \"3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d\"" Dec 13 02:37:40.848047 env[1255]: time="2024-12-13T02:37:40.847444553Z" level=info msg="StopPodSandbox for \"ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b\"" Dec 13 02:37:40.953906 systemd-networkd[1060]: cali013ed8b7951: Gained IPv6LL Dec 13 02:37:41.009000 audit[3990]: NETFILTER_CFG table=filter:103 family=2 entries=16 op=nft_register_rule pid=3990 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:37:41.009000 audit[3990]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffdcd1ef180 a2=0 a3=7ffdcd1ef16c items=0 ppid=2327 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:41.009000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:37:41.013000 audit[3990]: NETFILTER_CFG table=nat:104 family=2 entries=14 op=nft_register_rule pid=3990 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:37:41.013000 audit[3990]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffdcd1ef180 a2=0 a3=0 items=0 ppid=2327 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:41.013000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:37:41.029616 kubelet[2191]: I1213 02:37:41.027414 2191 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-jrp2n" podStartSLOduration=34.027392804 podStartE2EDuration="34.027392804s" podCreationTimestamp="2024-12-13 02:37:07 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:37:40.963167087 +0000 UTC m=+48.295038345" watchObservedRunningTime="2024-12-13 02:37:41.027392804 +0000 UTC m=+48.359264055" Dec 13 02:37:41.029924 kubelet[2191]: I1213 02:37:41.029804 2191 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-m6sv5" podStartSLOduration=34.029791027 podStartE2EDuration="34.029791027s" podCreationTimestamp="2024-12-13 02:37:07 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:37:41.029677073 +0000 UTC m=+48.361548322" watchObservedRunningTime="2024-12-13 02:37:41.029791027 +0000 UTC m=+48.361662280" Dec 13 02:37:41.042452 env[1255]: 2024-12-13 02:37:40.909 [INFO][3961] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" Dec 13 02:37:41.042452 env[1255]: 2024-12-13 02:37:40.909 [INFO][3961] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" iface="eth0" netns="/var/run/netns/cni-f3094318-a2fd-1511-b859-bc44961df3ba" Dec 13 02:37:41.042452 env[1255]: 2024-12-13 02:37:40.909 [INFO][3961] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" iface="eth0" netns="/var/run/netns/cni-f3094318-a2fd-1511-b859-bc44961df3ba" Dec 13 02:37:41.042452 env[1255]: 2024-12-13 02:37:40.910 [INFO][3961] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" iface="eth0" netns="/var/run/netns/cni-f3094318-a2fd-1511-b859-bc44961df3ba" Dec 13 02:37:41.042452 env[1255]: 2024-12-13 02:37:40.910 [INFO][3961] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" Dec 13 02:37:41.042452 env[1255]: 2024-12-13 02:37:40.910 [INFO][3961] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" Dec 13 02:37:41.042452 env[1255]: 2024-12-13 02:37:41.020 [INFO][3975] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" HandleID="k8s-pod-network.ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" Workload="localhost-k8s-calico--apiserver--7dfb7b6b59--sf2c7-eth0" Dec 13 02:37:41.042452 env[1255]: 2024-12-13 02:37:41.020 [INFO][3975] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:37:41.042452 env[1255]: 2024-12-13 02:37:41.020 [INFO][3975] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:37:41.042452 env[1255]: 2024-12-13 02:37:41.035 [WARNING][3975] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" HandleID="k8s-pod-network.ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" Workload="localhost-k8s-calico--apiserver--7dfb7b6b59--sf2c7-eth0" Dec 13 02:37:41.042452 env[1255]: 2024-12-13 02:37:41.035 [INFO][3975] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" HandleID="k8s-pod-network.ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" Workload="localhost-k8s-calico--apiserver--7dfb7b6b59--sf2c7-eth0" Dec 13 02:37:41.042452 env[1255]: 2024-12-13 02:37:41.038 [INFO][3975] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:37:41.042452 env[1255]: 2024-12-13 02:37:41.039 [INFO][3961] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" Dec 13 02:37:41.045485 systemd[1]: run-netns-cni\x2df3094318\x2da2fd\x2d1511\x2db859\x2dbc44961df3ba.mount: Deactivated successfully. Dec 13 02:37:41.045811 env[1255]: time="2024-12-13T02:37:41.045779756Z" level=info msg="TearDown network for sandbox \"ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b\" successfully" Dec 13 02:37:41.045898 env[1255]: time="2024-12-13T02:37:41.045881637Z" level=info msg="StopPodSandbox for \"ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b\" returns successfully" Dec 13 02:37:41.046676 env[1255]: time="2024-12-13T02:37:41.046651579Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7dfb7b6b59-sf2c7,Uid:9a772036-63d2-4fbd-b90f-e00c4c528987,Namespace:calico-apiserver,Attempt:1,}" Dec 13 02:37:41.080393 env[1255]: 2024-12-13 02:37:40.934 [INFO][3965] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" Dec 13 02:37:41.080393 env[1255]: 2024-12-13 02:37:40.934 [INFO][3965] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" iface="eth0" netns="/var/run/netns/cni-c12725a3-bdfe-c8a9-d09d-3ee24c15a2ff" Dec 13 02:37:41.080393 env[1255]: 2024-12-13 02:37:40.934 [INFO][3965] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" iface="eth0" netns="/var/run/netns/cni-c12725a3-bdfe-c8a9-d09d-3ee24c15a2ff" Dec 13 02:37:41.080393 env[1255]: 2024-12-13 02:37:40.935 [INFO][3965] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" iface="eth0" netns="/var/run/netns/cni-c12725a3-bdfe-c8a9-d09d-3ee24c15a2ff" Dec 13 02:37:41.080393 env[1255]: 2024-12-13 02:37:40.935 [INFO][3965] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" Dec 13 02:37:41.080393 env[1255]: 2024-12-13 02:37:40.935 [INFO][3965] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" Dec 13 02:37:41.080393 env[1255]: 2024-12-13 02:37:41.020 [INFO][3981] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" HandleID="k8s-pod-network.3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" Workload="localhost-k8s-calico--apiserver--7dfb7b6b59--pdtd9-eth0" Dec 13 02:37:41.080393 env[1255]: 2024-12-13 02:37:41.020 [INFO][3981] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:37:41.080393 env[1255]: 2024-12-13 02:37:41.038 [INFO][3981] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:37:41.080393 env[1255]: 2024-12-13 02:37:41.073 [WARNING][3981] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" HandleID="k8s-pod-network.3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" Workload="localhost-k8s-calico--apiserver--7dfb7b6b59--pdtd9-eth0" Dec 13 02:37:41.080393 env[1255]: 2024-12-13 02:37:41.073 [INFO][3981] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" HandleID="k8s-pod-network.3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" Workload="localhost-k8s-calico--apiserver--7dfb7b6b59--pdtd9-eth0" Dec 13 02:37:41.080393 env[1255]: 2024-12-13 02:37:41.076 [INFO][3981] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:37:41.080393 env[1255]: 2024-12-13 02:37:41.077 [INFO][3965] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" Dec 13 02:37:41.082453 systemd[1]: run-netns-cni\x2dc12725a3\x2dbdfe\x2dc8a9\x2dd09d\x2d3ee24c15a2ff.mount: Deactivated successfully. Dec 13 02:37:41.084274 env[1255]: time="2024-12-13T02:37:41.084243262Z" level=info msg="TearDown network for sandbox \"3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d\" successfully" Dec 13 02:37:41.084421 env[1255]: time="2024-12-13T02:37:41.084406074Z" level=info msg="StopPodSandbox for \"3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d\" returns successfully" Dec 13 02:37:41.085391 env[1255]: time="2024-12-13T02:37:41.085374266Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7dfb7b6b59-pdtd9,Uid:5741a8e0-bb09-43e6-8da2-fba27a6e1250,Namespace:calico-apiserver,Attempt:1,}" Dec 13 02:37:41.170000 audit[4027]: NETFILTER_CFG table=filter:105 family=2 entries=16 op=nft_register_rule pid=4027 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:37:41.170000 audit[4027]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe92256200 a2=0 a3=7ffe922561ec items=0 ppid=2327 pid=4027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:41.170000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:37:41.183000 audit[4027]: NETFILTER_CFG table=nat:106 family=2 entries=14 op=nft_register_rule pid=4027 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:37:41.183000 audit[4027]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffe92256200 a2=0 a3=0 items=0 ppid=2327 pid=4027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:41.183000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:37:41.272329 systemd-networkd[1060]: cali4043f1d8f5f: Gained IPv6LL Dec 13 02:37:41.278824 systemd-networkd[1060]: cali2d978ac264a: Link UP Dec 13 02:37:41.286569 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:37:41.286615 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2d978ac264a: link becomes ready Dec 13 02:37:41.283010 systemd-networkd[1060]: cali2d978ac264a: Gained carrier Dec 13 02:37:41.301161 env[1255]: 2024-12-13 02:37:41.124 [INFO][3993] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--7dfb7b6b59--sf2c7-eth0 calico-apiserver-7dfb7b6b59- calico-apiserver 9a772036-63d2-4fbd-b90f-e00c4c528987 778 0 2024-12-13 02:37:15 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7dfb7b6b59 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-7dfb7b6b59-sf2c7 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali2d978ac264a [] []}} ContainerID="683a0dafca9e97c570c50f90f26e6b300b72dec216c131b7f12117613b1c3f3f" Namespace="calico-apiserver" Pod="calico-apiserver-7dfb7b6b59-sf2c7" WorkloadEndpoint="localhost-k8s-calico--apiserver--7dfb7b6b59--sf2c7-" Dec 13 02:37:41.301161 env[1255]: 2024-12-13 02:37:41.124 [INFO][3993] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="683a0dafca9e97c570c50f90f26e6b300b72dec216c131b7f12117613b1c3f3f" Namespace="calico-apiserver" Pod="calico-apiserver-7dfb7b6b59-sf2c7" WorkloadEndpoint="localhost-k8s-calico--apiserver--7dfb7b6b59--sf2c7-eth0" Dec 13 02:37:41.301161 env[1255]: 2024-12-13 02:37:41.182 [INFO][4017] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="683a0dafca9e97c570c50f90f26e6b300b72dec216c131b7f12117613b1c3f3f" HandleID="k8s-pod-network.683a0dafca9e97c570c50f90f26e6b300b72dec216c131b7f12117613b1c3f3f" Workload="localhost-k8s-calico--apiserver--7dfb7b6b59--sf2c7-eth0" Dec 13 02:37:41.301161 env[1255]: 2024-12-13 02:37:41.206 [INFO][4017] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="683a0dafca9e97c570c50f90f26e6b300b72dec216c131b7f12117613b1c3f3f" HandleID="k8s-pod-network.683a0dafca9e97c570c50f90f26e6b300b72dec216c131b7f12117613b1c3f3f" Workload="localhost-k8s-calico--apiserver--7dfb7b6b59--sf2c7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000290c90), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-7dfb7b6b59-sf2c7", "timestamp":"2024-12-13 02:37:41.182960054 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:37:41.301161 env[1255]: 2024-12-13 02:37:41.206 [INFO][4017] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:37:41.301161 env[1255]: 2024-12-13 02:37:41.206 [INFO][4017] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:37:41.301161 env[1255]: 2024-12-13 02:37:41.206 [INFO][4017] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 02:37:41.301161 env[1255]: 2024-12-13 02:37:41.208 [INFO][4017] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.683a0dafca9e97c570c50f90f26e6b300b72dec216c131b7f12117613b1c3f3f" host="localhost" Dec 13 02:37:41.301161 env[1255]: 2024-12-13 02:37:41.234 [INFO][4017] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 02:37:41.301161 env[1255]: 2024-12-13 02:37:41.248 [INFO][4017] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 02:37:41.301161 env[1255]: 2024-12-13 02:37:41.250 [INFO][4017] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 02:37:41.301161 env[1255]: 2024-12-13 02:37:41.251 [INFO][4017] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 02:37:41.301161 env[1255]: 2024-12-13 02:37:41.251 [INFO][4017] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.683a0dafca9e97c570c50f90f26e6b300b72dec216c131b7f12117613b1c3f3f" host="localhost" Dec 13 02:37:41.301161 env[1255]: 2024-12-13 02:37:41.253 [INFO][4017] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.683a0dafca9e97c570c50f90f26e6b300b72dec216c131b7f12117613b1c3f3f Dec 13 02:37:41.301161 env[1255]: 2024-12-13 02:37:41.260 [INFO][4017] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.683a0dafca9e97c570c50f90f26e6b300b72dec216c131b7f12117613b1c3f3f" host="localhost" Dec 13 02:37:41.301161 env[1255]: 2024-12-13 02:37:41.275 [INFO][4017] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.683a0dafca9e97c570c50f90f26e6b300b72dec216c131b7f12117613b1c3f3f" host="localhost" Dec 13 02:37:41.301161 env[1255]: 2024-12-13 02:37:41.275 [INFO][4017] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.683a0dafca9e97c570c50f90f26e6b300b72dec216c131b7f12117613b1c3f3f" host="localhost" Dec 13 02:37:41.301161 env[1255]: 2024-12-13 02:37:41.275 [INFO][4017] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:37:41.301161 env[1255]: 2024-12-13 02:37:41.275 [INFO][4017] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="683a0dafca9e97c570c50f90f26e6b300b72dec216c131b7f12117613b1c3f3f" HandleID="k8s-pod-network.683a0dafca9e97c570c50f90f26e6b300b72dec216c131b7f12117613b1c3f3f" Workload="localhost-k8s-calico--apiserver--7dfb7b6b59--sf2c7-eth0" Dec 13 02:37:41.301773 env[1255]: 2024-12-13 02:37:41.276 [INFO][3993] cni-plugin/k8s.go 386: Populated endpoint ContainerID="683a0dafca9e97c570c50f90f26e6b300b72dec216c131b7f12117613b1c3f3f" Namespace="calico-apiserver" Pod="calico-apiserver-7dfb7b6b59-sf2c7" WorkloadEndpoint="localhost-k8s-calico--apiserver--7dfb7b6b59--sf2c7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7dfb7b6b59--sf2c7-eth0", GenerateName:"calico-apiserver-7dfb7b6b59-", Namespace:"calico-apiserver", SelfLink:"", UID:"9a772036-63d2-4fbd-b90f-e00c4c528987", ResourceVersion:"778", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 37, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7dfb7b6b59", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-7dfb7b6b59-sf2c7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2d978ac264a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:37:41.301773 env[1255]: 2024-12-13 02:37:41.276 [INFO][3993] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="683a0dafca9e97c570c50f90f26e6b300b72dec216c131b7f12117613b1c3f3f" Namespace="calico-apiserver" Pod="calico-apiserver-7dfb7b6b59-sf2c7" WorkloadEndpoint="localhost-k8s-calico--apiserver--7dfb7b6b59--sf2c7-eth0" Dec 13 02:37:41.301773 env[1255]: 2024-12-13 02:37:41.276 [INFO][3993] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2d978ac264a ContainerID="683a0dafca9e97c570c50f90f26e6b300b72dec216c131b7f12117613b1c3f3f" Namespace="calico-apiserver" Pod="calico-apiserver-7dfb7b6b59-sf2c7" WorkloadEndpoint="localhost-k8s-calico--apiserver--7dfb7b6b59--sf2c7-eth0" Dec 13 02:37:41.301773 env[1255]: 2024-12-13 02:37:41.283 [INFO][3993] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="683a0dafca9e97c570c50f90f26e6b300b72dec216c131b7f12117613b1c3f3f" Namespace="calico-apiserver" Pod="calico-apiserver-7dfb7b6b59-sf2c7" WorkloadEndpoint="localhost-k8s-calico--apiserver--7dfb7b6b59--sf2c7-eth0" Dec 13 02:37:41.301773 env[1255]: 2024-12-13 02:37:41.283 [INFO][3993] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="683a0dafca9e97c570c50f90f26e6b300b72dec216c131b7f12117613b1c3f3f" Namespace="calico-apiserver" Pod="calico-apiserver-7dfb7b6b59-sf2c7" WorkloadEndpoint="localhost-k8s-calico--apiserver--7dfb7b6b59--sf2c7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7dfb7b6b59--sf2c7-eth0", GenerateName:"calico-apiserver-7dfb7b6b59-", Namespace:"calico-apiserver", SelfLink:"", UID:"9a772036-63d2-4fbd-b90f-e00c4c528987", ResourceVersion:"778", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 37, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7dfb7b6b59", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"683a0dafca9e97c570c50f90f26e6b300b72dec216c131b7f12117613b1c3f3f", Pod:"calico-apiserver-7dfb7b6b59-sf2c7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2d978ac264a", MAC:"02:a2:87:36:05:d2", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:37:41.301773 env[1255]: 2024-12-13 02:37:41.299 [INFO][3993] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="683a0dafca9e97c570c50f90f26e6b300b72dec216c131b7f12117613b1c3f3f" Namespace="calico-apiserver" Pod="calico-apiserver-7dfb7b6b59-sf2c7" WorkloadEndpoint="localhost-k8s-calico--apiserver--7dfb7b6b59--sf2c7-eth0" Dec 13 02:37:41.334982 env[1255]: time="2024-12-13T02:37:41.334867747Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:37:41.334982 env[1255]: time="2024-12-13T02:37:41.334893031Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:37:41.334982 env[1255]: time="2024-12-13T02:37:41.334900349Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:37:41.335110 env[1255]: time="2024-12-13T02:37:41.334990359Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/683a0dafca9e97c570c50f90f26e6b300b72dec216c131b7f12117613b1c3f3f pid=4057 runtime=io.containerd.runc.v2 Dec 13 02:37:41.343094 systemd[1]: Started cri-containerd-683a0dafca9e97c570c50f90f26e6b300b72dec216c131b7f12117613b1c3f3f.scope. Dec 13 02:37:41.350951 systemd-networkd[1060]: cali8973c407e0e: Link UP Dec 13 02:37:41.352473 systemd-networkd[1060]: cali8973c407e0e: Gained carrier Dec 13 02:37:41.353264 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8973c407e0e: link becomes ready Dec 13 02:37:41.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit: BPF prog-id=178 op=LOAD Dec 13 02:37:41.364000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[4066]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4057 pid=4066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:41.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638336130646166636139653937633537306335306639306632366536 Dec 13 02:37:41.364000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[4066]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4057 pid=4066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:41.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638336130646166636139653937633537306335306639306632366536 Dec 13 02:37:41.364000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit: BPF prog-id=179 op=LOAD Dec 13 02:37:41.364000 audit[4066]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000282e60 items=0 ppid=4057 pid=4066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:41.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638336130646166636139653937633537306335306639306632366536 Dec 13 02:37:41.364000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit: BPF prog-id=180 op=LOAD Dec 13 02:37:41.364000 audit[4066]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000282ea8 items=0 ppid=4057 pid=4066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:41.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638336130646166636139653937633537306335306639306632366536 Dec 13 02:37:41.364000 audit: BPF prog-id=180 op=UNLOAD Dec 13 02:37:41.364000 audit: BPF prog-id=179 op=UNLOAD Dec 13 02:37:41.364000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.364000 audit: BPF prog-id=181 op=LOAD Dec 13 02:37:41.364000 audit[4066]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002832b8 items=0 ppid=4057 pid=4066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:41.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638336130646166636139653937633537306335306639306632366536 Dec 13 02:37:41.366648 systemd-resolved[1194]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:37:41.397694 env[1255]: time="2024-12-13T02:37:41.397656348Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7dfb7b6b59-sf2c7,Uid:9a772036-63d2-4fbd-b90f-e00c4c528987,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"683a0dafca9e97c570c50f90f26e6b300b72dec216c131b7f12117613b1c3f3f\"" Dec 13 02:37:41.418814 env[1255]: 2024-12-13 02:37:41.189 [INFO][4011] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--7dfb7b6b59--pdtd9-eth0 calico-apiserver-7dfb7b6b59- calico-apiserver 5741a8e0-bb09-43e6-8da2-fba27a6e1250 779 0 2024-12-13 02:37:15 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7dfb7b6b59 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-7dfb7b6b59-pdtd9 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali8973c407e0e [] []}} ContainerID="1642aa9d17773ce42ebf33ba851c2efe59817265e1d1bd03e56a0ccdbca7e4cb" Namespace="calico-apiserver" Pod="calico-apiserver-7dfb7b6b59-pdtd9" WorkloadEndpoint="localhost-k8s-calico--apiserver--7dfb7b6b59--pdtd9-" Dec 13 02:37:41.418814 env[1255]: 2024-12-13 02:37:41.189 [INFO][4011] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="1642aa9d17773ce42ebf33ba851c2efe59817265e1d1bd03e56a0ccdbca7e4cb" Namespace="calico-apiserver" Pod="calico-apiserver-7dfb7b6b59-pdtd9" WorkloadEndpoint="localhost-k8s-calico--apiserver--7dfb7b6b59--pdtd9-eth0" Dec 13 02:37:41.418814 env[1255]: 2024-12-13 02:37:41.238 [INFO][4031] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1642aa9d17773ce42ebf33ba851c2efe59817265e1d1bd03e56a0ccdbca7e4cb" HandleID="k8s-pod-network.1642aa9d17773ce42ebf33ba851c2efe59817265e1d1bd03e56a0ccdbca7e4cb" Workload="localhost-k8s-calico--apiserver--7dfb7b6b59--pdtd9-eth0" Dec 13 02:37:41.418814 env[1255]: 2024-12-13 02:37:41.250 [INFO][4031] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1642aa9d17773ce42ebf33ba851c2efe59817265e1d1bd03e56a0ccdbca7e4cb" HandleID="k8s-pod-network.1642aa9d17773ce42ebf33ba851c2efe59817265e1d1bd03e56a0ccdbca7e4cb" Workload="localhost-k8s-calico--apiserver--7dfb7b6b59--pdtd9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000319370), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-7dfb7b6b59-pdtd9", "timestamp":"2024-12-13 02:37:41.238677994 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:37:41.418814 env[1255]: 2024-12-13 02:37:41.250 [INFO][4031] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:37:41.418814 env[1255]: 2024-12-13 02:37:41.275 [INFO][4031] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:37:41.418814 env[1255]: 2024-12-13 02:37:41.275 [INFO][4031] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 02:37:41.418814 env[1255]: 2024-12-13 02:37:41.290 [INFO][4031] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1642aa9d17773ce42ebf33ba851c2efe59817265e1d1bd03e56a0ccdbca7e4cb" host="localhost" Dec 13 02:37:41.418814 env[1255]: 2024-12-13 02:37:41.302 [INFO][4031] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 02:37:41.418814 env[1255]: 2024-12-13 02:37:41.307 [INFO][4031] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 02:37:41.418814 env[1255]: 2024-12-13 02:37:41.309 [INFO][4031] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 02:37:41.418814 env[1255]: 2024-12-13 02:37:41.310 [INFO][4031] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 02:37:41.418814 env[1255]: 2024-12-13 02:37:41.310 [INFO][4031] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.1642aa9d17773ce42ebf33ba851c2efe59817265e1d1bd03e56a0ccdbca7e4cb" host="localhost" Dec 13 02:37:41.418814 env[1255]: 2024-12-13 02:37:41.311 [INFO][4031] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.1642aa9d17773ce42ebf33ba851c2efe59817265e1d1bd03e56a0ccdbca7e4cb Dec 13 02:37:41.418814 env[1255]: 2024-12-13 02:37:41.318 [INFO][4031] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.1642aa9d17773ce42ebf33ba851c2efe59817265e1d1bd03e56a0ccdbca7e4cb" host="localhost" Dec 13 02:37:41.418814 env[1255]: 2024-12-13 02:37:41.345 [INFO][4031] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.1642aa9d17773ce42ebf33ba851c2efe59817265e1d1bd03e56a0ccdbca7e4cb" host="localhost" Dec 13 02:37:41.418814 env[1255]: 2024-12-13 02:37:41.345 [INFO][4031] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.1642aa9d17773ce42ebf33ba851c2efe59817265e1d1bd03e56a0ccdbca7e4cb" host="localhost" Dec 13 02:37:41.418814 env[1255]: 2024-12-13 02:37:41.345 [INFO][4031] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:37:41.418814 env[1255]: 2024-12-13 02:37:41.345 [INFO][4031] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="1642aa9d17773ce42ebf33ba851c2efe59817265e1d1bd03e56a0ccdbca7e4cb" HandleID="k8s-pod-network.1642aa9d17773ce42ebf33ba851c2efe59817265e1d1bd03e56a0ccdbca7e4cb" Workload="localhost-k8s-calico--apiserver--7dfb7b6b59--pdtd9-eth0" Dec 13 02:37:41.420148 env[1255]: 2024-12-13 02:37:41.348 [INFO][4011] cni-plugin/k8s.go 386: Populated endpoint ContainerID="1642aa9d17773ce42ebf33ba851c2efe59817265e1d1bd03e56a0ccdbca7e4cb" Namespace="calico-apiserver" Pod="calico-apiserver-7dfb7b6b59-pdtd9" WorkloadEndpoint="localhost-k8s-calico--apiserver--7dfb7b6b59--pdtd9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7dfb7b6b59--pdtd9-eth0", GenerateName:"calico-apiserver-7dfb7b6b59-", Namespace:"calico-apiserver", SelfLink:"", UID:"5741a8e0-bb09-43e6-8da2-fba27a6e1250", ResourceVersion:"779", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 37, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7dfb7b6b59", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-7dfb7b6b59-pdtd9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8973c407e0e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:37:41.420148 env[1255]: 2024-12-13 02:37:41.348 [INFO][4011] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="1642aa9d17773ce42ebf33ba851c2efe59817265e1d1bd03e56a0ccdbca7e4cb" Namespace="calico-apiserver" Pod="calico-apiserver-7dfb7b6b59-pdtd9" WorkloadEndpoint="localhost-k8s-calico--apiserver--7dfb7b6b59--pdtd9-eth0" Dec 13 02:37:41.420148 env[1255]: 2024-12-13 02:37:41.348 [INFO][4011] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8973c407e0e ContainerID="1642aa9d17773ce42ebf33ba851c2efe59817265e1d1bd03e56a0ccdbca7e4cb" Namespace="calico-apiserver" Pod="calico-apiserver-7dfb7b6b59-pdtd9" WorkloadEndpoint="localhost-k8s-calico--apiserver--7dfb7b6b59--pdtd9-eth0" Dec 13 02:37:41.420148 env[1255]: 2024-12-13 02:37:41.352 [INFO][4011] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1642aa9d17773ce42ebf33ba851c2efe59817265e1d1bd03e56a0ccdbca7e4cb" Namespace="calico-apiserver" Pod="calico-apiserver-7dfb7b6b59-pdtd9" WorkloadEndpoint="localhost-k8s-calico--apiserver--7dfb7b6b59--pdtd9-eth0" Dec 13 02:37:41.420148 env[1255]: 2024-12-13 02:37:41.352 [INFO][4011] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="1642aa9d17773ce42ebf33ba851c2efe59817265e1d1bd03e56a0ccdbca7e4cb" Namespace="calico-apiserver" Pod="calico-apiserver-7dfb7b6b59-pdtd9" WorkloadEndpoint="localhost-k8s-calico--apiserver--7dfb7b6b59--pdtd9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7dfb7b6b59--pdtd9-eth0", GenerateName:"calico-apiserver-7dfb7b6b59-", Namespace:"calico-apiserver", SelfLink:"", UID:"5741a8e0-bb09-43e6-8da2-fba27a6e1250", ResourceVersion:"779", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 37, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7dfb7b6b59", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1642aa9d17773ce42ebf33ba851c2efe59817265e1d1bd03e56a0ccdbca7e4cb", Pod:"calico-apiserver-7dfb7b6b59-pdtd9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8973c407e0e", MAC:"d2:f6:d1:e6:e8:e8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:37:41.420148 env[1255]: 2024-12-13 02:37:41.414 [INFO][4011] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="1642aa9d17773ce42ebf33ba851c2efe59817265e1d1bd03e56a0ccdbca7e4cb" Namespace="calico-apiserver" Pod="calico-apiserver-7dfb7b6b59-pdtd9" WorkloadEndpoint="localhost-k8s-calico--apiserver--7dfb7b6b59--pdtd9-eth0" Dec 13 02:37:41.456536 env[1255]: time="2024-12-13T02:37:41.456358627Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:37:41.456536 env[1255]: time="2024-12-13T02:37:41.456393291Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:37:41.456536 env[1255]: time="2024-12-13T02:37:41.456405623Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:37:41.461239 env[1255]: time="2024-12-13T02:37:41.456517490Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1642aa9d17773ce42ebf33ba851c2efe59817265e1d1bd03e56a0ccdbca7e4cb pid=4109 runtime=io.containerd.runc.v2 Dec 13 02:37:41.465026 env[1255]: time="2024-12-13T02:37:41.465007368Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:41.469539 systemd[1]: Started cri-containerd-1642aa9d17773ce42ebf33ba851c2efe59817265e1d1bd03e56a0ccdbca7e4cb.scope. Dec 13 02:37:41.473243 systemd[1]: run-containerd-runc-k8s.io-1642aa9d17773ce42ebf33ba851c2efe59817265e1d1bd03e56a0ccdbca7e4cb-runc.YUcC3s.mount: Deactivated successfully. Dec 13 02:37:41.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.483000 audit: BPF prog-id=182 op=LOAD Dec 13 02:37:41.483000 audit[4117]: AVC avc: denied { bpf } for pid=4117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.483000 audit[4117]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4109 pid=4117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:41.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136343261613964313737373363653432656266333362613835316332 Dec 13 02:37:41.484000 audit[4117]: AVC avc: denied { perfmon } for pid=4117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.484000 audit[4117]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4109 pid=4117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:41.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136343261613964313737373363653432656266333362613835316332 Dec 13 02:37:41.484000 audit[4117]: AVC avc: denied { bpf } for pid=4117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.484000 audit[4117]: AVC avc: denied { bpf } for pid=4117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.484000 audit[4117]: AVC avc: denied { bpf } for pid=4117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.484000 audit[4117]: AVC avc: denied { perfmon } for pid=4117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.484000 audit[4117]: AVC avc: denied { perfmon } for pid=4117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.484000 audit[4117]: AVC avc: denied { perfmon } for pid=4117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.484000 audit[4117]: AVC avc: denied { perfmon } for pid=4117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.484000 audit[4117]: AVC avc: denied { perfmon } for pid=4117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.484000 audit[4117]: AVC avc: denied { bpf } for pid=4117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.484000 audit[4117]: AVC avc: denied { bpf } for pid=4117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.484000 audit: BPF prog-id=183 op=LOAD Dec 13 02:37:41.484000 audit[4117]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000099460 items=0 ppid=4109 pid=4117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:41.486043 env[1255]: time="2024-12-13T02:37:41.486019863Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:41.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136343261613964313737373363653432656266333362613835316332 Dec 13 02:37:41.485000 audit[4117]: AVC avc: denied { bpf } for pid=4117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.485000 audit[4117]: AVC avc: denied { bpf } for pid=4117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.485000 audit[4117]: AVC avc: denied { perfmon } for pid=4117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.485000 audit[4117]: AVC avc: denied { perfmon } for pid=4117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.485000 audit[4117]: AVC avc: denied { perfmon } for pid=4117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.485000 audit[4117]: AVC avc: denied { perfmon } for pid=4117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.485000 audit[4117]: AVC avc: denied { perfmon } for pid=4117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.485000 audit[4117]: AVC avc: denied { bpf } for pid=4117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.485000 audit[4117]: AVC avc: denied { bpf } for pid=4117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.485000 audit: BPF prog-id=184 op=LOAD Dec 13 02:37:41.485000 audit[4117]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000994a8 items=0 ppid=4109 pid=4117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:41.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136343261613964313737373363653432656266333362613835316332 Dec 13 02:37:41.485000 audit: BPF prog-id=184 op=UNLOAD Dec 13 02:37:41.485000 audit: BPF prog-id=183 op=UNLOAD Dec 13 02:37:41.485000 audit[4117]: AVC avc: denied { bpf } for pid=4117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.485000 audit[4117]: AVC avc: denied { bpf } for pid=4117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.485000 audit[4117]: AVC avc: denied { bpf } for pid=4117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.485000 audit[4117]: AVC avc: denied { perfmon } for pid=4117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.485000 audit[4117]: AVC avc: denied { perfmon } for pid=4117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.485000 audit[4117]: AVC avc: denied { perfmon } for pid=4117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.485000 audit[4117]: AVC avc: denied { perfmon } for pid=4117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.485000 audit[4117]: AVC avc: denied { perfmon } for pid=4117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.485000 audit[4117]: AVC avc: denied { bpf } for pid=4117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.485000 audit[4117]: AVC avc: denied { bpf } for pid=4117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.485000 audit: BPF prog-id=185 op=LOAD Dec 13 02:37:41.485000 audit[4117]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000998b8 items=0 ppid=4109 pid=4117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:41.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136343261613964313737373363653432656266333362613835316332 Dec 13 02:37:41.486889 systemd-resolved[1194]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:37:41.498635 env[1255]: time="2024-12-13T02:37:41.493710939Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:41.502119 env[1255]: time="2024-12-13T02:37:41.502104236Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:41.502342 env[1255]: time="2024-12-13T02:37:41.502327809Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 02:37:41.503920 env[1255]: time="2024-12-13T02:37:41.503176006Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 02:37:41.510000 audit[4141]: NETFILTER_CFG table=filter:107 family=2 entries=52 op=nft_register_chain pid=4141 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:37:41.510000 audit[4141]: SYSCALL arch=c000003e syscall=46 success=yes exit=27056 a0=3 a1=7ffe6bd4cf00 a2=0 a3=7ffe6bd4ceec items=0 ppid=3494 pid=4141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:41.510000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:37:41.514640 env[1255]: time="2024-12-13T02:37:41.514615913Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7dfb7b6b59-pdtd9,Uid:5741a8e0-bb09-43e6-8da2-fba27a6e1250,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"1642aa9d17773ce42ebf33ba851c2efe59817265e1d1bd03e56a0ccdbca7e4cb\"" Dec 13 02:37:41.520551 env[1255]: time="2024-12-13T02:37:41.518815151Z" level=info msg="CreateContainer within sandbox \"482b132e76c8ade3345e04e6118cedf99acc240aced9066243a3b42b3a19e952\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 02:37:41.522000 audit[4146]: NETFILTER_CFG table=filter:108 family=2 entries=46 op=nft_register_chain pid=4146 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:37:41.522000 audit[4146]: SYSCALL arch=c000003e syscall=46 success=yes exit=23892 a0=3 a1=7ffda5089d60 a2=0 a3=7ffda5089d4c items=0 ppid=3494 pid=4146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:41.522000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:37:41.583851 env[1255]: time="2024-12-13T02:37:41.583812078Z" level=info msg="CreateContainer within sandbox \"482b132e76c8ade3345e04e6118cedf99acc240aced9066243a3b42b3a19e952\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"37a16b2198be5a34d3d46b264282d661ae3074f4012d0ed35c6219c3f7b84c7f\"" Dec 13 02:37:41.584901 env[1255]: time="2024-12-13T02:37:41.584265473Z" level=info msg="StartContainer for \"37a16b2198be5a34d3d46b264282d661ae3074f4012d0ed35c6219c3f7b84c7f\"" Dec 13 02:37:41.595269 systemd[1]: Started cri-containerd-37a16b2198be5a34d3d46b264282d661ae3074f4012d0ed35c6219c3f7b84c7f.scope. Dec 13 02:37:41.624000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.624000 audit[4155]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f133ef54208 items=0 ppid=3674 pid=4155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:41.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337613136623231393862653561333464336434366232363432383264 Dec 13 02:37:41.624000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.624000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.624000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.624000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.624000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.624000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.624000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.624000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.624000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.624000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.624000 audit: BPF prog-id=186 op=LOAD Dec 13 02:37:41.624000 audit[4155]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0001ebfd8 items=0 ppid=3674 pid=4155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:41.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337613136623231393862653561333464336434366232363432383264 Dec 13 02:37:41.624000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.624000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.624000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.624000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.624000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.624000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.624000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.624000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.624000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.624000 audit: BPF prog-id=187 op=LOAD Dec 13 02:37:41.624000 audit[4155]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000350028 items=0 ppid=3674 pid=4155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:41.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337613136623231393862653561333464336434366232363432383264 Dec 13 02:37:41.624000 audit: BPF prog-id=187 op=UNLOAD Dec 13 02:37:41.624000 audit: BPF prog-id=186 op=UNLOAD Dec 13 02:37:41.624000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.624000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.624000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.624000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.624000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.624000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.624000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.624000 audit[4155]: AVC avc: denied { perfmon } for pid=4155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.624000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.624000 audit[4155]: AVC avc: denied { bpf } for pid=4155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:41.624000 audit: BPF prog-id=188 op=LOAD Dec 13 02:37:41.624000 audit[4155]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0003500b8 items=0 ppid=3674 pid=4155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:41.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337613136623231393862653561333464336434366232363432383264 Dec 13 02:37:41.656354 systemd-networkd[1060]: calif1360ec88a9: Gained IPv6LL Dec 13 02:37:41.683639 env[1255]: time="2024-12-13T02:37:41.683603053Z" level=info msg="StartContainer for \"37a16b2198be5a34d3d46b264282d661ae3074f4012d0ed35c6219c3f7b84c7f\" returns successfully" Dec 13 02:37:41.847141 env[1255]: time="2024-12-13T02:37:41.847049227Z" level=info msg="StopPodSandbox for \"ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae\"" Dec 13 02:37:42.042000 audit[4202]: NETFILTER_CFG table=filter:109 family=2 entries=13 op=nft_register_rule pid=4202 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:37:42.042000 audit[4202]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff17185520 a2=0 a3=7fff1718550c items=0 ppid=2327 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:42.042000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:37:42.048000 audit[4202]: NETFILTER_CFG table=nat:110 family=2 entries=35 op=nft_register_chain pid=4202 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:37:42.048000 audit[4202]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fff17185520 a2=0 a3=7fff1718550c items=0 ppid=2327 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:42.048000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:37:42.075396 env[1255]: 2024-12-13 02:37:42.046 [INFO][4195] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" Dec 13 02:37:42.075396 env[1255]: 2024-12-13 02:37:42.046 [INFO][4195] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" iface="eth0" netns="/var/run/netns/cni-e95d62de-3d91-a862-4ad2-269fdcfd92a9" Dec 13 02:37:42.075396 env[1255]: 2024-12-13 02:37:42.046 [INFO][4195] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" iface="eth0" netns="/var/run/netns/cni-e95d62de-3d91-a862-4ad2-269fdcfd92a9" Dec 13 02:37:42.075396 env[1255]: 2024-12-13 02:37:42.047 [INFO][4195] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" iface="eth0" netns="/var/run/netns/cni-e95d62de-3d91-a862-4ad2-269fdcfd92a9" Dec 13 02:37:42.075396 env[1255]: 2024-12-13 02:37:42.047 [INFO][4195] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" Dec 13 02:37:42.075396 env[1255]: 2024-12-13 02:37:42.047 [INFO][4195] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" Dec 13 02:37:42.075396 env[1255]: 2024-12-13 02:37:42.068 [INFO][4203] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" HandleID="k8s-pod-network.ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" Workload="localhost-k8s-calico--kube--controllers--6bb7fd499--v5d2m-eth0" Dec 13 02:37:42.075396 env[1255]: 2024-12-13 02:37:42.068 [INFO][4203] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:37:42.075396 env[1255]: 2024-12-13 02:37:42.068 [INFO][4203] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:37:42.075396 env[1255]: 2024-12-13 02:37:42.072 [WARNING][4203] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" HandleID="k8s-pod-network.ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" Workload="localhost-k8s-calico--kube--controllers--6bb7fd499--v5d2m-eth0" Dec 13 02:37:42.075396 env[1255]: 2024-12-13 02:37:42.072 [INFO][4203] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" HandleID="k8s-pod-network.ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" Workload="localhost-k8s-calico--kube--controllers--6bb7fd499--v5d2m-eth0" Dec 13 02:37:42.075396 env[1255]: 2024-12-13 02:37:42.073 [INFO][4203] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:37:42.075396 env[1255]: 2024-12-13 02:37:42.074 [INFO][4195] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" Dec 13 02:37:42.075973 env[1255]: time="2024-12-13T02:37:42.075953717Z" level=info msg="TearDown network for sandbox \"ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae\" successfully" Dec 13 02:37:42.076027 env[1255]: time="2024-12-13T02:37:42.076013137Z" level=info msg="StopPodSandbox for \"ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae\" returns successfully" Dec 13 02:37:42.076458 env[1255]: time="2024-12-13T02:37:42.076444978Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6bb7fd499-v5d2m,Uid:357f714f-1c9f-4765-8e1c-8659524fb9c0,Namespace:calico-system,Attempt:1,}" Dec 13 02:37:42.337751 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:37:42.337813 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia7b14fe2367: link becomes ready Dec 13 02:37:42.338380 systemd-networkd[1060]: calia7b14fe2367: Link UP Dec 13 02:37:42.338477 systemd-networkd[1060]: calia7b14fe2367: Gained carrier Dec 13 02:37:42.356770 env[1255]: 2024-12-13 02:37:42.281 [INFO][4210] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--6bb7fd499--v5d2m-eth0 calico-kube-controllers-6bb7fd499- calico-system 357f714f-1c9f-4765-8e1c-8659524fb9c0 811 0 2024-12-13 02:37:15 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:6bb7fd499 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-6bb7fd499-v5d2m eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calia7b14fe2367 [] []}} ContainerID="ecd1738a518b0e5c845ca3caae46a10b8a40a7ea12219083b4aa25a9bdf18c1b" Namespace="calico-system" Pod="calico-kube-controllers-6bb7fd499-v5d2m" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6bb7fd499--v5d2m-" Dec 13 02:37:42.356770 env[1255]: 2024-12-13 02:37:42.281 [INFO][4210] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ecd1738a518b0e5c845ca3caae46a10b8a40a7ea12219083b4aa25a9bdf18c1b" Namespace="calico-system" Pod="calico-kube-controllers-6bb7fd499-v5d2m" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6bb7fd499--v5d2m-eth0" Dec 13 02:37:42.356770 env[1255]: 2024-12-13 02:37:42.297 [INFO][4222] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ecd1738a518b0e5c845ca3caae46a10b8a40a7ea12219083b4aa25a9bdf18c1b" HandleID="k8s-pod-network.ecd1738a518b0e5c845ca3caae46a10b8a40a7ea12219083b4aa25a9bdf18c1b" Workload="localhost-k8s-calico--kube--controllers--6bb7fd499--v5d2m-eth0" Dec 13 02:37:42.356770 env[1255]: 2024-12-13 02:37:42.303 [INFO][4222] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ecd1738a518b0e5c845ca3caae46a10b8a40a7ea12219083b4aa25a9bdf18c1b" HandleID="k8s-pod-network.ecd1738a518b0e5c845ca3caae46a10b8a40a7ea12219083b4aa25a9bdf18c1b" Workload="localhost-k8s-calico--kube--controllers--6bb7fd499--v5d2m-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318fd0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-6bb7fd499-v5d2m", "timestamp":"2024-12-13 02:37:42.297280475 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:37:42.356770 env[1255]: 2024-12-13 02:37:42.303 [INFO][4222] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:37:42.356770 env[1255]: 2024-12-13 02:37:42.303 [INFO][4222] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:37:42.356770 env[1255]: 2024-12-13 02:37:42.303 [INFO][4222] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 02:37:42.356770 env[1255]: 2024-12-13 02:37:42.304 [INFO][4222] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ecd1738a518b0e5c845ca3caae46a10b8a40a7ea12219083b4aa25a9bdf18c1b" host="localhost" Dec 13 02:37:42.356770 env[1255]: 2024-12-13 02:37:42.306 [INFO][4222] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 02:37:42.356770 env[1255]: 2024-12-13 02:37:42.307 [INFO][4222] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 02:37:42.356770 env[1255]: 2024-12-13 02:37:42.308 [INFO][4222] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 02:37:42.356770 env[1255]: 2024-12-13 02:37:42.309 [INFO][4222] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 02:37:42.356770 env[1255]: 2024-12-13 02:37:42.309 [INFO][4222] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.ecd1738a518b0e5c845ca3caae46a10b8a40a7ea12219083b4aa25a9bdf18c1b" host="localhost" Dec 13 02:37:42.356770 