Dec 13 14:23:04.658029 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 14:23:04.658044 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:23:04.658050 kernel: Disabled fast string operations Dec 13 14:23:04.658054 kernel: BIOS-provided physical RAM map: Dec 13 14:23:04.658058 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ebff] usable Dec 13 14:23:04.658062 kernel: BIOS-e820: [mem 0x000000000009ec00-0x000000000009ffff] reserved Dec 13 14:23:04.658068 kernel: BIOS-e820: [mem 0x00000000000dc000-0x00000000000fffff] reserved Dec 13 14:23:04.658072 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007fedffff] usable Dec 13 14:23:04.658076 kernel: BIOS-e820: [mem 0x000000007fee0000-0x000000007fefefff] ACPI data Dec 13 14:23:04.658080 kernel: BIOS-e820: [mem 0x000000007feff000-0x000000007fefffff] ACPI NVS Dec 13 14:23:04.658084 kernel: BIOS-e820: [mem 0x000000007ff00000-0x000000007fffffff] usable Dec 13 14:23:04.658088 kernel: BIOS-e820: [mem 0x00000000f0000000-0x00000000f7ffffff] reserved Dec 13 14:23:04.658092 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec0ffff] reserved Dec 13 14:23:04.658096 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Dec 13 14:23:04.658103 kernel: BIOS-e820: [mem 0x00000000fffe0000-0x00000000ffffffff] reserved Dec 13 14:23:04.658107 kernel: NX (Execute Disable) protection: active Dec 13 14:23:04.658112 kernel: SMBIOS 2.7 present. Dec 13 14:23:04.658116 kernel: DMI: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/28/2020 Dec 13 14:23:04.658121 kernel: vmware: hypercall mode: 0x00 Dec 13 14:23:04.658125 kernel: Hypervisor detected: VMware Dec 13 14:23:04.658131 kernel: vmware: TSC freq read from hypervisor : 3408.000 MHz Dec 13 14:23:04.658135 kernel: vmware: Host bus clock speed read from hypervisor : 66000000 Hz Dec 13 14:23:04.658139 kernel: vmware: using clock offset of 3027540307 ns Dec 13 14:23:04.658144 kernel: tsc: Detected 3408.000 MHz processor Dec 13 14:23:04.658149 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 14:23:04.658154 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 14:23:04.658158 kernel: last_pfn = 0x80000 max_arch_pfn = 0x400000000 Dec 13 14:23:04.658163 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 14:23:04.658167 kernel: total RAM covered: 3072M Dec 13 14:23:04.658173 kernel: Found optimal setting for mtrr clean up Dec 13 14:23:04.658178 kernel: gran_size: 64K chunk_size: 64K num_reg: 2 lose cover RAM: 0G Dec 13 14:23:04.658182 kernel: Using GB pages for direct mapping Dec 13 14:23:04.658187 kernel: ACPI: Early table checksum verification disabled Dec 13 14:23:04.658191 kernel: ACPI: RSDP 0x00000000000F6A00 000024 (v02 PTLTD ) Dec 13 14:23:04.658196 kernel: ACPI: XSDT 0x000000007FEE965B 00005C (v01 INTEL 440BX 06040000 VMW 01324272) Dec 13 14:23:04.658200 kernel: ACPI: FACP 0x000000007FEFEE73 0000F4 (v04 INTEL 440BX 06040000 PTL 000F4240) Dec 13 14:23:04.658205 kernel: ACPI: DSDT 0x000000007FEEAD55 01411E (v01 PTLTD Custom 06040000 MSFT 03000001) Dec 13 14:23:04.658209 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Dec 13 14:23:04.658213 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Dec 13 14:23:04.658219 kernel: ACPI: BOOT 0x000000007FEEAD2D 000028 (v01 PTLTD $SBFTBL$ 06040000 LTP 00000001) Dec 13 14:23:04.658226 kernel: ACPI: APIC 0x000000007FEEA5EB 000742 (v01 PTLTD ? APIC 06040000 LTP 00000000) Dec 13 14:23:04.658231 kernel: ACPI: MCFG 0x000000007FEEA5AF 00003C (v01 PTLTD $PCITBL$ 06040000 LTP 00000001) Dec 13 14:23:04.658235 kernel: ACPI: SRAT 0x000000007FEE9757 0008A8 (v02 VMWARE MEMPLUG 06040000 VMW 00000001) Dec 13 14:23:04.658240 kernel: ACPI: HPET 0x000000007FEE971F 000038 (v01 VMWARE VMW HPET 06040000 VMW 00000001) Dec 13 14:23:04.658246 kernel: ACPI: WAET 0x000000007FEE96F7 000028 (v01 VMWARE VMW WAET 06040000 VMW 00000001) Dec 13 14:23:04.658251 kernel: ACPI: Reserving FACP table memory at [mem 0x7fefee73-0x7fefef66] Dec 13 14:23:04.658256 kernel: ACPI: Reserving DSDT table memory at [mem 0x7feead55-0x7fefee72] Dec 13 14:23:04.658261 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Dec 13 14:23:04.658266 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Dec 13 14:23:04.658271 kernel: ACPI: Reserving BOOT table memory at [mem 0x7feead2d-0x7feead54] Dec 13 14:23:04.658275 kernel: ACPI: Reserving APIC table memory at [mem 0x7feea5eb-0x7feead2c] Dec 13 14:23:04.658280 kernel: ACPI: Reserving MCFG table memory at [mem 0x7feea5af-0x7feea5ea] Dec 13 14:23:04.658285 kernel: ACPI: Reserving SRAT table memory at [mem 0x7fee9757-0x7fee9ffe] Dec 13 14:23:04.658291 kernel: ACPI: Reserving HPET table memory at [mem 0x7fee971f-0x7fee9756] Dec 13 14:23:04.658296 kernel: ACPI: Reserving WAET table memory at [mem 0x7fee96f7-0x7fee971e] Dec 13 14:23:04.658300 kernel: system APIC only can use physical flat Dec 13 14:23:04.658305 kernel: Setting APIC routing to physical flat. Dec 13 14:23:04.658310 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 14:23:04.658315 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Dec 13 14:23:04.658320 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Dec 13 14:23:04.658324 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Dec 13 14:23:04.658329 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Dec 13 14:23:04.658335 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Dec 13 14:23:04.658339 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Dec 13 14:23:04.658344 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Dec 