env[1255]: 2024-12-13 02:37:42.310 [INFO][4222] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ecd1738a518b0e5c845ca3caae46a10b8a40a7ea12219083b4aa25a9bdf18c1b Dec 13 02:37:42.356770 env[1255]: 2024-12-13 02:37:42.318 [INFO][4222] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.ecd1738a518b0e5c845ca3caae46a10b8a40a7ea12219083b4aa25a9bdf18c1b" host="localhost" Dec 13 02:37:42.356770 env[1255]: 2024-12-13 02:37:42.333 [INFO][4222] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.ecd1738a518b0e5c845ca3caae46a10b8a40a7ea12219083b4aa25a9bdf18c1b" host="localhost" Dec 13 02:37:42.356770 env[1255]: 2024-12-13 02:37:42.333 [INFO][4222] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.ecd1738a518b0e5c845ca3caae46a10b8a40a7ea12219083b4aa25a9bdf18c1b" host="localhost" Dec 13 02:37:42.356770 env[1255]: 2024-12-13 02:37:42.333 [INFO][4222] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:37:42.356770 env[1255]: 2024-12-13 02:37:42.333 [INFO][4222] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="ecd1738a518b0e5c845ca3caae46a10b8a40a7ea12219083b4aa25a9bdf18c1b" HandleID="k8s-pod-network.ecd1738a518b0e5c845ca3caae46a10b8a40a7ea12219083b4aa25a9bdf18c1b" Workload="localhost-k8s-calico--kube--controllers--6bb7fd499--v5d2m-eth0" Dec 13 02:37:42.363174 env[1255]: 2024-12-13 02:37:42.334 [INFO][4210] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ecd1738a518b0e5c845ca3caae46a10b8a40a7ea12219083b4aa25a9bdf18c1b" Namespace="calico-system" Pod="calico-kube-controllers-6bb7fd499-v5d2m" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6bb7fd499--v5d2m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6bb7fd499--v5d2m-eth0", GenerateName:"calico-kube-controllers-6bb7fd499-", Namespace:"calico-system", SelfLink:"", UID:"357f714f-1c9f-4765-8e1c-8659524fb9c0", ResourceVersion:"811", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 37, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6bb7fd499", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-6bb7fd499-v5d2m", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia7b14fe2367", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:37:42.363174 env[1255]: 2024-12-13 02:37:42.335 [INFO][4210] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="ecd1738a518b0e5c845ca3caae46a10b8a40a7ea12219083b4aa25a9bdf18c1b" Namespace="calico-system" Pod="calico-kube-controllers-6bb7fd499-v5d2m" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6bb7fd499--v5d2m-eth0" Dec 13 02:37:42.363174 env[1255]: 2024-12-13 02:37:42.335 [INFO][4210] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia7b14fe2367 ContainerID="ecd1738a518b0e5c845ca3caae46a10b8a40a7ea12219083b4aa25a9bdf18c1b" Namespace="calico-system" Pod="calico-kube-controllers-6bb7fd499-v5d2m" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6bb7fd499--v5d2m-eth0" Dec 13 02:37:42.363174 env[1255]: 2024-12-13 02:37:42.338 [INFO][4210] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ecd1738a518b0e5c845ca3caae46a10b8a40a7ea12219083b4aa25a9bdf18c1b" Namespace="calico-system" Pod="calico-kube-controllers-6bb7fd499-v5d2m" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6bb7fd499--v5d2m-eth0" Dec 13 02:37:42.363174 env[1255]: 2024-12-13 02:37:42.338 [INFO][4210] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ecd1738a518b0e5c845ca3caae46a10b8a40a7ea12219083b4aa25a9bdf18c1b" Namespace="calico-system" Pod="calico-kube-controllers-6bb7fd499-v5d2m" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6bb7fd499--v5d2m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6bb7fd499--v5d2m-eth0", GenerateName:"calico-kube-controllers-6bb7fd499-", Namespace:"calico-system", SelfLink:"", UID:"357f714f-1c9f-4765-8e1c-8659524fb9c0", ResourceVersion:"811", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 37, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6bb7fd499", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ecd1738a518b0e5c845ca3caae46a10b8a40a7ea12219083b4aa25a9bdf18c1b", Pod:"calico-kube-controllers-6bb7fd499-v5d2m", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia7b14fe2367", MAC:"62:c8:35:32:ff:5f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:37:42.363174 env[1255]: 2024-12-13 02:37:42.355 [INFO][4210] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ecd1738a518b0e5c845ca3caae46a10b8a40a7ea12219083b4aa25a9bdf18c1b" Namespace="calico-system" Pod="calico-kube-controllers-6bb7fd499-v5d2m" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6bb7fd499--v5d2m-eth0" Dec 13 02:37:42.369000 audit[4241]: NETFILTER_CFG table=filter:111 family=2 entries=50 op=nft_register_chain pid=4241 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:37:42.369000 audit[4241]: SYSCALL arch=c000003e syscall=46 success=yes exit=23392 a0=3 a1=7fffb9ad6e30 a2=0 a3=7fffb9ad6e1c items=0 ppid=3494 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:42.369000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:37:42.407732 env[1255]: time="2024-12-13T02:37:42.407683949Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:37:42.407857 env[1255]: time="2024-12-13T02:37:42.407826080Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:37:42.407857 env[1255]: time="2024-12-13T02:37:42.407840339Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:37:42.408146 env[1255]: time="2024-12-13T02:37:42.408115263Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ecd1738a518b0e5c845ca3caae46a10b8a40a7ea12219083b4aa25a9bdf18c1b pid=4250 runtime=io.containerd.runc.v2 Dec 13 02:37:42.415411 systemd[1]: Started cri-containerd-ecd1738a518b0e5c845ca3caae46a10b8a40a7ea12219083b4aa25a9bdf18c1b.scope. Dec 13 02:37:42.420503 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1315891999.mount: Deactivated successfully. Dec 13 02:37:42.420563 systemd[1]: run-netns-cni\x2de95d62de\x2d3d91\x2da862\x2d4ad2\x2d269fdcfd92a9.mount: Deactivated successfully. Dec 13 02:37:42.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.428000 audit: BPF prog-id=189 op=LOAD Dec 13 02:37:42.429000 audit[4259]: AVC avc: denied { bpf } for pid=4259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.429000 audit[4259]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4250 pid=4259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:42.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563643137333861353138623065356338343563613363616165343661 Dec 13 02:37:42.429000 audit[4259]: AVC avc: denied { perfmon } for pid=4259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.429000 audit[4259]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4250 pid=4259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:42.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563643137333861353138623065356338343563613363616165343661 Dec 13 02:37:42.429000 audit[4259]: AVC avc: denied { bpf } for pid=4259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.429000 audit[4259]: AVC avc: denied { bpf } for pid=4259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.429000 audit[4259]: AVC avc: denied { bpf } for pid=4259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.429000 audit[4259]: AVC avc: denied { perfmon } for pid=4259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.429000 audit[4259]: AVC avc: denied { perfmon } for pid=4259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.429000 audit[4259]: AVC avc: denied { perfmon } for pid=4259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.429000 audit[4259]: AVC avc: denied { perfmon } for pid=4259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.429000 audit[4259]: AVC avc: denied { perfmon } for pid=4259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.429000 audit[4259]: AVC avc: denied { bpf } for pid=4259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.429000 audit[4259]: AVC avc: denied { bpf } for pid=4259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.429000 audit: BPF prog-id=190 op=LOAD Dec 13 02:37:42.429000 audit[4259]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000098370 items=0 ppid=4250 pid=4259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:42.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563643137333861353138623065356338343563613363616165343661 Dec 13 02:37:42.429000 audit[4259]: AVC avc: denied { bpf } for pid=4259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.429000 audit[4259]: AVC avc: denied { bpf } for pid=4259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.429000 audit[4259]: AVC avc: denied { perfmon } for pid=4259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.429000 audit[4259]: AVC avc: denied { perfmon } for pid=4259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.429000 audit[4259]: AVC avc: denied { perfmon } for pid=4259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.429000 audit[4259]: AVC avc: denied { perfmon } for pid=4259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.429000 audit[4259]: AVC avc: denied { perfmon } for pid=4259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.429000 audit[4259]: AVC avc: denied { bpf } for pid=4259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.429000 audit[4259]: AVC avc: denied { bpf } for pid=4259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.429000 audit: BPF prog-id=191 op=LOAD Dec 13 02:37:42.429000 audit[4259]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000983b8 items=0 ppid=4250 pid=4259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:42.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563643137333861353138623065356338343563613363616165343661 Dec 13 02:37:42.429000 audit: BPF prog-id=191 op=UNLOAD Dec 13 02:37:42.429000 audit: BPF prog-id=190 op=UNLOAD Dec 13 02:37:42.429000 audit[4259]: AVC avc: denied { bpf } for pid=4259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.429000 audit[4259]: AVC avc: denied { bpf } for pid=4259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.429000 audit[4259]: AVC avc: denied { bpf } for pid=4259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.429000 audit[4259]: AVC avc: denied { perfmon } for pid=4259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.429000 audit[4259]: AVC avc: denied { perfmon } for pid=4259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.429000 audit[4259]: AVC avc: denied { perfmon } for pid=4259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.429000 audit[4259]: AVC avc: denied { perfmon } for pid=4259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.429000 audit[4259]: AVC avc: denied { perfmon } for pid=4259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.429000 audit[4259]: AVC avc: denied { bpf } for pid=4259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.429000 audit[4259]: AVC avc: denied { bpf } for pid=4259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:42.429000 audit: BPF prog-id=192 op=LOAD Dec 13 02:37:42.429000 audit[4259]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000987c8 items=0 ppid=4250 pid=4259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:42.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563643137333861353138623065356338343563613363616165343661 Dec 13 02:37:42.431139 systemd-resolved[1194]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:37:42.457982 env[1255]: time="2024-12-13T02:37:42.456931767Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6bb7fd499-v5d2m,Uid:357f714f-1c9f-4765-8e1c-8659524fb9c0,Namespace:calico-system,Attempt:1,} returns sandbox id \"ecd1738a518b0e5c845ca3caae46a10b8a40a7ea12219083b4aa25a9bdf18c1b\"" Dec 13 02:37:42.616315 systemd-networkd[1060]: cali8973c407e0e: Gained IPv6LL Dec 13 02:37:43.000313 systemd-networkd[1060]: cali2d978ac264a: Gained IPv6LL Dec 13 02:37:43.067000 audit[4285]: NETFILTER_CFG table=filter:112 family=2 entries=10 op=nft_register_rule pid=4285 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:37:43.067000 audit[4285]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffdb06906b0 a2=0 a3=7ffdb069069c items=0 ppid=2327 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:43.067000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:37:43.082000 audit[4285]: NETFILTER_CFG table=nat:113 family=2 entries=56 op=nft_register_chain pid=4285 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:37:43.082000 audit[4285]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffdb06906b0 a2=0 a3=7ffdb069069c items=0 ppid=2327 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:43.082000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:37:44.344312 systemd-networkd[1060]: calia7b14fe2367: Gained IPv6LL Dec 13 02:37:45.044490 env[1255]: time="2024-12-13T02:37:45.044460414Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:45.045959 env[1255]: time="2024-12-13T02:37:45.045935392Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:45.047229 env[1255]: time="2024-12-13T02:37:45.047212297Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:45.048514 env[1255]: time="2024-12-13T02:37:45.048496865Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:45.048864 env[1255]: time="2024-12-13T02:37:45.048841621Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 02:37:45.050172 env[1255]: time="2024-12-13T02:37:45.050153867Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 02:37:45.052017 env[1255]: time="2024-12-13T02:37:45.051930205Z" level=info msg="CreateContainer within sandbox \"683a0dafca9e97c570c50f90f26e6b300b72dec216c131b7f12117613b1c3f3f\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 02:37:45.063538 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1290435080.mount: Deactivated successfully. Dec 13 02:37:45.069365 env[1255]: time="2024-12-13T02:37:45.069332629Z" level=info msg="CreateContainer within sandbox \"683a0dafca9e97c570c50f90f26e6b300b72dec216c131b7f12117613b1c3f3f\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"848b5cb3e8a443648522dd9c20cc2b0751b07fdd5f4271e24b377e063fff1768\"" Dec 13 02:37:45.070611 env[1255]: time="2024-12-13T02:37:45.069845091Z" level=info msg="StartContainer for \"848b5cb3e8a443648522dd9c20cc2b0751b07fdd5f4271e24b377e063fff1768\"" Dec 13 02:37:45.084758 systemd[1]: Started cri-containerd-848b5cb3e8a443648522dd9c20cc2b0751b07fdd5f4271e24b377e063fff1768.scope. Dec 13 02:37:45.108152 kernel: kauditd_printk_skb: 1018 callbacks suppressed Dec 13 02:37:45.108230 kernel: audit: type=1400 audit(1734057465.103:1244): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.119114 kernel: audit: type=1400 audit(1734057465.103:1245): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.119145 kernel: audit: type=1400 audit(1734057465.103:1246): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.119166 kernel: audit: type=1400 audit(1734057465.103:1247): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.119180 kernel: audit: type=1400 audit(1734057465.103:1248): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.124448 kernel: audit: type=1400 audit(1734057465.103:1249): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.124485 kernel: audit: type=1400 audit(1734057465.103:1250): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.127614 kernel: audit: type=1400 audit(1734057465.103:1251): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.130196 kernel: audit: type=1400 audit(1734057465.103:1252): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.103000 audit: BPF prog-id=193 op=LOAD Dec 13 02:37:45.109000 audit[4301]: AVC avc: denied { bpf } for pid=4301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.109000 audit[4301]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4057 pid=4301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:45.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834386235636233653861343433363438353232646439633230636332 Dec 13 02:37:45.109000 audit[4301]: AVC avc: denied { perfmon } for pid=4301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.109000 audit[4301]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4057 pid=4301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:45.137336 kernel: audit: type=1400 audit(1734057465.103:1253): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834386235636233653861343433363438353232646439633230636332 Dec 13 02:37:45.109000 audit[4301]: AVC avc: denied { bpf } for pid=4301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.109000 audit[4301]: AVC avc: denied { bpf } for pid=4301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.109000 audit[4301]: AVC avc: denied { bpf } for pid=4301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.109000 audit[4301]: AVC avc: denied { perfmon } for pid=4301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.109000 audit[4301]: AVC avc: denied { perfmon } for pid=4301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.109000 audit[4301]: AVC avc: denied { perfmon } for pid=4301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.109000 audit[4301]: AVC avc: denied { perfmon } for pid=4301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.109000 audit[4301]: AVC avc: denied { perfmon } for pid=4301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.109000 audit[4301]: AVC avc: denied { bpf } for pid=4301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.109000 audit[4301]: AVC avc: denied { bpf } for pid=4301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.109000 audit: BPF prog-id=194 op=LOAD Dec 13 02:37:45.109000 audit[4301]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000304ed0 items=0 ppid=4057 pid=4301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:45.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834386235636233653861343433363438353232646439633230636332 Dec 13 02:37:45.109000 audit[4301]: AVC avc: denied { bpf } for pid=4301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.109000 audit[4301]: AVC avc: denied { bpf } for pid=4301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.109000 audit[4301]: AVC avc: denied { perfmon } for pid=4301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.109000 audit[4301]: AVC avc: denied { perfmon } for pid=4301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.109000 audit[4301]: AVC avc: denied { perfmon } for pid=4301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.109000 audit[4301]: AVC avc: denied { perfmon } for pid=4301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.109000 audit[4301]: AVC avc: denied { perfmon } for pid=4301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.109000 audit[4301]: AVC avc: denied { bpf } for pid=4301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.109000 audit[4301]: AVC avc: denied { bpf } for pid=4301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.109000 audit: BPF prog-id=195 op=LOAD Dec 13 02:37:45.109000 audit[4301]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000304f18 items=0 ppid=4057 pid=4301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:45.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834386235636233653861343433363438353232646439633230636332 Dec 13 02:37:45.109000 audit: BPF prog-id=195 op=UNLOAD Dec 13 02:37:45.109000 audit: BPF prog-id=194 op=UNLOAD Dec 13 02:37:45.109000 audit[4301]: AVC avc: denied { bpf } for pid=4301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.109000 audit[4301]: AVC avc: denied { bpf } for pid=4301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.109000 audit[4301]: AVC avc: denied { bpf } for pid=4301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.109000 audit[4301]: AVC avc: denied { perfmon } for pid=4301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.109000 audit[4301]: AVC avc: denied { perfmon } for pid=4301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.109000 audit[4301]: AVC avc: denied { perfmon } for pid=4301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.109000 audit[4301]: AVC avc: denied { perfmon } for pid=4301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.109000 audit[4301]: AVC avc: denied { perfmon } for pid=4301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.109000 audit[4301]: AVC avc: denied { bpf } for pid=4301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.109000 audit[4301]: AVC avc: denied { bpf } for pid=4301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.109000 audit: BPF prog-id=196 op=LOAD Dec 13 02:37:45.109000 audit[4301]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000305328 items=0 ppid=4057 pid=4301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:45.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834386235636233653861343433363438353232646439633230636332 Dec 13 02:37:45.154184 env[1255]: time="2024-12-13T02:37:45.154153229Z" level=info msg="StartContainer for \"848b5cb3e8a443648522dd9c20cc2b0751b07fdd5f4271e24b377e063fff1768\" returns successfully" Dec 13 02:37:45.393024 env[1255]: time="2024-12-13T02:37:45.392993252Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:45.394128 env[1255]: time="2024-12-13T02:37:45.394109228Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:45.395150 env[1255]: time="2024-12-13T02:37:45.395132416Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:45.396157 env[1255]: time="2024-12-13T02:37:45.396139216Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:45.396437 env[1255]: time="2024-12-13T02:37:45.396287008Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 02:37:45.397427 env[1255]: time="2024-12-13T02:37:45.397319364Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 02:37:45.400021 env[1255]: time="2024-12-13T02:37:45.399995458Z" level=info msg="CreateContainer within sandbox \"1642aa9d17773ce42ebf33ba851c2efe59817265e1d1bd03e56a0ccdbca7e4cb\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 02:37:45.406030 env[1255]: time="2024-12-13T02:37:45.406004420Z" level=info msg="CreateContainer within sandbox \"1642aa9d17773ce42ebf33ba851c2efe59817265e1d1bd03e56a0ccdbca7e4cb\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"04cc837309d88feea408ae7cc041fa470a1822b2c97b31f5400ef884f9ad770c\"" Dec 13 02:37:45.406531 env[1255]: time="2024-12-13T02:37:45.406512017Z" level=info msg="StartContainer for \"04cc837309d88feea408ae7cc041fa470a1822b2c97b31f5400ef884f9ad770c\"" Dec 13 02:37:45.419581 systemd[1]: Started cri-containerd-04cc837309d88feea408ae7cc041fa470a1822b2c97b31f5400ef884f9ad770c.scope. Dec 13 02:37:45.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.435000 audit: BPF prog-id=197 op=LOAD Dec 13 02:37:45.436000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.436000 audit[4338]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4109 pid=4338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:45.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034636338333733303964383866656561343038616537636330343166 Dec 13 02:37:45.436000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.436000 audit[4338]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4109 pid=4338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:45.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034636338333733303964383866656561343038616537636330343166 Dec 13 02:37:45.436000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.436000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.436000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.436000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.436000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.436000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.436000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.436000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.436000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.436000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.436000 audit: BPF prog-id=198 op=LOAD Dec 13 02:37:45.436000 audit[4338]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00039a880 items=0 ppid=4109 pid=4338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:45.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034636338333733303964383866656561343038616537636330343166 Dec 13 02:37:45.436000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.436000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.436000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.436000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.436000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.436000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.436000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.436000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.436000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.436000 audit: BPF prog-id=199 op=LOAD Dec 13 02:37:45.436000 audit[4338]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00039a8c8 items=0 ppid=4109 pid=4338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:45.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034636338333733303964383866656561343038616537636330343166 Dec 13 02:37:45.436000 audit: BPF prog-id=199 op=UNLOAD Dec 13 02:37:45.436000 audit: BPF prog-id=198 op=UNLOAD Dec 13 02:37:45.436000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.436000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.436000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.436000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.436000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.436000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.436000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.436000 audit[4338]: AVC avc: denied { perfmon } for pid=4338 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.436000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.436000 audit[4338]: AVC avc: denied { bpf } for pid=4338 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:45.436000 audit: BPF prog-id=200 op=LOAD Dec 13 02:37:45.436000 audit[4338]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00039acd8 items=0 ppid=4109 pid=4338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:45.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034636338333733303964383866656561343038616537636330343166 Dec 13 02:37:45.472851 env[1255]: time="2024-12-13T02:37:45.472820216Z" level=info msg="StartContainer for \"04cc837309d88feea408ae7cc041fa470a1822b2c97b31f5400ef884f9ad770c\" returns successfully" Dec 13 02:37:46.026150 kubelet[2191]: I1213 02:37:46.026105 2191 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7dfb7b6b59-pdtd9" podStartSLOduration=27.144211056 podStartE2EDuration="31.026077046s" podCreationTimestamp="2024-12-13 02:37:15 +0000 UTC" firstStartedPulling="2024-12-13 02:37:41.515310031 +0000 UTC m=+48.847181280" lastFinishedPulling="2024-12-13 02:37:45.397176026 +0000 UTC m=+52.729047270" observedRunningTime="2024-12-13 02:37:45.974410159 +0000 UTC m=+53.306281426" watchObservedRunningTime="2024-12-13 02:37:46.026077046 +0000 UTC m=+53.357948302" Dec 13 02:37:46.051000 audit[4370]: NETFILTER_CFG table=filter:114 family=2 entries=10 op=nft_register_rule pid=4370 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:37:46.051000 audit[4370]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd4fdb7f00 a2=0 a3=7ffd4fdb7eec items=0 ppid=2327 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:46.051000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:37:46.058000 audit[4370]: NETFILTER_CFG table=nat:115 family=2 entries=20 op=nft_register_rule pid=4370 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:37:46.058000 audit[4370]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd4fdb7f00 a2=0 a3=7ffd4fdb7eec items=0 ppid=2327 pid=4370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:46.058000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:37:46.072000 audit[4372]: NETFILTER_CFG table=filter:116 family=2 entries=10 op=nft_register_rule pid=4372 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:37:46.072000 audit[4372]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd75036620 a2=0 a3=7ffd7503660c items=0 ppid=2327 pid=4372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:46.072000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:37:46.077000 audit[4372]: NETFILTER_CFG table=nat:117 family=2 entries=20 op=nft_register_rule pid=4372 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:37:46.077000 audit[4372]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd75036620 a2=0 a3=7ffd7503660c items=0 ppid=2327 pid=4372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:46.077000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:37:46.100000 audit[4312]: AVC avc: denied { watch } for pid=4312 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_37_26.1709902289/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c254,c664 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c254,c664 tclass=file permissive=0 Dec 13 02:37:46.100000 audit[4312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000ac7c60 a2=fc6 a3=0 items=0 ppid=4057 pid=4312 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c254,c664 key=(null) Dec 13 02:37:46.100000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:37:46.294000 audit[4349]: AVC avc: denied { watch } for pid=4349 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_37_26.1736495305/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c105,c562 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c105,c562 tclass=file permissive=0 Dec 13 02:37:46.294000 audit[4349]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0008a0120 a2=fc6 a3=0 items=0 ppid=4109 pid=4349 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c105,c562 key=(null) Dec 13 02:37:46.294000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:37:46.979769 kubelet[2191]: I1213 02:37:46.971489 2191 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:37:46.979769 kubelet[2191]: I1213 02:37:46.971459 2191 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:37:47.125378 env[1255]: time="2024-12-13T02:37:47.125341869Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:47.126502 env[1255]: time="2024-12-13T02:37:47.126477060Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:47.128947 env[1255]: time="2024-12-13T02:37:47.128927803Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:47.131056 env[1255]: time="2024-12-13T02:37:47.131036954Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:47.131421 env[1255]: time="2024-12-13T02:37:47.131399849Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 02:37:47.133698 env[1255]: time="2024-12-13T02:37:47.133647863Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 02:37:47.134279 env[1255]: time="2024-12-13T02:37:47.134258070Z" level=info msg="CreateContainer within sandbox \"482b132e76c8ade3345e04e6118cedf99acc240aced9066243a3b42b3a19e952\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 02:37:47.150626 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount839194497.mount: Deactivated successfully. Dec 13 02:37:47.161515 env[1255]: time="2024-12-13T02:37:47.160381575Z" level=info msg="CreateContainer within sandbox \"482b132e76c8ade3345e04e6118cedf99acc240aced9066243a3b42b3a19e952\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"45043257f4b6e259c8292d19eafcf616e41ace9d5c5fede1b3fca1b0934418ca\"" Dec 13 02:37:47.166361 kubelet[2191]: I1213 02:37:47.166166 2191 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7dfb7b6b59-sf2c7" podStartSLOduration=28.51487846 podStartE2EDuration="32.166152675s" podCreationTimestamp="2024-12-13 02:37:15 +0000 UTC" firstStartedPulling="2024-12-13 02:37:41.39848796 +0000 UTC m=+48.730359209" lastFinishedPulling="2024-12-13 02:37:45.049762175 +0000 UTC m=+52.381633424" observedRunningTime="2024-12-13 02:37:46.027880879 +0000 UTC m=+53.359752146" watchObservedRunningTime="2024-12-13 02:37:47.166152675 +0000 UTC m=+54.498023932" Dec 13 02:37:47.168228 env[1255]: time="2024-12-13T02:37:47.166857980Z" level=info msg="StartContainer for \"45043257f4b6e259c8292d19eafcf616e41ace9d5c5fede1b3fca1b0934418ca\"" Dec 13 02:37:47.194463 systemd[1]: Started cri-containerd-45043257f4b6e259c8292d19eafcf616e41ace9d5c5fede1b3fca1b0934418ca.scope. Dec 13 02:37:47.199000 audit[4394]: NETFILTER_CFG table=filter:118 family=2 entries=9 op=nft_register_rule pid=4394 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:37:47.199000 audit[4394]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc57862d20 a2=0 a3=7ffc57862d0c items=0 ppid=2327 pid=4394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:47.199000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:37:47.203000 audit[4394]: NETFILTER_CFG table=nat:119 family=2 entries=27 op=nft_register_chain pid=4394 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:37:47.203000 audit[4394]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc57862d20 a2=0 a3=7ffc57862d0c items=0 ppid=2327 pid=4394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:47.203000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:37:47.205000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:47.205000 audit[4381]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fc4ab4357b8 items=0 ppid=3674 pid=4381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:47.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435303433323537663462366532353963383239326431396561666366 Dec 13 02:37:47.205000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:47.205000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:47.205000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:47.205000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:47.205000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:47.205000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:47.205000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:47.205000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:47.205000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:47.205000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:47.205000 audit: BPF prog-id=201 op=LOAD Dec 13 02:37:47.205000 audit[4381]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003d8268 items=0 ppid=3674 pid=4381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:47.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435303433323537663462366532353963383239326431396561666366 Dec 13 02:37:47.205000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:47.205000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:47.205000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:47.205000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:47.205000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:47.205000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:47.205000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:47.205000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:47.205000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:47.205000 audit: BPF prog-id=202 op=LOAD Dec 13 02:37:47.205000 audit[4381]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003d82b8 items=0 ppid=3674 pid=4381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:47.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435303433323537663462366532353963383239326431396561666366 Dec 13 02:37:47.205000 audit: BPF prog-id=202 op=UNLOAD Dec 13 02:37:47.205000 audit: BPF prog-id=201 op=UNLOAD Dec 13 02:37:47.205000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:47.205000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:47.205000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:47.205000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:47.205000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:47.205000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:47.205000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:47.205000 audit[4381]: AVC avc: denied { perfmon } for pid=4381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:47.205000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:47.205000 audit[4381]: AVC avc: denied { bpf } for pid=4381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:47.205000 audit: BPF prog-id=203 op=LOAD Dec 13 02:37:47.205000 audit[4381]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003d8348 items=0 ppid=3674 pid=4381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:47.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435303433323537663462366532353963383239326431396561666366 Dec 13 02:37:47.238343 env[1255]: time="2024-12-13T02:37:47.229057882Z" level=info msg="StartContainer for \"45043257f4b6e259c8292d19eafcf616e41ace9d5c5fede1b3fca1b0934418ca\" returns successfully" Dec 13 02:37:48.032589 kubelet[2191]: I1213 02:37:48.030719 2191 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 02:37:48.034383 kubelet[2191]: I1213 02:37:48.034370 2191 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 02:37:48.147367 systemd[1]: run-containerd-runc-k8s.io-45043257f4b6e259c8292d19eafcf616e41ace9d5c5fede1b3fca1b0934418ca-runc.P5xv82.mount: Deactivated successfully. Dec 13 02:37:48.807000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:37:48.807000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0027a68a0 a2=fc6 a3=0 items=0 ppid=1888 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 key=(null) Dec 13 02:37:48.807000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:37:48.808000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:37:48.808000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00194be20 a2=fc6 a3=0 items=0 ppid=1888 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 key=(null) Dec 13 02:37:48.808000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:37:49.690000 audit[2056]: AVC avc: denied { watch } for pid=2056 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:37:49.690000 audit[2056]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c0106e8ae0 a2=fc6 a3=0 items=0 ppid=1920 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c498 key=(null) Dec 13 02:37:49.690000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:37:49.692000 audit[2056]: AVC avc: denied { watch } for pid=2056 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:37:49.692000 audit[2056]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c010715540 a2=fc6 a3=0 items=0 ppid=1920 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c498 key=(null) Dec 13 02:37:49.692000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:37:49.705000 audit[2056]: AVC avc: denied { watch } for pid=2056 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:37:49.705000 audit[2056]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c010842060 a2=fc6 a3=0 items=0 ppid=1920 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c498 key=(null) Dec 13 02:37:49.705000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:37:49.718000 audit[2056]: AVC avc: denied { watch } for pid=2056 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:37:49.718000 audit[2056]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c010667200 a2=fc6 a3=0 items=0 ppid=1920 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c498 key=(null) Dec 13 02:37:49.718000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:37:49.725000 audit[2056]: AVC avc: denied { watch } for pid=2056 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:37:49.725000 audit[2056]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c0106e8d20 a2=fc6 a3=0 items=0 ppid=1920 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c498 key=(null) Dec 13 02:37:49.725000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:37:49.725000 audit[2056]: AVC avc: denied { watch } for pid=2056 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:37:49.725000 audit[2056]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c0106e8d50 a2=fc6 a3=0 items=0 ppid=1920 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c498 key=(null) Dec 13 02:37:49.725000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:37:49.858870 env[1255]: time="2024-12-13T02:37:49.858450854Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:49.859767 env[1255]: time="2024-12-13T02:37:49.859580498Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:49.860573 env[1255]: time="2024-12-13T02:37:49.860547780Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:49.861551 env[1255]: time="2024-12-13T02:37:49.861531524Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:37:49.861879 env[1255]: time="2024-12-13T02:37:49.861861374Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 02:37:49.983948 env[1255]: time="2024-12-13T02:37:49.983184659Z" level=info msg="CreateContainer within sandbox \"ecd1738a518b0e5c845ca3caae46a10b8a40a7ea12219083b4aa25a9bdf18c1b\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 02:37:49.998134 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2793458074.mount: Deactivated successfully. Dec 13 02:37:50.006069 env[1255]: time="2024-12-13T02:37:50.006027577Z" level=info msg="CreateContainer within sandbox \"ecd1738a518b0e5c845ca3caae46a10b8a40a7ea12219083b4aa25a9bdf18c1b\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"5d6e59cd6f604d4a9a72a566293a39a1c6776d28031d84fda72eebb790e2b2b5\"" Dec 13 02:37:50.010502 env[1255]: time="2024-12-13T02:37:50.010481654Z" level=info msg="StartContainer for \"5d6e59cd6f604d4a9a72a566293a39a1c6776d28031d84fda72eebb790e2b2b5\"" Dec 13 02:37:50.026761 systemd[1]: Started cri-containerd-5d6e59cd6f604d4a9a72a566293a39a1c6776d28031d84fda72eebb790e2b2b5.scope. Dec 13 02:37:50.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.046000 audit: BPF prog-id=204 op=LOAD Dec 13 02:37:50.046000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.046000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4250 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:50.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564366535396364366636303464346139613732613536363239336133 Dec 13 02:37:50.046000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.046000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4250 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:50.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564366535396364366636303464346139613732613536363239336133 Dec 13 02:37:50.046000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.046000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.046000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.046000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.046000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.046000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.046000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.046000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.046000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.046000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.046000 audit: BPF prog-id=205 op=LOAD Dec 13 02:37:50.046000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000302270 items=0 ppid=4250 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:50.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564366535396364366636303464346139613732613536363239336133 Dec 13 02:37:50.046000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.046000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.046000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.046000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.046000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.046000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.046000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.046000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.046000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.046000 audit: BPF prog-id=206 op=LOAD Dec 13 02:37:50.046000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003022b8 items=0 ppid=4250 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:50.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564366535396364366636303464346139613732613536363239336133 Dec 13 02:37:50.046000 audit: BPF prog-id=206 op=UNLOAD Dec 13 02:37:50.046000 audit: BPF prog-id=205 op=UNLOAD Dec 13 02:37:50.047000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.047000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.047000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.047000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.047000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.047000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.047000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.047000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.047000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.047000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:37:50.047000 audit: BPF prog-id=207 op=LOAD Dec 13 02:37:50.047000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003026c8 items=0 ppid=4250 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:37:50.047000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564366535396364366636303464346139613732613536363239336133 Dec 13 02:37:50.129100 env[1255]: time="2024-12-13T02:37:50.083688689Z" level=info msg="StartContainer for \"5d6e59cd6f604d4a9a72a566293a39a1c6776d28031d84fda72eebb790e2b2b5\" returns successfully" Dec 13 02:37:51.043701 systemd[1]: run-containerd-runc-k8s.io-5d6e59cd6f604d4a9a72a566293a39a1c6776d28031d84fda72eebb790e2b2b5-runc.qMzQsn.mount: Deactivated successfully. Dec 13 02:37:51.073916 kubelet[2191]: I1213 02:37:51.073859 2191 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-6bb7fd499-v5d2m" podStartSLOduration=28.651828044 podStartE2EDuration="36.062635596s" podCreationTimestamp="2024-12-13 02:37:15 +0000 UTC" firstStartedPulling="2024-12-13 02:37:42.458762509 +0000 UTC m=+49.790633754" lastFinishedPulling="2024-12-13 02:37:49.869570058 +0000 UTC m=+57.201441306" observedRunningTime="2024-12-13 02:37:51.054004702 +0000 UTC m=+58.385875959" watchObservedRunningTime="2024-12-13 02:37:51.062635596 +0000 UTC m=+58.394506853" Dec 13 02:37:51.074193 kubelet[2191]: I1213 02:37:51.074027 2191 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-kmgrt" podStartSLOduration=28.851863738 podStartE2EDuration="36.074019798s" podCreationTimestamp="2024-12-13 02:37:15 +0000 UTC" firstStartedPulling="2024-12-13 02:37:39.91081806 +0000 UTC m=+47.242689306" lastFinishedPulling="2024-12-13 02:37:47.132974112 +0000 UTC m=+54.464845366" observedRunningTime="2024-12-13 02:37:47.978677671 +0000 UTC m=+55.310548928" watchObservedRunningTime="2024-12-13 02:37:51.074019798 +0000 UTC m=+58.405891055" Dec 13 02:37:52.778360 env[1255]: time="2024-12-13T02:37:52.778319916Z" level=info msg="StopPodSandbox for \"ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae\"" Dec 13 02:37:53.768479 env[1255]: 2024-12-13 02:37:53.486 [WARNING][4496] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6bb7fd499--v5d2m-eth0", GenerateName:"calico-kube-controllers-6bb7fd499-", Namespace:"calico-system", SelfLink:"", UID:"357f714f-1c9f-4765-8e1c-8659524fb9c0", ResourceVersion:"869", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 37, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6bb7fd499", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ecd1738a518b0e5c845ca3caae46a10b8a40a7ea12219083b4aa25a9bdf18c1b", Pod:"calico-kube-controllers-6bb7fd499-v5d2m", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia7b14fe2367", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:37:53.768479 env[1255]: 2024-12-13 02:37:53.489 [INFO][4496] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" Dec 13 02:37:53.768479 env[1255]: 2024-12-13 02:37:53.489 [INFO][4496] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" iface="eth0" netns="" Dec 13 02:37:53.768479 env[1255]: 2024-12-13 02:37:53.489 [INFO][4496] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" Dec 13 02:37:53.768479 env[1255]: 2024-12-13 02:37:53.489 [INFO][4496] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" Dec 13 02:37:53.768479 env[1255]: 2024-12-13 02:37:53.754 [INFO][4506] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" HandleID="k8s-pod-network.ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" Workload="localhost-k8s-calico--kube--controllers--6bb7fd499--v5d2m-eth0" Dec 13 02:37:53.768479 env[1255]: 2024-12-13 02:37:53.756 [INFO][4506] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:37:53.768479 env[1255]: 2024-12-13 02:37:53.756 [INFO][4506] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:37:53.768479 env[1255]: 2024-12-13 02:37:53.765 [WARNING][4506] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" HandleID="k8s-pod-network.ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" Workload="localhost-k8s-calico--kube--controllers--6bb7fd499--v5d2m-eth0" Dec 13 02:37:53.768479 env[1255]: 2024-12-13 02:37:53.765 [INFO][4506] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" HandleID="k8s-pod-network.ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" Workload="localhost-k8s-calico--kube--controllers--6bb7fd499--v5d2m-eth0" Dec 13 02:37:53.768479 env[1255]: 2024-12-13 02:37:53.766 [INFO][4506] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:37:53.768479 env[1255]: 2024-12-13 02:37:53.767 [INFO][4496] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" Dec 13 02:37:53.770834 env[1255]: time="2024-12-13T02:37:53.768773438Z" level=info msg="TearDown network for sandbox \"ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae\" successfully" Dec 13 02:37:53.770834 env[1255]: time="2024-12-13T02:37:53.768800537Z" level=info msg="StopPodSandbox for \"ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae\" returns successfully" Dec 13 02:37:53.791575 env[1255]: time="2024-12-13T02:37:53.791548793Z" level=info msg="RemovePodSandbox for \"ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae\"" Dec 13 02:37:53.791821 env[1255]: time="2024-12-13T02:37:53.791576403Z" level=info msg="Forcibly stopping sandbox \"ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae\"" Dec 13 02:37:53.840559 env[1255]: 2024-12-13 02:37:53.816 [WARNING][4524] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6bb7fd499--v5d2m-eth0", GenerateName:"calico-kube-controllers-6bb7fd499-", Namespace:"calico-system", SelfLink:"", UID:"357f714f-1c9f-4765-8e1c-8659524fb9c0", ResourceVersion:"869", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 37, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6bb7fd499", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ecd1738a518b0e5c845ca3caae46a10b8a40a7ea12219083b4aa25a9bdf18c1b", Pod:"calico-kube-controllers-6bb7fd499-v5d2m", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia7b14fe2367", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:37:53.840559 env[1255]: 2024-12-13 02:37:53.816 [INFO][4524] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" Dec 13 02:37:53.840559 env[1255]: 2024-12-13 02:37:53.816 [INFO][4524] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" iface="eth0" netns="" Dec 13 02:37:53.840559 env[1255]: 2024-12-13 02:37:53.816 [INFO][4524] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" Dec 13 02:37:53.840559 env[1255]: 2024-12-13 02:37:53.816 [INFO][4524] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" Dec 13 02:37:53.840559 env[1255]: 2024-12-13 02:37:53.830 [INFO][4530] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" HandleID="k8s-pod-network.ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" Workload="localhost-k8s-calico--kube--controllers--6bb7fd499--v5d2m-eth0" Dec 13 02:37:53.840559 env[1255]: 2024-12-13 02:37:53.830 [INFO][4530] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:37:53.840559 env[1255]: 2024-12-13 02:37:53.830 [INFO][4530] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:37:53.840559 env[1255]: 2024-12-13 02:37:53.836 [WARNING][4530] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" HandleID="k8s-pod-network.ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" Workload="localhost-k8s-calico--kube--controllers--6bb7fd499--v5d2m-eth0" Dec 13 02:37:53.840559 env[1255]: 2024-12-13 02:37:53.836 [INFO][4530] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" HandleID="k8s-pod-network.ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" Workload="localhost-k8s-calico--kube--controllers--6bb7fd499--v5d2m-eth0" Dec 13 02:37:53.840559 env[1255]: 2024-12-13 02:37:53.837 [INFO][4530] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:37:53.840559 env[1255]: 2024-12-13 02:37:53.839 [INFO][4524] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae" Dec 13 02:37:53.841470 env[1255]: time="2024-12-13T02:37:53.840788736Z" level=info msg="TearDown network for sandbox \"ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae\" successfully" Dec 13 02:37:53.843948 env[1255]: time="2024-12-13T02:37:53.843926333Z" level=info msg="RemovePodSandbox \"ac7adf5c83eaca1f4f715c4d9fdf79ee189cd828cc8f464a3dc8e08c8fd961ae\" returns successfully" Dec 13 02:37:53.844555 env[1255]: time="2024-12-13T02:37:53.844411464Z" level=info msg="StopPodSandbox for \"cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9\"" Dec 13 02:37:53.894218 env[1255]: 2024-12-13 02:37:53.865 [WARNING][4548] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--kmgrt-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"63f11487-359c-4b4b-808e-af281c2987db", ResourceVersion:"851", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 37, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"482b132e76c8ade3345e04e6118cedf99acc240aced9066243a3b42b3a19e952", Pod:"csi-node-driver-kmgrt", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali013ed8b7951", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:37:53.894218 env[1255]: 2024-12-13 02:37:53.865 [INFO][4548] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" Dec 13 02:37:53.894218 env[1255]: 2024-12-13 02:37:53.865 [INFO][4548] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" iface="eth0" netns="" Dec 13 02:37:53.894218 env[1255]: 2024-12-13 02:37:53.865 [INFO][4548] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" Dec 13 02:37:53.894218 env[1255]: 2024-12-13 02:37:53.865 [INFO][4548] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" Dec 13 02:37:53.894218 env[1255]: 2024-12-13 02:37:53.886 [INFO][4555] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" HandleID="k8s-pod-network.cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" Workload="localhost-k8s-csi--node--driver--kmgrt-eth0" Dec 13 02:37:53.894218 env[1255]: 2024-12-13 02:37:53.886 [INFO][4555] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:37:53.894218 env[1255]: 2024-12-13 02:37:53.886 [INFO][4555] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:37:53.894218 env[1255]: 2024-12-13 02:37:53.891 [WARNING][4555] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" HandleID="k8s-pod-network.cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" Workload="localhost-k8s-csi--node--driver--kmgrt-eth0" Dec 13 02:37:53.894218 env[1255]: 2024-12-13 02:37:53.891 [INFO][4555] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" HandleID="k8s-pod-network.cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" Workload="localhost-k8s-csi--node--driver--kmgrt-eth0" Dec 13 02:37:53.894218 env[1255]: 2024-12-13 02:37:53.892 [INFO][4555] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:37:53.894218 env[1255]: 2024-12-13 02:37:53.893 [INFO][4548] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" Dec 13 02:37:53.895392 env[1255]: time="2024-12-13T02:37:53.894253683Z" level=info msg="TearDown network for sandbox \"cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9\" successfully" Dec 13 02:37:53.895392 env[1255]: time="2024-12-13T02:37:53.894272725Z" level=info msg="StopPodSandbox for \"cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9\" returns successfully" Dec 13 02:37:53.896545 env[1255]: time="2024-12-13T02:37:53.896525855Z" level=info msg="RemovePodSandbox for \"cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9\"" Dec 13 02:37:53.896618 env[1255]: time="2024-12-13T02:37:53.896582109Z" level=info msg="Forcibly stopping sandbox \"cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9\"" Dec 13 02:37:53.952177 env[1255]: 2024-12-13 02:37:53.923 [WARNING][4574] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--kmgrt-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"63f11487-359c-4b4b-808e-af281c2987db", ResourceVersion:"851", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 37, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"482b132e76c8ade3345e04e6118cedf99acc240aced9066243a3b42b3a19e952", Pod:"csi-node-driver-kmgrt", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali013ed8b7951", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:37:53.952177 env[1255]: 2024-12-13 02:37:53.923 [INFO][4574] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" Dec 13 02:37:53.952177 env[1255]: 2024-12-13 02:37:53.923 [INFO][4574] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" iface="eth0" netns="" Dec 13 02:37:53.952177 env[1255]: 2024-12-13 02:37:53.923 [INFO][4574] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" Dec 13 02:37:53.952177 env[1255]: 2024-12-13 02:37:53.923 [INFO][4574] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" Dec 13 02:37:53.952177 env[1255]: 2024-12-13 02:37:53.943 [INFO][4580] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" HandleID="k8s-pod-network.cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" Workload="localhost-k8s-csi--node--driver--kmgrt-eth0" Dec 13 02:37:53.952177 env[1255]: 2024-12-13 02:37:53.943 [INFO][4580] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:37:53.952177 env[1255]: 2024-12-13 02:37:53.943 [INFO][4580] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:37:53.952177 env[1255]: 2024-12-13 02:37:53.948 [WARNING][4580] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" HandleID="k8s-pod-network.cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" Workload="localhost-k8s-csi--node--driver--kmgrt-eth0" Dec 13 02:37:53.952177 env[1255]: 2024-12-13 02:37:53.948 [INFO][4580] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" HandleID="k8s-pod-network.cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" Workload="localhost-k8s-csi--node--driver--kmgrt-eth0" Dec 13 02:37:53.952177 env[1255]: 2024-12-13 02:37:53.949 [INFO][4580] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:37:53.952177 env[1255]: 2024-12-13 02:37:53.950 [INFO][4574] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9" Dec 13 02:37:53.953093 env[1255]: time="2024-12-13T02:37:53.952206112Z" level=info msg="TearDown network for sandbox \"cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9\" successfully" Dec 13 02:37:53.955613 env[1255]: time="2024-12-13T02:37:53.955594157Z" level=info msg="RemovePodSandbox \"cb9c2751a5271ef344c9e0c5e31e937d94d79317ccc3d21b5a003e467afd7dc9\" returns successfully" Dec 13 02:37:53.955988 env[1255]: time="2024-12-13T02:37:53.955975168Z" level=info msg="StopPodSandbox for \"e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63\"" Dec 13 02:37:54.006563 env[1255]: 2024-12-13 02:37:53.981 [WARNING][4598] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--m6sv5-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"011e69b1-6ba1-45b9-baab-a1b5873b9984", ResourceVersion:"804", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 37, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4a5d7f01ccc2a402cf09828009f5c69d3f2bc56bb4668900f6e62e3a372dcc2b", Pod:"coredns-7db6d8ff4d-m6sv5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4043f1d8f5f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:37:54.006563 env[1255]: 2024-12-13 02:37:53.981 [INFO][4598] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" Dec 13 02:37:54.006563 env[1255]: 2024-12-13 02:37:53.981 [INFO][4598] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" iface="eth0" netns="" Dec 13 02:37:54.006563 env[1255]: 2024-12-13 02:37:53.981 [INFO][4598] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" Dec 13 02:37:54.006563 env[1255]: 2024-12-13 02:37:53.981 [INFO][4598] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" Dec 13 02:37:54.006563 env[1255]: 2024-12-13 02:37:53.999 [INFO][4605] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" HandleID="k8s-pod-network.e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" Workload="localhost-k8s-coredns--7db6d8ff4d--m6sv5-eth0" Dec 13 02:37:54.006563 env[1255]: 2024-12-13 02:37:53.999 [INFO][4605] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:37:54.006563 env[1255]: 2024-12-13 02:37:54.000 [INFO][4605] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:37:54.006563 env[1255]: 2024-12-13 02:37:54.003 [WARNING][4605] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" HandleID="k8s-pod-network.e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" Workload="localhost-k8s-coredns--7db6d8ff4d--m6sv5-eth0" Dec 13 02:37:54.006563 env[1255]: 2024-12-13 02:37:54.003 [INFO][4605] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" HandleID="k8s-pod-network.e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" Workload="localhost-k8s-coredns--7db6d8ff4d--m6sv5-eth0" Dec 13 02:37:54.006563 env[1255]: 2024-12-13 02:37:54.004 [INFO][4605] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:37:54.006563 env[1255]: 2024-12-13 02:37:54.005 [INFO][4598] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" Dec 13 02:37:54.007479 env[1255]: time="2024-12-13T02:37:54.006794065Z" level=info msg="TearDown network for sandbox \"e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63\" successfully" Dec 13 02:37:54.007479 env[1255]: time="2024-12-13T02:37:54.006813147Z" level=info msg="StopPodSandbox for \"e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63\" returns successfully" Dec 13 02:37:54.007479 env[1255]: time="2024-12-13T02:37:54.007316417Z" level=info msg="RemovePodSandbox for \"e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63\"" Dec 13 02:37:54.007598 env[1255]: time="2024-12-13T02:37:54.007332952Z" level=info msg="Forcibly stopping sandbox \"e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63\"" Dec 13 02:37:54.048435 env[1255]: 2024-12-13 02:37:54.028 [WARNING][4623] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--m6sv5-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"011e69b1-6ba1-45b9-baab-a1b5873b9984", ResourceVersion:"804", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 37, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4a5d7f01ccc2a402cf09828009f5c69d3f2bc56bb4668900f6e62e3a372dcc2b", Pod:"coredns-7db6d8ff4d-m6sv5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4043f1d8f5f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:37:54.048435 env[1255]: 2024-12-13 02:37:54.028 [INFO][4623] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" Dec 13 02:37:54.048435 env[1255]: 2024-12-13 02:37:54.028 [INFO][4623] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" iface="eth0" netns="" Dec 13 02:37:54.048435 env[1255]: 2024-12-13 02:37:54.028 [INFO][4623] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" Dec 13 02:37:54.048435 env[1255]: 2024-12-13 02:37:54.028 [INFO][4623] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" Dec 13 02:37:54.048435 env[1255]: 2024-12-13 02:37:54.042 [INFO][4629] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" HandleID="k8s-pod-network.e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" Workload="localhost-k8s-coredns--7db6d8ff4d--m6sv5-eth0" Dec 13 02:37:54.048435 env[1255]: 2024-12-13 02:37:54.042 [INFO][4629] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:37:54.048435 env[1255]: 2024-12-13 02:37:54.042 [INFO][4629] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:37:54.048435 env[1255]: 2024-12-13 02:37:54.045 [WARNING][4629] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" HandleID="k8s-pod-network.e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" Workload="localhost-k8s-coredns--7db6d8ff4d--m6sv5-eth0" Dec 13 02:37:54.048435 env[1255]: 2024-12-13 02:37:54.045 [INFO][4629] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" HandleID="k8s-pod-network.e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" Workload="localhost-k8s-coredns--7db6d8ff4d--m6sv5-eth0" Dec 13 02:37:54.048435 env[1255]: 2024-12-13 02:37:54.046 [INFO][4629] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:37:54.048435 env[1255]: 2024-12-13 02:37:54.047 [INFO][4623] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63" Dec 13 02:37:54.051474 env[1255]: time="2024-12-13T02:37:54.048412769Z" level=info msg="TearDown network for sandbox \"e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63\" successfully" Dec 13 02:37:54.051553 env[1255]: time="2024-12-13T02:37:54.051537342Z" level=info msg="RemovePodSandbox \"e3b2e060327dc4addca15b99951aabcccccd57a5f8e3a308db9352a01c4bec63\" returns successfully" Dec 13 02:37:54.052011 env[1255]: time="2024-12-13T02:37:54.051859165Z" level=info msg="StopPodSandbox for \"ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b\"" Dec 13 02:37:54.091180 env[1255]: 2024-12-13 02:37:54.072 [WARNING][4648] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7dfb7b6b59--sf2c7-eth0", GenerateName:"calico-apiserver-7dfb7b6b59-", Namespace:"calico-apiserver", SelfLink:"", UID:"9a772036-63d2-4fbd-b90f-e00c4c528987", ResourceVersion:"835", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 37, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7dfb7b6b59", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"683a0dafca9e97c570c50f90f26e6b300b72dec216c131b7f12117613b1c3f3f", Pod:"calico-apiserver-7dfb7b6b59-sf2c7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2d978ac264a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:37:54.091180 env[1255]: 2024-12-13 02:37:54.072 [INFO][4648] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" Dec 13 02:37:54.091180 env[1255]: 2024-12-13 02:37:54.072 [INFO][4648] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" iface="eth0" netns="" Dec 13 02:37:54.091180 env[1255]: 2024-12-13 02:37:54.072 [INFO][4648] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" Dec 13 02:37:54.091180 env[1255]: 2024-12-13 02:37:54.072 [INFO][4648] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" Dec 13 02:37:54.091180 env[1255]: 2024-12-13 02:37:54.084 [INFO][4655] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" HandleID="k8s-pod-network.ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" Workload="localhost-k8s-calico--apiserver--7dfb7b6b59--sf2c7-eth0" Dec 13 02:37:54.091180 env[1255]: 2024-12-13 02:37:54.084 [INFO][4655] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:37:54.091180 env[1255]: 2024-12-13 02:37:54.084 [INFO][4655] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:37:54.091180 env[1255]: 2024-12-13 02:37:54.088 [WARNING][4655] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" HandleID="k8s-pod-network.ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" Workload="localhost-k8s-calico--apiserver--7dfb7b6b59--sf2c7-eth0" Dec 13 02:37:54.091180 env[1255]: 2024-12-13 02:37:54.088 [INFO][4655] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" HandleID="k8s-pod-network.ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" Workload="localhost-k8s-calico--apiserver--7dfb7b6b59--sf2c7-eth0" Dec 13 02:37:54.091180 env[1255]: 2024-12-13 02:37:54.089 [INFO][4655] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:37:54.091180 env[1255]: 2024-12-13 02:37:54.090 [INFO][4648] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" Dec 13 02:37:54.092408 env[1255]: time="2024-12-13T02:37:54.091195283Z" level=info msg="TearDown network for sandbox \"ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b\" successfully" Dec 13 02:37:54.092408 env[1255]: time="2024-12-13T02:37:54.091222807Z" level=info msg="StopPodSandbox for \"ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b\" returns successfully" Dec 13 02:37:54.092408 env[1255]: time="2024-12-13T02:37:54.091690233Z" level=info msg="RemovePodSandbox for \"ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b\"" Dec 13 02:37:54.092408 env[1255]: time="2024-12-13T02:37:54.091707738Z" level=info msg="Forcibly stopping sandbox \"ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b\"" Dec 13 02:37:54.141082 env[1255]: 2024-12-13 02:37:54.112 [WARNING][4674] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7dfb7b6b59--sf2c7-eth0", GenerateName:"calico-apiserver-7dfb7b6b59-", Namespace:"calico-apiserver", SelfLink:"", UID:"9a772036-63d2-4fbd-b90f-e00c4c528987", ResourceVersion:"835", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 37, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7dfb7b6b59", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"683a0dafca9e97c570c50f90f26e6b300b72dec216c131b7f12117613b1c3f3f", Pod:"calico-apiserver-7dfb7b6b59-sf2c7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2d978ac264a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:37:54.141082 env[1255]: 2024-12-13 02:37:54.112 [INFO][4674] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" Dec 13 02:37:54.141082 env[1255]: 2024-12-13 02:37:54.112 [INFO][4674] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" iface="eth0" netns="" Dec 13 02:37:54.141082 env[1255]: 2024-12-13 02:37:54.112 [INFO][4674] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" Dec 13 02:37:54.141082 env[1255]: 2024-12-13 02:37:54.112 [INFO][4674] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" Dec 13 02:37:54.141082 env[1255]: 2024-12-13 02:37:54.132 [INFO][4680] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" HandleID="k8s-pod-network.ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" Workload="localhost-k8s-calico--apiserver--7dfb7b6b59--sf2c7-eth0" Dec 13 02:37:54.141082 env[1255]: 2024-12-13 02:37:54.133 [INFO][4680] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:37:54.141082 env[1255]: 2024-12-13 02:37:54.133 [INFO][4680] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:37:54.141082 env[1255]: 2024-12-13 02:37:54.137 [WARNING][4680] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" HandleID="k8s-pod-network.ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" Workload="localhost-k8s-calico--apiserver--7dfb7b6b59--sf2c7-eth0" Dec 13 02:37:54.141082 env[1255]: 2024-12-13 02:37:54.137 [INFO][4680] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" HandleID="k8s-pod-network.ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" Workload="localhost-k8s-calico--apiserver--7dfb7b6b59--sf2c7-eth0" Dec 13 02:37:54.141082 env[1255]: 2024-12-13 02:37:54.138 [INFO][4680] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:37:54.141082 env[1255]: 2024-12-13 02:37:54.140 [INFO][4674] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b" Dec 13 02:37:54.143084 env[1255]: time="2024-12-13T02:37:54.141466842Z" level=info msg="TearDown network for sandbox \"ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b\" successfully" Dec 13 02:37:54.144294 env[1255]: time="2024-12-13T02:37:54.144271516Z" level=info msg="RemovePodSandbox \"ef5fa983fa706f6074750e82000d30d1f96adb920a89216c813f75e3b4a8151b\" returns successfully" Dec 13 02:37:54.145959 env[1255]: time="2024-12-13T02:37:54.145939622Z" level=info msg="StopPodSandbox for \"b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9\"" Dec 13 02:37:54.195421 env[1255]: 2024-12-13 02:37:54.173 [WARNING][4699] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--jrp2n-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"049a69b1-19e4-47a5-9d0a-afb8d1ea62a8", ResourceVersion:"807", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 37, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0c19ea4fa69b1a3cb2535991adea167d5ac4051ba10c9b2e5d22a127213f8f95", Pod:"coredns-7db6d8ff4d-jrp2n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif1360ec88a9", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:37:54.195421 env[1255]: 2024-12-13 02:37:54.174 [INFO][4699] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" Dec 13 02:37:54.195421 env[1255]: 2024-12-13 02:37:54.174 [INFO][4699] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" iface="eth0" netns="" Dec 13 02:37:54.195421 env[1255]: 2024-12-13 02:37:54.174 [INFO][4699] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" Dec 13 02:37:54.195421 env[1255]: 2024-12-13 02:37:54.174 [INFO][4699] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" Dec 13 02:37:54.195421 env[1255]: 2024-12-13 02:37:54.188 [INFO][4706] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" HandleID="k8s-pod-network.b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" Workload="localhost-k8s-coredns--7db6d8ff4d--jrp2n-eth0" Dec 13 02:37:54.195421 env[1255]: 2024-12-13 02:37:54.188 [INFO][4706] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:37:54.195421 env[1255]: 2024-12-13 02:37:54.188 [INFO][4706] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:37:54.195421 env[1255]: 2024-12-13 02:37:54.192 [WARNING][4706] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" HandleID="k8s-pod-network.b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" Workload="localhost-k8s-coredns--7db6d8ff4d--jrp2n-eth0" Dec 13 02:37:54.195421 env[1255]: 2024-12-13 02:37:54.192 [INFO][4706] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" HandleID="k8s-pod-network.b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" Workload="localhost-k8s-coredns--7db6d8ff4d--jrp2n-eth0" Dec 13 02:37:54.195421 env[1255]: 2024-12-13 02:37:54.193 [INFO][4706] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:37:54.195421 env[1255]: 2024-12-13 02:37:54.194 [INFO][4699] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" Dec 13 02:37:54.196904 env[1255]: time="2024-12-13T02:37:54.195439887Z" level=info msg="TearDown network for sandbox \"b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9\" successfully" Dec 13 02:37:54.196904 env[1255]: time="2024-12-13T02:37:54.195460674Z" level=info msg="StopPodSandbox for \"b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9\" returns successfully" Dec 13 02:37:54.196904 env[1255]: time="2024-12-13T02:37:54.195853958Z" level=info msg="RemovePodSandbox for \"b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9\"" Dec 13 02:37:54.196904 env[1255]: time="2024-12-13T02:37:54.195869539Z" level=info msg="Forcibly stopping sandbox \"b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9\"" Dec 13 02:37:54.243024 env[1255]: 2024-12-13 02:37:54.220 [WARNING][4724] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--jrp2n-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"049a69b1-19e4-47a5-9d0a-afb8d1ea62a8", ResourceVersion:"807", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 37, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0c19ea4fa69b1a3cb2535991adea167d5ac4051ba10c9b2e5d22a127213f8f95", Pod:"coredns-7db6d8ff4d-jrp2n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif1360ec88a9", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:37:54.243024 env[1255]: 2024-12-13 02:37:54.221 [INFO][4724] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" Dec 13 02:37:54.243024 env[1255]: 2024-12-13 02:37:54.221 [INFO][4724] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" iface="eth0" netns="" Dec 13 02:37:54.243024 env[1255]: 2024-12-13 02:37:54.221 [INFO][4724] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" Dec 13 02:37:54.243024 env[1255]: 2024-12-13 02:37:54.221 [INFO][4724] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" Dec 13 02:37:54.243024 env[1255]: 2024-12-13 02:37:54.235 [INFO][4730] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" HandleID="k8s-pod-network.b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" Workload="localhost-k8s-coredns--7db6d8ff4d--jrp2n-eth0" Dec 13 02:37:54.243024 env[1255]: 2024-12-13 02:37:54.235 [INFO][4730] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:37:54.243024 env[1255]: 2024-12-13 02:37:54.236 [INFO][4730] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:37:54.243024 env[1255]: 2024-12-13 02:37:54.239 [WARNING][4730] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" HandleID="k8s-pod-network.b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" Workload="localhost-k8s-coredns--7db6d8ff4d--jrp2n-eth0" Dec 13 02:37:54.243024 env[1255]: 2024-12-13 02:37:54.239 [INFO][4730] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" HandleID="k8s-pod-network.b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" Workload="localhost-k8s-coredns--7db6d8ff4d--jrp2n-eth0" Dec 13 02:37:54.243024 env[1255]: 2024-12-13 02:37:54.240 [INFO][4730] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:37:54.243024 env[1255]: 2024-12-13 02:37:54.242 [INFO][4724] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9" Dec 13 02:37:54.243723 env[1255]: time="2024-12-13T02:37:54.243039144Z" level=info msg="TearDown network for sandbox \"b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9\" successfully" Dec 13 02:37:54.246609 env[1255]: time="2024-12-13T02:37:54.246583189Z" level=info msg="RemovePodSandbox \"b4d9d72147ec55c8624b1e1edf7715198af7ef773c4fc959d78ba95b519b05e9\" returns successfully" Dec 13 02:37:54.246985 env[1255]: time="2024-12-13T02:37:54.246935907Z" level=info msg="StopPodSandbox for \"3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d\"" Dec 13 02:37:54.292776 env[1255]: 2024-12-13 02:37:54.272 [WARNING][4748] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7dfb7b6b59--pdtd9-eth0", GenerateName:"calico-apiserver-7dfb7b6b59-", Namespace:"calico-apiserver", SelfLink:"", UID:"5741a8e0-bb09-43e6-8da2-fba27a6e1250", ResourceVersion:"842", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 37, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7dfb7b6b59", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1642aa9d17773ce42ebf33ba851c2efe59817265e1d1bd03e56a0ccdbca7e4cb", Pod:"calico-apiserver-7dfb7b6b59-pdtd9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8973c407e0e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:37:54.292776 env[1255]: 2024-12-13 02:37:54.272 [INFO][4748] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" Dec 13 02:37:54.292776 env[1255]: 2024-12-13 02:37:54.272 [INFO][4748] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" iface="eth0" netns="" Dec 13 02:37:54.292776 env[1255]: 2024-12-13 02:37:54.272 [INFO][4748] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" Dec 13 02:37:54.292776 env[1255]: 2024-12-13 02:37:54.272 [INFO][4748] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" Dec 13 02:37:54.292776 env[1255]: 2024-12-13 02:37:54.285 [INFO][4754] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" HandleID="k8s-pod-network.3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" Workload="localhost-k8s-calico--apiserver--7dfb7b6b59--pdtd9-eth0" Dec 13 02:37:54.292776 env[1255]: 2024-12-13 02:37:54.285 [INFO][4754] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:37:54.292776 env[1255]: 2024-12-13 02:37:54.285 [INFO][4754] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:37:54.292776 env[1255]: 2024-12-13 02:37:54.289 [WARNING][4754] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" HandleID="k8s-pod-network.3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" Workload="localhost-k8s-calico--apiserver--7dfb7b6b59--pdtd9-eth0" Dec 13 02:37:54.292776 env[1255]: 2024-12-13 02:37:54.289 [INFO][4754] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" HandleID="k8s-pod-network.3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" Workload="localhost-k8s-calico--apiserver--7dfb7b6b59--pdtd9-eth0" Dec 13 02:37:54.292776 env[1255]: 2024-12-13 02:37:54.290 [INFO][4754] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:37:54.292776 env[1255]: 2024-12-13 02:37:54.291 [INFO][4748] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" Dec 13 02:37:54.293511 env[1255]: time="2024-12-13T02:37:54.293055434Z" level=info msg="TearDown network for sandbox \"3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d\" successfully" Dec 13 02:37:54.293511 env[1255]: time="2024-12-13T02:37:54.293076318Z" level=info msg="StopPodSandbox for \"3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d\" returns successfully" Dec 13 02:37:54.293511 env[1255]: time="2024-12-13T02:37:54.293378124Z" level=info msg="RemovePodSandbox for \"3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d\"" Dec 13 02:37:54.293511 env[1255]: time="2024-12-13T02:37:54.293397331Z" level=info msg="Forcibly stopping sandbox \"3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d\"" Dec 13 02:37:54.335912 env[1255]: 2024-12-13 02:37:54.314 [WARNING][4773] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7dfb7b6b59--pdtd9-eth0", GenerateName:"calico-apiserver-7dfb7b6b59-", Namespace:"calico-apiserver", SelfLink:"", UID:"5741a8e0-bb09-43e6-8da2-fba27a6e1250", ResourceVersion:"842", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 37, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7dfb7b6b59", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1642aa9d17773ce42ebf33ba851c2efe59817265e1d1bd03e56a0ccdbca7e4cb", Pod:"calico-apiserver-7dfb7b6b59-pdtd9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8973c407e0e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:37:54.335912 env[1255]: 2024-12-13 02:37:54.315 [INFO][4773] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" Dec 13 02:37:54.335912 env[1255]: 2024-12-13 02:37:54.315 [INFO][4773] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" iface="eth0" netns="" Dec 13 02:37:54.335912 env[1255]: 2024-12-13 02:37:54.315 [INFO][4773] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" Dec 13 02:37:54.335912 env[1255]: 2024-12-13 02:37:54.315 [INFO][4773] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" Dec 13 02:37:54.335912 env[1255]: 2024-12-13 02:37:54.329 [INFO][4779] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" HandleID="k8s-pod-network.3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" Workload="localhost-k8s-calico--apiserver--7dfb7b6b59--pdtd9-eth0" Dec 13 02:37:54.335912 env[1255]: 2024-12-13 02:37:54.329 [INFO][4779] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:37:54.335912 env[1255]: 2024-12-13 02:37:54.329 [INFO][4779] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:37:54.335912 env[1255]: 2024-12-13 02:37:54.333 [WARNING][4779] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" HandleID="k8s-pod-network.3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" Workload="localhost-k8s-calico--apiserver--7dfb7b6b59--pdtd9-eth0" Dec 13 02:37:54.335912 env[1255]: 2024-12-13 02:37:54.333 [INFO][4779] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" HandleID="k8s-pod-network.3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" Workload="localhost-k8s-calico--apiserver--7dfb7b6b59--pdtd9-eth0" Dec 13 02:37:54.335912 env[1255]: 2024-12-13 02:37:54.333 [INFO][4779] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:37:54.335912 env[1255]: 2024-12-13 02:37:54.334 [INFO][4773] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d" Dec 13 02:37:54.338736 env[1255]: time="2024-12-13T02:37:54.337457736Z" level=info msg="TearDown network for sandbox \"3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d\" successfully" Dec 13 02:37:54.339106 env[1255]: time="2024-12-13T02:37:54.339089848Z" level=info msg="RemovePodSandbox \"3957d3fba9dec72d7767f81c4a2cf4287a292a9dbace025002d51d97ef197a6d\" returns successfully" Dec 13 02:37:54.518000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:37:54.519843 kernel: kauditd_printk_skb: 252 callbacks suppressed Dec 13 02:37:54.540601 kernel: audit: type=1400 audit(1734057474.518:1320): avc: denied { watch } for pid=2011 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:37:54.543625 kernel: audit: type=1300 audit(1734057474.518:1320): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a7b6a0 a2=fc6 a3=0 items=0 ppid=1888 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 key=(null) Dec 13 02:37:54.543649 kernel: audit: type=1327 audit(1734057474.518:1320): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:37:54.543665 kernel: audit: type=1400 audit(1734057474.519:1321): avc: denied { watch } for pid=2011 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:37:54.543692 kernel: audit: type=1300 audit(1734057474.519:1321): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0019da760 a2=fc6 a3=0 items=0 ppid=1888 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 key=(null) Dec 13 02:37:54.543707 kernel: audit: type=1327 audit(1734057474.519:1321): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:37:54.543719 kernel: audit: type=1400 audit(1734057474.522:1322): avc: denied { watch } for pid=2011 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:37:54.543733 kernel: audit: type=1300 audit(1734057474.522:1322): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0019da780 a2=fc6 a3=0 items=0 ppid=1888 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 key=(null) Dec 13 02:37:54.518000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a7b6a0 a2=fc6 a3=0 items=0 ppid=1888 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 key=(null) Dec 13 02:37:54.518000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:37:54.519000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:37:54.519000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0019da760 a2=fc6 a3=0 items=0 ppid=1888 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 key=(null) Dec 13 02:37:54.547561 kernel: audit: type=1327 audit(1734057474.522:1322): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:37:54.519000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:37:54.522000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:37:54.522000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0019da780 a2=fc6 a3=0 items=0 ppid=1888 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 key=(null) Dec 13 02:37:54.522000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:37:54.550843 kernel: audit: type=1400 audit(1734057474.522:1323): avc: denied { watch } for pid=2011 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:37:54.522000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:37:54.522000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001a7b6c0 a2=fc6 a3=0 items=0 ppid=1888 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 key=(null) Dec 13 02:37:54.522000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:37:54.978541 systemd[1]: run-containerd-runc-k8s.io-897a4f65abeef673ef887fd3b490be3aa68eb87da652d9dfc04682b030613935-runc.Y5KByb.mount: Deactivated successfully. Dec 13 02:37:56.418120 systemd[1]: run-containerd-runc-k8s.io-5d6e59cd6f604d4a9a72a566293a39a1c6776d28031d84fda72eebb790e2b2b5-runc.T2neMS.mount: Deactivated successfully. Dec 13 02:38:02.835195 systemd[1]: run-containerd-runc-k8s.io-5d6e59cd6f604d4a9a72a566293a39a1c6776d28031d84fda72eebb790e2b2b5-runc.8UsSvn.mount: Deactivated successfully. Dec 13 02:38:11.878908 kubelet[2191]: I1213 02:38:11.878880 2191 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:38:13.137000 audit[4856]: NETFILTER_CFG table=filter:120 family=2 entries=8 op=nft_register_rule pid=4856 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:38:13.165079 kernel: kauditd_printk_skb: 2 callbacks suppressed Dec 13 02:38:13.165156 kernel: audit: type=1325 audit(1734057493.137:1324): table=filter:120 family=2 entries=8 op=nft_register_rule pid=4856 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:38:13.165193 kernel: audit: type=1300 audit(1734057493.137:1324): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffe5bfa9e0 a2=0 a3=7fffe5bfa9cc items=0 ppid=2327 pid=4856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:13.165238 kernel: audit: type=1327 audit(1734057493.137:1324): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:38:13.165987 kernel: audit: type=1325 audit(1734057493.151:1325): table=nat:121 family=2 entries=34 op=nft_register_chain pid=4856 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:38:13.166018 kernel: audit: type=1300 audit(1734057493.151:1325): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fffe5bfa9e0 a2=0 a3=7fffe5bfa9cc items=0 ppid=2327 pid=4856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:13.166045 kernel: audit: type=1327 audit(1734057493.151:1325): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:38:13.137000 audit[4856]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffe5bfa9e0 a2=0 a3=7fffe5bfa9cc items=0 ppid=2327 pid=4856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:13.137000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:38:13.151000 audit[4856]: NETFILTER_CFG table=nat:121 family=2 entries=34 op=nft_register_chain pid=4856 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:38:13.151000 audit[4856]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fffe5bfa9e0 a2=0 a3=7fffe5bfa9cc items=0 ppid=2327 pid=4856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:13.151000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:38:14.218996 systemd[1]: Started sshd@7-139.178.70.101:22-147.75.109.163:53320.service. Dec 13 02:38:14.247722 kernel: audit: type=1130 audit(1734057494.232:1326): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.101:22-147.75.109.163:53320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:14.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.101:22-147.75.109.163:53320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:15.028412 sshd[4862]: Accepted publickey for core from 147.75.109.163 port 53320 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:38:15.041647 kernel: audit: type=1101 audit(1734057495.027:1327): pid=4862 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:15.041696 kernel: audit: type=1103 audit(1734057495.031:1328): pid=4862 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:15.041716 kernel: audit: type=1006 audit(1734057495.031:1329): pid=4862 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Dec 13 02:38:15.027000 audit[4862]: USER_ACCT pid=4862 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:15.031000 audit[4862]: CRED_ACQ pid=4862 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:15.031000 audit[4862]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa6dd9af0 a2=3 a3=0 items=0 ppid=1 pid=4862 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:15.031000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:38:15.060276 sshd[4862]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:38:15.107356 systemd-logind[1238]: New session 10 of user core. Dec 13 02:38:15.108684 systemd[1]: Started session-10.scope. Dec 13 02:38:15.111000 audit[4862]: USER_START pid=4862 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:15.112000 audit[4864]: CRED_ACQ pid=4864 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:15.892461 sshd[4862]: pam_unix(sshd:session): session closed for user core Dec 13 02:38:15.892000 audit[4862]: USER_END pid=4862 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:15.892000 audit[4862]: CRED_DISP pid=4862 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:15.896230 systemd[1]: sshd@7-139.178.70.101:22-147.75.109.163:53320.service: Deactivated successfully. Dec 13 02:38:15.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.101:22-147.75.109.163:53320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:15.897465 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 02:38:15.898208 systemd-logind[1238]: Session 10 logged out. Waiting for processes to exit. Dec 13 02:38:15.898814 systemd-logind[1238]: Removed session 10. Dec 13 02:38:20.895843 systemd[1]: Started sshd@8-139.178.70.101:22-147.75.109.163:48234.service. Dec 13 02:38:20.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.101:22-147.75.109.163:48234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:20.903867 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 02:38:20.903903 kernel: audit: type=1130 audit(1734057500.894:1335): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.101:22-147.75.109.163:48234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:21.055000 audit[4882]: USER_ACCT pid=4882 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:21.057980 sshd[4882]: Accepted publickey for core from 147.75.109.163 port 48234 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:38:21.061242 kernel: audit: type=1101 audit(1734057501.055:1336): pid=4882 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:21.060000 audit[4882]: CRED_ACQ pid=4882 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:21.065233 kernel: audit: type=1103 audit(1734057501.060:1337): pid=4882 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:21.065951 kernel: audit: type=1006 audit(1734057501.060:1338): pid=4882 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Dec 13 02:38:21.060000 audit[4882]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff56fe7d40 a2=3 a3=0 items=0 ppid=1 pid=4882 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:21.070714 kernel: audit: type=1300 audit(1734057501.060:1338): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff56fe7d40 a2=3 a3=0 items=0 ppid=1 pid=4882 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:21.070770 kernel: audit: type=1327 audit(1734057501.060:1338): proctitle=737368643A20636F7265205B707269765D Dec 13 02:38:21.060000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:38:21.072394 sshd[4882]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:38:21.077038 systemd[1]: Started session-11.scope. Dec 13 02:38:21.077341 systemd-logind[1238]: New session 11 of user core. Dec 13 02:38:21.081000 audit[4882]: USER_START pid=4882 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:21.082000 audit[4884]: CRED_ACQ pid=4884 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:21.091097 kernel: audit: type=1105 audit(1734057501.081:1339): pid=4882 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:21.091153 kernel: audit: type=1103 audit(1734057501.082:1340): pid=4884 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:21.265352 sshd[4882]: pam_unix(sshd:session): session closed for user core Dec 13 02:38:21.264000 audit[4882]: USER_END pid=4882 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:21.268000 audit[4882]: CRED_DISP pid=4882 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:21.272750 kernel: audit: type=1106 audit(1734057501.264:1341): pid=4882 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:21.273564 kernel: audit: type=1104 audit(1734057501.268:1342): pid=4882 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:21.273392 systemd[1]: sshd@8-139.178.70.101:22-147.75.109.163:48234.service: Deactivated successfully. Dec 13 02:38:21.273961 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 02:38:21.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.101:22-147.75.109.163:48234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:21.274374 systemd-logind[1238]: Session 11 logged out. Waiting for processes to exit. Dec 13 02:38:21.274926 systemd-logind[1238]: Removed session 11. Dec 13 02:38:26.268377 systemd[1]: Started sshd@9-139.178.70.101:22-147.75.109.163:58780.service. Dec 13 02:38:26.278405 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:38:26.278467 kernel: audit: type=1130 audit(1734057506.267:1344): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.101:22-147.75.109.163:58780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:26.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.101:22-147.75.109.163:58780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:26.364000 audit[4918]: USER_ACCT pid=4918 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:26.365890 sshd[4918]: Accepted publickey for core from 147.75.109.163 port 58780 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:38:26.369244 kernel: audit: type=1101 audit(1734057506.364:1345): pid=4918 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:26.368000 audit[4918]: CRED_ACQ pid=4918 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:26.370276 sshd[4918]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:38:26.374869 kernel: audit: type=1103 audit(1734057506.368:1346): pid=4918 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:26.375023 kernel: audit: type=1006 audit(1734057506.368:1347): pid=4918 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Dec 13 02:38:26.368000 audit[4918]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8a4cf430 a2=3 a3=0 items=0 ppid=1 pid=4918 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:26.378406 kernel: audit: type=1300 audit(1734057506.368:1347): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8a4cf430 a2=3 a3=0 items=0 ppid=1 pid=4918 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:26.368000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:38:26.379741 kernel: audit: type=1327 audit(1734057506.368:1347): proctitle=737368643A20636F7265205B707269765D Dec 13 02:38:26.384688 systemd[1]: Started session-12.scope. Dec 13 02:38:26.385257 systemd-logind[1238]: New session 12 of user core. Dec 13 02:38:26.389000 audit[4918]: USER_START pid=4918 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:26.393000 audit[4920]: CRED_ACQ pid=4920 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:26.397696 kernel: audit: type=1105 audit(1734057506.389:1348): pid=4918 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:26.397743 kernel: audit: type=1103 audit(1734057506.393:1349): pid=4920 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:26.411896 systemd[1]: run-containerd-runc-k8s.io-5d6e59cd6f604d4a9a72a566293a39a1c6776d28031d84fda72eebb790e2b2b5-runc.BlpdMF.mount: Deactivated successfully. Dec 13 02:38:26.542597 sshd[4918]: pam_unix(sshd:session): session closed for user core Dec 13 02:38:26.543088 systemd[1]: Started sshd@10-139.178.70.101:22-147.75.109.163:58784.service. Dec 13 02:38:26.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.101:22-147.75.109.163:58784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:26.548286 kernel: audit: type=1130 audit(1734057506.543:1350): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.101:22-147.75.109.163:58784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:26.549000 audit[4918]: USER_END pid=4918 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:26.556711 kernel: audit: type=1106 audit(1734057506.549:1351): pid=4918 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:26.550000 audit[4918]: CRED_DISP pid=4918 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:26.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.101:22-147.75.109.163:58780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:26.555859 systemd[1]: sshd@9-139.178.70.101:22-147.75.109.163:58780.service: Deactivated successfully. Dec 13 02:38:26.556383 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 02:38:26.556793 systemd-logind[1238]: Session 12 logged out. Waiting for processes to exit. Dec 13 02:38:26.558308 systemd-logind[1238]: Removed session 12. Dec 13 02:38:26.579000 audit[4953]: USER_ACCT pid=4953 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:26.581008 sshd[4953]: Accepted publickey for core from 147.75.109.163 port 58784 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:38:26.580000 audit[4953]: CRED_ACQ pid=4953 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:26.580000 audit[4953]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda87a7110 a2=3 a3=0 items=0 ppid=1 pid=4953 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:26.580000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:38:26.582528 sshd[4953]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:38:26.585093 systemd-logind[1238]: New session 13 of user core. Dec 13 02:38:26.585611 systemd[1]: Started session-13.scope. Dec 13 02:38:26.587000 audit[4953]: USER_START pid=4953 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:26.588000 audit[4956]: CRED_ACQ pid=4956 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:26.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.101:22-147.75.109.163:58796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:26.762375 systemd[1]: Started sshd@11-139.178.70.101:22-147.75.109.163:58796.service. Dec 13 02:38:26.763039 sshd[4953]: pam_unix(sshd:session): session closed for user core Dec 13 02:38:26.762000 audit[4953]: USER_END pid=4953 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:26.762000 audit[4953]: CRED_DISP pid=4953 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:26.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.101:22-147.75.109.163:58784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:26.765232 systemd[1]: sshd@10-139.178.70.101:22-147.75.109.163:58784.service: Deactivated successfully. Dec 13 02:38:26.765889 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 02:38:26.766699 systemd-logind[1238]: Session 13 logged out. Waiting for processes to exit. Dec 13 02:38:26.767432 systemd-logind[1238]: Removed session 13. Dec 13 02:38:26.800000 audit[4963]: USER_ACCT pid=4963 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:26.801846 sshd[4963]: Accepted publickey for core from 147.75.109.163 port 58796 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:38:26.801000 audit[4963]: CRED_ACQ pid=4963 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:26.801000 audit[4963]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3869f540 a2=3 a3=0 items=0 ppid=1 pid=4963 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:26.801000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:38:26.803120 sshd[4963]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:38:26.806015 systemd-logind[1238]: New session 14 of user core. Dec 13 02:38:26.806830 systemd[1]: Started session-14.scope. Dec 13 02:38:26.810000 audit[4963]: USER_START pid=4963 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:26.811000 audit[4966]: CRED_ACQ pid=4966 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:26.926048 sshd[4963]: pam_unix(sshd:session): session closed for user core Dec 13 02:38:26.925000 audit[4963]: USER_END pid=4963 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:26.926000 audit[4963]: CRED_DISP pid=4963 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:26.928321 systemd-logind[1238]: Session 14 logged out. Waiting for processes to exit. Dec 13 02:38:26.928411 systemd[1]: sshd@11-139.178.70.101:22-147.75.109.163:58796.service: Deactivated successfully. Dec 13 02:38:26.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.101:22-147.75.109.163:58796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:26.928860 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 02:38:26.929565 systemd-logind[1238]: Removed session 14. Dec 13 02:38:31.929590 systemd[1]: Started sshd@12-139.178.70.101:22-147.75.109.163:58800.service. Dec 13 02:38:31.935474 kernel: kauditd_printk_skb: 23 callbacks suppressed Dec 13 02:38:31.935531 kernel: audit: type=1130 audit(1734057511.928:1371): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.101:22-147.75.109.163:58800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:31.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.101:22-147.75.109.163:58800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:31.991000 audit[4980]: USER_ACCT pid=4980 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:31.993296 sshd[4980]: Accepted publickey for core from 147.75.109.163 port 58800 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:38:32.001624 kernel: audit: type=1101 audit(1734057511.991:1372): pid=4980 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:32.001664 kernel: audit: type=1103 audit(1734057511.996:1373): pid=4980 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:31.996000 audit[4980]: CRED_ACQ pid=4980 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:32.003110 sshd[4980]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:38:31.996000 audit[4980]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdddf320d0 a2=3 a3=0 items=0 ppid=1 pid=4980 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:32.009503 kernel: audit: type=1006 audit(1734057511.996:1374): pid=4980 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 02:38:32.009539 kernel: audit: type=1300 audit(1734057511.996:1374): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdddf320d0 a2=3 a3=0 items=0 ppid=1 pid=4980 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:31.996000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:38:32.010965 kernel: audit: type=1327 audit(1734057511.996:1374): proctitle=737368643A20636F7265205B707269765D Dec 13 02:38:32.013437 systemd[1]: Started session-15.scope. Dec 13 02:38:32.013805 systemd-logind[1238]: New session 15 of user core. Dec 13 02:38:32.015000 audit[4980]: USER_START pid=4980 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:32.016000 audit[4982]: CRED_ACQ pid=4982 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:32.025772 kernel: audit: type=1105 audit(1734057512.015:1375): pid=4980 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:32.025798 kernel: audit: type=1103 audit(1734057512.016:1376): pid=4982 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:32.318280 sshd[4980]: pam_unix(sshd:session): session closed for user core Dec 13 02:38:32.319000 audit[4980]: USER_END pid=4980 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:32.321402 systemd[1]: sshd@12-139.178.70.101:22-147.75.109.163:58800.service: Deactivated successfully. Dec 13 02:38:32.321980 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 02:38:32.324252 kernel: audit: type=1106 audit(1734057512.319:1377): pid=4980 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:32.324312 kernel: audit: type=1104 audit(1734057512.319:1378): pid=4980 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:32.319000 audit[4980]: CRED_DISP pid=4980 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:32.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.101:22-147.75.109.163:58800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:32.327239 systemd-logind[1238]: Session 15 logged out. Waiting for processes to exit. Dec 13 02:38:32.327886 systemd-logind[1238]: Removed session 15. Dec 13 02:38:37.322571 systemd[1]: Started sshd@13-139.178.70.101:22-147.75.109.163:56104.service. Dec 13 02:38:37.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.101:22-147.75.109.163:56104 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:37.327102 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:38:37.327173 kernel: audit: type=1130 audit(1734057517.321:1380): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.101:22-147.75.109.163:56104 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:37.405000 audit[4992]: USER_ACCT pid=4992 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:37.406859 sshd[4992]: Accepted publickey for core from 147.75.109.163 port 56104 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:38:37.410218 kernel: audit: type=1101 audit(1734057517.405:1381): pid=4992 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:37.409000 audit[4992]: CRED_ACQ pid=4992 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:37.411240 sshd[4992]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:38:37.415655 kernel: audit: type=1103 audit(1734057517.409:1382): pid=4992 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:37.415690 kernel: audit: type=1006 audit(1734057517.409:1383): pid=4992 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 02:38:37.415709 kernel: audit: type=1300 audit(1734057517.409:1383): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeff3c7c00 a2=3 a3=0 items=0 ppid=1 pid=4992 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:37.409000 audit[4992]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeff3c7c00 a2=3 a3=0 items=0 ppid=1 pid=4992 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:37.409000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:38:37.420006 kernel: audit: type=1327 audit(1734057517.409:1383): proctitle=737368643A20636F7265205B707269765D Dec 13 02:38:37.421826 systemd-logind[1238]: New session 16 of user core. Dec 13 02:38:37.422486 systemd[1]: Started session-16.scope. Dec 13 02:38:37.425000 audit[4992]: USER_START pid=4992 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:37.426000 audit[4994]: CRED_ACQ pid=4994 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:37.432886 kernel: audit: type=1105 audit(1734057517.425:1384): pid=4992 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:37.433018 kernel: audit: type=1103 audit(1734057517.426:1385): pid=4994 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:37.629153 sshd[4992]: pam_unix(sshd:session): session closed for user core Dec 13 02:38:37.629000 audit[4992]: USER_END pid=4992 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:37.633000 audit[4992]: CRED_DISP pid=4992 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:37.635824 systemd[1]: sshd@13-139.178.70.101:22-147.75.109.163:56104.service: Deactivated successfully. Dec 13 02:38:37.636293 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 02:38:37.637671 kernel: audit: type=1106 audit(1734057517.629:1386): pid=4992 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:37.637709 kernel: audit: type=1104 audit(1734057517.633:1387): pid=4992 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:37.638094 systemd-logind[1238]: Session 16 logged out. Waiting for processes to exit. Dec 13 02:38:37.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.101:22-147.75.109.163:56104 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:37.638623 systemd-logind[1238]: Removed session 16. Dec 13 02:38:42.631369 systemd[1]: Started sshd@14-139.178.70.101:22-147.75.109.163:56106.service. Dec 13 02:38:42.634249 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:38:42.634287 kernel: audit: type=1130 audit(1734057522.630:1389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.101:22-147.75.109.163:56106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:42.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.101:22-147.75.109.163:56106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:42.679000 audit[5007]: USER_ACCT pid=5007 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:42.682333 sshd[5007]: Accepted publickey for core from 147.75.109.163 port 56106 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:38:42.683000 audit[5007]: CRED_ACQ pid=5007 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:42.688108 kernel: audit: type=1101 audit(1734057522.679:1390): pid=5007 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:42.688172 kernel: audit: type=1103 audit(1734057522.683:1391): pid=5007 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:42.688362 sshd[5007]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:38:42.683000 audit[5007]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc02bc7a60 a2=3 a3=0 items=0 ppid=1 pid=5007 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:42.693283 kernel: audit: type=1006 audit(1734057522.683:1392): pid=5007 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Dec 13 02:38:42.693318 kernel: audit: type=1300 audit(1734057522.683:1392): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc02bc7a60 a2=3 a3=0 items=0 ppid=1 pid=5007 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:42.683000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:38:42.694470 kernel: audit: type=1327 audit(1734057522.683:1392): proctitle=737368643A20636F7265205B707269765D Dec 13 02:38:42.696562 systemd-logind[1238]: New session 17 of user core. Dec 13 02:38:42.697365 systemd[1]: Started session-17.scope. Dec 13 02:38:42.699000 audit[5007]: USER_START pid=5007 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:42.703000 audit[5009]: CRED_ACQ pid=5009 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:42.707559 kernel: audit: type=1105 audit(1734057522.699:1393): pid=5007 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:42.707600 kernel: audit: type=1103 audit(1734057522.703:1394): pid=5009 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:42.843432 sshd[5007]: pam_unix(sshd:session): session closed for user core Dec 13 02:38:42.842000 audit[5007]: USER_END pid=5007 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:42.847963 systemd[1]: sshd@14-139.178.70.101:22-147.75.109.163:56106.service: Deactivated successfully. Dec 13 02:38:42.849187 kernel: audit: type=1106 audit(1734057522.842:1395): pid=5007 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:42.849282 kernel: audit: type=1104 audit(1734057522.843:1396): pid=5007 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:42.843000 audit[5007]: CRED_DISP pid=5007 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:42.848434 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 02:38:42.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.101:22-147.75.109.163:56106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:42.853387 systemd-logind[1238]: Session 17 logged out. Waiting for processes to exit. Dec 13 02:38:42.853861 systemd-logind[1238]: Removed session 17. Dec 13 02:38:46.104000 audit[4312]: AVC avc: denied { watch } for pid=4312 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_37_26.1709902289/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c254,c664 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c254,c664 tclass=file permissive=0 Dec 13 02:38:46.104000 audit[4312]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00161bb00 a2=fc6 a3=0 items=0 ppid=4057 pid=4312 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c254,c664 key=(null) Dec 13 02:38:46.104000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:38:46.295000 audit[4349]: AVC avc: denied { watch } for pid=4349 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_37_26.1736495305/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c105,c562 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c105,c562 tclass=file permissive=0 Dec 13 02:38:46.295000 audit[4349]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0012f3ce0 a2=fc6 a3=0 items=0 ppid=4109 pid=4349 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c105,c562 key=(null) Dec 13 02:38:46.295000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:38:47.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.101:22-147.75.109.163:52874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:47.848358 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 02:38:47.848393 kernel: audit: type=1130 audit(1734057527.846:1400): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.101:22-147.75.109.163:52874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:47.847103 systemd[1]: Started sshd@15-139.178.70.101:22-147.75.109.163:52874.service. Dec 13 02:38:47.888000 audit[5021]: USER_ACCT pid=5021 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:47.890123 sshd[5021]: Accepted publickey for core from 147.75.109.163 port 52874 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:38:47.892000 audit[5021]: CRED_ACQ pid=5021 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:47.896902 kernel: audit: type=1101 audit(1734057527.888:1401): pid=5021 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:47.896950 kernel: audit: type=1103 audit(1734057527.892:1402): pid=5021 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:47.896972 kernel: audit: type=1006 audit(1734057527.892:1403): pid=5021 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Dec 13 02:38:47.897239 sshd[5021]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:38:47.898779 kernel: audit: type=1300 audit(1734057527.892:1403): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe49f28be0 a2=3 a3=0 items=0 ppid=1 pid=5021 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:47.892000 audit[5021]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe49f28be0 a2=3 a3=0 items=0 ppid=1 pid=5021 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:47.900522 systemd[1]: Started session-18.scope. Dec 13 02:38:47.901514 systemd-logind[1238]: New session 18 of user core. Dec 13 02:38:47.901975 kernel: audit: type=1327 audit(1734057527.892:1403): proctitle=737368643A20636F7265205B707269765D Dec 13 02:38:47.892000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:38:47.903000 audit[5021]: USER_START pid=5021 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:47.904000 audit[5023]: CRED_ACQ pid=5023 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:47.911070 kernel: audit: type=1105 audit(1734057527.903:1404): pid=5021 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:47.911112 kernel: audit: type=1103 audit(1734057527.904:1405): pid=5023 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:48.033257 sshd[5021]: pam_unix(sshd:session): session closed for user core Dec 13 02:38:48.035365 systemd[1]: Started sshd@16-139.178.70.101:22-147.75.109.163:52884.service. Dec 13 02:38:48.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.101:22-147.75.109.163:52884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:48.039271 kernel: audit: type=1130 audit(1734057528.034:1406): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.101:22-147.75.109.163:52884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:48.042973 kernel: audit: type=1106 audit(1734057528.035:1407): pid=5021 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:48.035000 audit[5021]: USER_END pid=5021 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:48.037213 systemd-logind[1238]: Session 18 logged out. Waiting for processes to exit. Dec 13 02:38:48.038008 systemd[1]: sshd@15-139.178.70.101:22-147.75.109.163:52874.service: Deactivated successfully. Dec 13 02:38:48.038470 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 02:38:48.039371 systemd-logind[1238]: Removed session 18. Dec 13 02:38:48.035000 audit[5021]: CRED_DISP pid=5021 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:48.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.101:22-147.75.109.163:52874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:48.077000 audit[5032]: USER_ACCT pid=5032 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:48.078824 sshd[5032]: Accepted publickey for core from 147.75.109.163 port 52884 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:38:48.078000 audit[5032]: CRED_ACQ pid=5032 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:48.078000 audit[5032]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2c205900 a2=3 a3=0 items=0 ppid=1 pid=5032 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:48.078000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:38:48.079953 sshd[5032]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:38:48.082966 systemd[1]: Started session-19.scope. Dec 13 02:38:48.083319 systemd-logind[1238]: New session 19 of user core. Dec 13 02:38:48.085000 audit[5032]: USER_START pid=5032 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:48.086000 audit[5035]: CRED_ACQ pid=5035 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:48.581299 sshd[5032]: pam_unix(sshd:session): session closed for user core Dec 13 02:38:48.581000 audit[5032]: USER_END pid=5032 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:48.582000 audit[5032]: CRED_DISP pid=5032 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:48.583916 systemd[1]: Started sshd@17-139.178.70.101:22-147.75.109.163:52892.service. Dec 13 02:38:48.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.101:22-147.75.109.163:52892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:48.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.101:22-147.75.109.163:52884 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:48.585307 systemd[1]: sshd@16-139.178.70.101:22-147.75.109.163:52884.service: Deactivated successfully. Dec 13 02:38:48.585740 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 02:38:48.586842 systemd-logind[1238]: Session 19 logged out. Waiting for processes to exit. Dec 13 02:38:48.587510 systemd-logind[1238]: Removed session 19. Dec 13 02:38:48.644000 audit[5042]: USER_ACCT pid=5042 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:48.646105 sshd[5042]: Accepted publickey for core from 147.75.109.163 port 52892 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:38:48.645000 audit[5042]: CRED_ACQ pid=5042 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:48.645000 audit[5042]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd870bfb0 a2=3 a3=0 items=0 ppid=1 pid=5042 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:48.645000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:38:48.647555 sshd[5042]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:38:48.650705 systemd[1]: Started session-20.scope. Dec 13 02:38:48.651110 systemd-logind[1238]: New session 20 of user core. Dec 13 02:38:48.653000 audit[5042]: USER_START pid=5042 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:48.653000 audit[5045]: CRED_ACQ pid=5045 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:48.864000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:38:48.864000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00185a620 a2=fc6 a3=0 items=0 ppid=1888 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 key=(null) Dec 13 02:38:48.864000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:38:48.864000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:38:48.864000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001297bf0 a2=fc6 a3=0 items=0 ppid=1888 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 key=(null) Dec 13 02:38:48.864000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:38:49.770000 audit[2056]: AVC avc: denied { watch } for pid=2056 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:38:49.770000 audit[2056]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c014cc6660 a2=fc6 a3=0 items=0 ppid=1920 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c498 key=(null) Dec 13 02:38:49.770000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:38:49.770000 audit[2056]: AVC avc: denied { watch } for pid=2056 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:38:49.770000 audit[2056]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c016baec20 a2=fc6 a3=0 items=0 ppid=1920 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c498 key=(null) Dec 13 02:38:49.770000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:38:49.776000 audit[2056]: AVC avc: denied { watch } for pid=2056 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:38:49.776000 audit[2056]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c016bc44b0 a2=fc6 a3=0 items=0 ppid=1920 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c498 key=(null) Dec 13 02:38:49.776000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:38:49.776000 audit[2056]: AVC avc: denied { watch } for pid=2056 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:38:49.776000 audit[2056]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c016bc4540 a2=fc6 a3=0 items=0 ppid=1920 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c498 key=(null) Dec 13 02:38:49.776000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:38:49.778000 audit[2056]: AVC avc: denied { watch } for pid=2056 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:38:49.778000 audit[2056]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c016baf720 a2=fc6 a3=0 items=0 ppid=1920 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c498 key=(null) Dec 13 02:38:49.778000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:38:49.783000 audit[2056]: AVC avc: denied { watch } for pid=2056 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c441,c498 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:38:49.783000 audit[2056]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c016bc45d0 a2=fc6 a3=0 items=0 ppid=1920 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c441,c498 key=(null) Dec 13 02:38:49.783000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313031002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 02:38:50.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.101:22-147.75.109.163:52908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:50.739293 systemd[1]: Started sshd@18-139.178.70.101:22-147.75.109.163:52908.service. Dec 13 02:38:50.750000 audit[5042]: USER_END pid=5042 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:50.753000 audit[5042]: CRED_DISP pid=5042 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:50.741268 sshd[5042]: pam_unix(sshd:session): session closed for user core Dec 13 02:38:50.778848 systemd[1]: sshd@17-139.178.70.101:22-147.75.109.163:52892.service: Deactivated successfully. Dec 13 02:38:50.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.101:22-147.75.109.163:52892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:50.779626 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 02:38:50.780270 systemd-logind[1238]: Session 20 logged out. Waiting for processes to exit. Dec 13 02:38:50.782534 systemd-logind[1238]: Removed session 20. Dec 13 02:38:50.810000 audit[5059]: NETFILTER_CFG table=filter:122 family=2 entries=20 op=nft_register_rule pid=5059 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:38:50.810000 audit[5059]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff8c893010 a2=0 a3=7fff8c892ffc items=0 ppid=2327 pid=5059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:50.810000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:38:50.814000 audit[5059]: NETFILTER_CFG table=nat:123 family=2 entries=22 op=nft_register_rule pid=5059 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:38:50.814000 audit[5059]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff8c893010 a2=0 a3=0 items=0 ppid=2327 pid=5059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:50.814000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:38:50.823000 audit[5055]: USER_ACCT pid=5055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:50.824457 sshd[5055]: Accepted publickey for core from 147.75.109.163 port 52908 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:38:50.824000 audit[5055]: CRED_ACQ pid=5055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:50.824000 audit[5055]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea36b4280 a2=3 a3=0 items=0 ppid=1 pid=5055 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:50.824000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:38:50.829115 sshd[5055]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:38:50.831000 audit[5061]: NETFILTER_CFG table=filter:124 family=2 entries=32 op=nft_register_rule pid=5061 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:38:50.831000 audit[5061]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fffe5eb1fc0 a2=0 a3=7fffe5eb1fac items=0 ppid=2327 pid=5061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:50.831000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:38:50.837856 systemd[1]: Started session-21.scope. Dec 13 02:38:50.837989 systemd-logind[1238]: New session 21 of user core. Dec 13 02:38:50.839000 audit[5061]: NETFILTER_CFG table=nat:125 family=2 entries=22 op=nft_register_rule pid=5061 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:38:50.839000 audit[5061]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffe5eb1fc0 a2=0 a3=0 items=0 ppid=2327 pid=5061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:50.839000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:38:50.840000 audit[5055]: USER_START pid=5055 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:50.841000 audit[5062]: CRED_ACQ pid=5062 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:51.629220 systemd[1]: Started sshd@19-139.178.70.101:22-147.75.109.163:52910.service. Dec 13 02:38:51.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.101:22-147.75.109.163:52910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:51.637340 sshd[5055]: pam_unix(sshd:session): session closed for user core Dec 13 02:38:51.637000 audit[5055]: USER_END pid=5055 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:51.637000 audit[5055]: CRED_DISP pid=5055 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:51.638000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.101:22-147.75.109.163:52908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:51.639456 systemd[1]: sshd@18-139.178.70.101:22-147.75.109.163:52908.service: Deactivated successfully. Dec 13 02:38:51.640004 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 02:38:51.640535 systemd-logind[1238]: Session 21 logged out. Waiting for processes to exit. Dec 13 02:38:51.640986 systemd-logind[1238]: Removed session 21. Dec 13 02:38:51.863000 audit[5069]: USER_ACCT pid=5069 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:51.864537 sshd[5069]: Accepted publickey for core from 147.75.109.163 port 52910 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:38:51.864000 audit[5069]: CRED_ACQ pid=5069 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:51.864000 audit[5069]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffaef2bc50 a2=3 a3=0 items=0 ppid=1 pid=5069 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:51.864000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:38:51.865656 sshd[5069]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:38:51.869367 systemd[1]: Started session-22.scope. Dec 13 02:38:51.869466 systemd-logind[1238]: New session 22 of user core. Dec 13 02:38:51.871000 audit[5069]: USER_START pid=5069 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:51.872000 audit[5072]: CRED_ACQ pid=5072 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:52.000674 sshd[5069]: pam_unix(sshd:session): session closed for user core Dec 13 02:38:52.000000 audit[5069]: USER_END pid=5069 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:52.000000 audit[5069]: CRED_DISP pid=5069 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:52.003217 systemd[1]: sshd@19-139.178.70.101:22-147.75.109.163:52910.service: Deactivated successfully. Dec 13 02:38:52.003675 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 02:38:52.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.101:22-147.75.109.163:52910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:52.003954 systemd-logind[1238]: Session 22 logged out. Waiting for processes to exit. Dec 13 02:38:52.004630 systemd-logind[1238]: Removed session 22. Dec 13 02:38:54.534000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:38:54.595312 kernel: kauditd_printk_skb: 81 callbacks suppressed Dec 13 02:38:54.693257 kernel: audit: type=1400 audit(1734057534.534:1457): avc: denied { watch } for pid=2011 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:38:54.707070 kernel: audit: type=1400 audit(1734057534.534:1458): avc: denied { watch } for pid=2011 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:38:54.707118 kernel: audit: type=1300 audit(1734057534.534:1458): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0019dac80 a2=fc6 a3=0 items=0 ppid=1888 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 key=(null) Dec 13 02:38:54.707141 kernel: audit: type=1327 audit(1734057534.534:1458): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:38:54.707159 kernel: audit: type=1300 audit(1734057534.534:1457): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001dd01e0 a2=fc6 a3=0 items=0 ppid=1888 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 key=(null) Dec 13 02:38:54.707176 kernel: audit: type=1327 audit(1734057534.534:1457): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:38:54.707191 kernel: audit: type=1400 audit(1734057534.555:1459): avc: denied { watch } for pid=2011 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:38:54.707218 kernel: audit: type=1300 audit(1734057534.555:1459): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0019daca0 a2=fc6 a3=0 items=0 ppid=1888 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 key=(null) Dec 13 02:38:54.707238 kernel: audit: type=1327 audit(1734057534.555:1459): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:38:54.707279 kernel: audit: type=1400 audit(1734057534.555:1460): avc: denied { watch } for pid=2011 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:38:54.534000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:38:54.534000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0019dac80 a2=fc6 a3=0 items=0 ppid=1888 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 key=(null) Dec 13 02:38:54.534000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:38:54.534000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001dd01e0 a2=fc6 a3=0 items=0 ppid=1888 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 key=(null) Dec 13 02:38:54.534000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:38:54.555000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:38:54.555000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0019daca0 a2=fc6 a3=0 items=0 ppid=1888 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 key=(null) Dec 13 02:38:54.555000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:38:54.555000 audit[2011]: AVC avc: denied { watch } for pid=2011 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:38:54.555000 audit[2011]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c001dd0200 a2=fc6 a3=0 items=0 ppid=1888 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c645,c1013 key=(null) Dec 13 02:38:54.555000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:38:56.538000 audit[5128]: NETFILTER_CFG table=filter:126 family=2 entries=20 op=nft_register_rule pid=5128 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:38:56.538000 audit[5128]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffca9ec3650 a2=0 a3=7ffca9ec363c items=0 ppid=2327 pid=5128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:56.538000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:38:56.544000 audit[5128]: NETFILTER_CFG table=nat:127 family=2 entries=106 op=nft_register_chain pid=5128 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:38:56.544000 audit[5128]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffca9ec3650 a2=0 a3=7ffca9ec363c items=0 ppid=2327 pid=5128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:56.544000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:38:57.014725 systemd[1]: Started sshd@20-139.178.70.101:22-147.75.109.163:47800.service. Dec 13 02:38:57.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.101:22-147.75.109.163:47800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:57.178000 audit[5131]: USER_ACCT pid=5131 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:57.187000 audit[5131]: CRED_ACQ pid=5131 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:57.188000 audit[5131]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff900ba130 a2=3 a3=0 items=0 ppid=1 pid=5131 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:38:57.188000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:38:57.267287 sshd[5131]: Accepted publickey for core from 147.75.109.163 port 47800 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:38:57.279000 audit[5131]: USER_START pid=5131 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:57.280000 audit[5133]: CRED_ACQ pid=5133 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:57.210045 sshd[5131]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:38:57.276995 systemd[1]: Started session-23.scope. Dec 13 02:38:57.277323 systemd-logind[1238]: New session 23 of user core. Dec 13 02:38:58.215923 sshd[5131]: pam_unix(sshd:session): session closed for user core Dec 13 02:38:58.215000 audit[5131]: USER_END pid=5131 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:58.215000 audit[5131]: CRED_DISP pid=5131 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:38:58.218621 systemd-logind[1238]: Session 23 logged out. Waiting for processes to exit. Dec 13 02:38:58.220084 systemd[1]: sshd@20-139.178.70.101:22-147.75.109.163:47800.service: Deactivated successfully. Dec 13 02:38:58.219000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.101:22-147.75.109.163:47800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:38:58.220948 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 02:38:58.221692 systemd-logind[1238]: Removed session 23. Dec 13 02:39:03.224437 systemd[1]: Started sshd@21-139.178.70.101:22-147.75.109.163:47802.service. Dec 13 02:39:03.234682 kernel: kauditd_printk_skb: 19 callbacks suppressed Dec 13 02:39:03.241117 kernel: audit: type=1130 audit(1734057543.223:1472): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.101:22-147.75.109.163:47802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:39:03.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.101:22-147.75.109.163:47802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:39:03.364000 audit[5168]: USER_ACCT pid=5168 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:39:03.369015 sshd[5168]: Accepted publickey for core from 147.75.109.163 port 47802 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:39:03.371221 kernel: audit: type=1101 audit(1734057543.364:1473): pid=5168 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:39:03.370000 audit[5168]: CRED_ACQ pid=5168 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:39:03.374378 sshd[5168]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:39:03.378419 kernel: audit: type=1103 audit(1734057543.370:1474): pid=5168 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:39:03.378458 kernel: audit: type=1006 audit(1734057543.370:1475): pid=5168 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 02:39:03.370000 audit[5168]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1754c460 a2=3 a3=0 items=0 ppid=1 pid=5168 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:39:03.383338 kernel: audit: type=1300 audit(1734057543.370:1475): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1754c460 a2=3 a3=0 items=0 ppid=1 pid=5168 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:39:03.383835 kernel: audit: type=1327 audit(1734057543.370:1475): proctitle=737368643A20636F7265205B707269765D Dec 13 02:39:03.370000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:39:03.388844 systemd-logind[1238]: New session 24 of user core. Dec 13 02:39:03.389287 systemd[1]: Started session-24.scope. Dec 13 02:39:03.391000 audit[5168]: USER_START pid=5168 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:39:03.395000 audit[5170]: CRED_ACQ pid=5170 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:39:03.399747 kernel: audit: type=1105 audit(1734057543.391:1476): pid=5168 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:39:03.399787 kernel: audit: type=1103 audit(1734057543.395:1477): pid=5170 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:39:04.191796 sshd[5168]: pam_unix(sshd:session): session closed for user core Dec 13 02:39:04.192000 audit[5168]: USER_END pid=5168 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:39:04.197458 kernel: audit: type=1106 audit(1734057544.192:1478): pid=5168 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:39:04.197497 kernel: audit: type=1104 audit(1734057544.192:1479): pid=5168 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:39:04.192000 audit[5168]: CRED_DISP pid=5168 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:39:04.194439 systemd[1]: sshd@21-139.178.70.101:22-147.75.109.163:47802.service: Deactivated successfully. Dec 13 02:39:04.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.101:22-147.75.109.163:47802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:39:04.196116 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 02:39:04.200534 systemd-logind[1238]: Session 24 logged out. Waiting for processes to exit. Dec 13 02:39:04.201029 systemd-logind[1238]: Removed session 24. Dec 13 02:39:09.220968 systemd[1]: Started sshd@22-139.178.70.101:22-147.75.109.163:47470.service. Dec 13 02:39:09.289460 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:39:09.292588 kernel: audit: type=1130 audit(1734057549.219:1481): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.101:22-147.75.109.163:47470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:39:09.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.101:22-147.75.109.163:47470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:39:09.516000 audit[5184]: USER_ACCT pid=5184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:39:09.521773 sshd[5184]: Accepted publickey for core from 147.75.109.163 port 47470 ssh2: RSA SHA256:k2ByNGL46war/Xsk68FiWoh37KWlcdLKudymf+Foujk Dec 13 02:39:09.523977 kernel: audit: type=1101 audit(1734057549.516:1482): pid=5184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:39:09.524217 kernel: audit: type=1103 audit(1734057549.521:1483): pid=5184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:39:09.521000 audit[5184]: CRED_ACQ pid=5184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:39:09.528583 kernel: audit: type=1006 audit(1734057549.525:1484): pid=5184 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 13 02:39:09.528618 kernel: audit: type=1300 audit(1734057549.525:1484): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2b0e3510 a2=3 a3=0 items=0 ppid=1 pid=5184 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:39:09.525000 audit[5184]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2b0e3510 a2=3 a3=0 items=0 ppid=1 pid=5184 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:39:09.538627 kernel: audit: type=1327 audit(1734057549.525:1484): proctitle=737368643A20636F7265205B707269765D Dec 13 02:39:09.525000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:39:09.534713 sshd[5184]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:39:09.559502 systemd[1]: Started session-25.scope. Dec 13 02:39:09.560237 systemd-logind[1238]: New session 25 of user core. Dec 13 02:39:09.581436 kernel: audit: type=1105 audit(1734057549.561:1485): pid=5184 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:39:09.581480 kernel: audit: type=1103 audit(1734057549.566:1486): pid=5191 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:39:09.561000 audit[5184]: USER_START pid=5184 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:39:09.566000 audit[5191]: CRED_ACQ pid=5191 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:39:11.531293 sshd[5184]: pam_unix(sshd:session): session closed for user core Dec 13 02:39:11.539918 kernel: audit: type=1106 audit(1734057551.530:1487): pid=5184 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:39:11.539959 kernel: audit: type=1104 audit(1734057551.531:1488): pid=5184 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:39:11.530000 audit[5184]: USER_END pid=5184 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:39:11.531000 audit[5184]: CRED_DISP pid=5184 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 02:39:11.542286 systemd[1]: sshd@22-139.178.70.101:22-147.75.109.163:47470.service: Deactivated successfully. Dec 13 02:39:11.547000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.101:22-147.75.109.163:47470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:39:11.548797 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 02:39:11.549158 systemd-logind[1238]: Session 25 logged out. Waiting for processes to exit. Dec 13 02:39:11.550040 systemd-logind[1238]: Removed session 25.