13 14:23:04.658349 kernel: SRAT: PXM 0 -> APIC 0x10 -> Node 0 Dec 13 14:23:04.658354 kernel: SRAT: PXM 0 -> APIC 0x12 -> Node 0 Dec 13 14:23:04.658358 kernel: SRAT: PXM 0 -> APIC 0x14 -> Node 0 Dec 13 14:23:04.658363 kernel: SRAT: PXM 0 -> APIC 0x16 -> Node 0 Dec 13 14:23:04.658368 kernel: SRAT: PXM 0 -> APIC 0x18 -> Node 0 Dec 13 14:23:04.658373 kernel: SRAT: PXM 0 -> APIC 0x1a -> Node 0 Dec 13 14:23:04.658377 kernel: SRAT: PXM 0 -> APIC 0x1c -> Node 0 Dec 13 14:23:04.658383 kernel: SRAT: PXM 0 -> APIC 0x1e -> Node 0 Dec 13 14:23:04.658388 kernel: SRAT: PXM 0 -> APIC 0x20 -> Node 0 Dec 13 14:23:04.658393 kernel: SRAT: PXM 0 -> APIC 0x22 -> Node 0 Dec 13 14:23:04.658397 kernel: SRAT: PXM 0 -> APIC 0x24 -> Node 0 Dec 13 14:23:04.658402 kernel: SRAT: PXM 0 -> APIC 0x26 -> Node 0 Dec 13 14:23:04.658407 kernel: SRAT: PXM 0 -> APIC 0x28 -> Node 0 Dec 13 14:23:04.658412 kernel: SRAT: PXM 0 -> APIC 0x2a -> Node 0 Dec 13 14:23:04.658416 kernel: SRAT: PXM 0 -> APIC 0x2c -> Node 0 Dec 13 14:23:04.658421 kernel: SRAT: PXM 0 -> APIC 0x2e -> Node 0 Dec 13 14:23:04.658426 kernel: SRAT: PXM 0 -> APIC 0x30 -> Node 0 Dec 13 14:23:04.658432 kernel: SRAT: PXM 0 -> APIC 0x32 -> Node 0 Dec 13 14:23:04.658436 kernel: SRAT: PXM 0 -> APIC 0x34 -> Node 0 Dec 13 14:23:04.658441 kernel: SRAT: PXM 0 -> APIC 0x36 -> Node 0 Dec 13 14:23:04.658446 kernel: SRAT: PXM 0 -> APIC 0x38 -> Node 0 Dec 13 14:23:04.658450 kernel: SRAT: PXM 0 -> APIC 0x3a -> Node 0 Dec 13 14:23:04.658455 kernel: SRAT: PXM 0 -> APIC 0x3c -> Node 0 Dec 13 14:23:04.658460 kernel: SRAT: PXM 0 -> APIC 0x3e -> Node 0 Dec 13 14:23:04.658465 kernel: SRAT: PXM 0 -> APIC 0x40 -> Node 0 Dec 13 14:23:04.658469 kernel: SRAT: PXM 0 -> APIC 0x42 -> Node 0 Dec 13 14:23:04.658474 kernel: SRAT: PXM 0 -> APIC 0x44 -> Node 0 Dec 13 14:23:04.658480 kernel: SRAT: PXM 0 -> APIC 0x46 -> Node 0 Dec 13 14:23:04.658485 kernel: SRAT: PXM 0 -> APIC 0x48 -> Node 0 Dec 13 14:23:04.658489 kernel: SRAT: PXM 0 -> APIC 0x4a -> Node 0 Dec 13 14:23:04.658494 kernel: SRAT: PXM 0 -> APIC 0x4c -> Node 0 Dec 13 14:23:04.658499 kernel: SRAT: PXM 0 -> APIC 0x4e -> Node 0 Dec 13 14:23:04.658504 kernel: SRAT: PXM 0 -> APIC 0x50 -> Node 0 Dec 13 14:23:04.658508 kernel: SRAT: PXM 0 -> APIC 0x52 -> Node 0 Dec 13 14:23:04.658513 kernel: SRAT: PXM 0 -> APIC 0x54 -> Node 0 Dec 13 14:23:04.658518 kernel: SRAT: PXM 0 -> APIC 0x56 -> Node 0 Dec 13 14:23:04.658523 kernel: SRAT: PXM 0 -> APIC 0x58 -> Node 0 Dec 13 14:23:04.658529 kernel: SRAT: PXM 0 -> APIC 0x5a -> Node 0 Dec 13 14:23:04.658534 kernel: SRAT: PXM 0 -> APIC 0x5c -> Node 0 Dec 13 14:23:04.658539 kernel: SRAT: PXM 0 -> APIC 0x5e -> Node 0 Dec 13 14:23:04.658544 kernel: SRAT: PXM 0 -> APIC 0x60 -> Node 0 Dec 13 14:23:04.658548 kernel: SRAT: PXM 0 -> APIC 0x62 -> Node 0 Dec 13 14:23:04.658553 kernel: SRAT: PXM 0 -> APIC 0x64 -> Node 0 Dec 13 14:23:04.658558 kernel: SRAT: PXM 0 -> APIC 0x66 -> Node 0 Dec 13 14:23:04.658563 kernel: SRAT: PXM 0 -> APIC 0x68 -> Node 0 Dec 13 14:23:04.658568 kernel: SRAT: PXM 0 -> APIC 0x6a -> Node 0 Dec 13 14:23:04.658572 kernel: SRAT: PXM 0 -> APIC 0x6c -> Node 0 Dec 13 14:23:04.658578 kernel: SRAT: PXM 0 -> APIC 0x6e -> Node 0 Dec 13 14:23:04.658583 kernel: SRAT: PXM 0 -> APIC 0x70 -> Node 0 Dec 13 14:23:04.658587 kernel: SRAT: PXM 0 -> APIC 0x72 -> Node 0 Dec 13 14:23:04.658592 kernel: SRAT: PXM 0 -> APIC 0x74 -> Node 0 Dec 13 14:23:04.658597 kernel: SRAT: PXM 0 -> APIC 0x76 -> Node 0 Dec 13 14:23:04.658603 kernel: SRAT: PXM 0 -> APIC 0x78 -> Node 0 Dec 13 14:23:04.658610 kernel: SRAT: PXM 0 -> APIC 0x7a -> Node 0 Dec 13 14:23:04.658616 kernel: SRAT: PXM 0 -> APIC 0x7c -> Node 0 Dec 13 14:23:04.658622 kernel: SRAT: PXM 0 -> APIC 0x7e -> Node 0 Dec 13 14:23:04.658627 kernel: SRAT: PXM 0 -> APIC 0x80 -> Node 0 Dec 13 14:23:04.658633 kernel: SRAT: PXM 0 -> APIC 0x82 -> Node 0 Dec 13 14:23:04.658638 kernel: SRAT: PXM 0 -> APIC 0x84 -> Node 0 Dec 13 14:23:04.658643 kernel: SRAT: PXM 0 -> APIC 0x86 -> Node 0 Dec 13 14:23:04.658648 kernel: SRAT: PXM 0 -> APIC 0x88 -> Node 0 Dec 13 14:23:04.658653 kernel: SRAT: PXM 0 -> APIC 0x8a -> Node 0 Dec 13 14:23:04.658658 kernel: SRAT: PXM 0 -> APIC 0x8c -> Node 0 Dec 13 14:23:04.658663 kernel: SRAT: PXM 0 -> APIC 0x8e -> Node 0 Dec 13 14:23:04.658668 kernel: SRAT: PXM 0 -> APIC 0x90 -> Node 0 Dec 13 14:23:04.658674 kernel: SRAT: PXM 0 -> APIC 0x92 -> Node 0 Dec 13 14:23:04.658680 kernel: SRAT: PXM 0 -> APIC 0x94 -> Node 0 Dec 13 14:23:04.658685 kernel: SRAT: PXM 0 -> APIC 0x96 -> Node 0 Dec 13 14:23:04.658690 kernel: SRAT: PXM 0 -> APIC 0x98 -> Node 0 Dec 13 14:23:04.658695 kernel: SRAT: PXM 0 -> APIC 0x9a -> Node 0 Dec 13 14:23:04.658700 kernel: SRAT: PXM 0 -> APIC 0x9c -> Node 0 Dec 13 14:23:04.658712 kernel: SRAT: PXM 0 -> APIC 0x9e -> Node 0 Dec 13 14:23:04.658717 kernel: SRAT: PXM 0 -> APIC 0xa0 -> Node 0 Dec 13 14:23:04.658722 kernel: SRAT: PXM 0 -> APIC 0xa2 -> Node 0 Dec 13 14:23:04.658727 kernel: SRAT: PXM 0 -> APIC 0xa4 -> Node 0 Dec 13 14:23:04.658734 kernel: SRAT: PXM 0 -> APIC 0xa6 -> Node 0 Dec 13 14:23:04.658739 kernel: SRAT: PXM 0 -> APIC 0xa8 -> Node 0 Dec 13 14:23:04.658744 kernel: SRAT: PXM 0 -> APIC 0xaa -> Node 0 Dec 13 14:23:04.658749 kernel: SRAT: PXM 0 -> APIC 0xac -> Node 0 Dec 13 14:23:04.658754 kernel: SRAT: PXM 0 -> APIC 0xae -> Node 0 Dec 13 14:23:04.658760 kernel: SRAT: PXM 0 -> APIC 0xb0 -> Node 0 Dec 13 14:23:04.658765 kernel: SRAT: PXM 0 -> APIC 0xb2 -> Node 0 Dec 13 14:23:04.658770 kernel: SRAT: PXM 0 -> APIC 0xb4 -> Node 0 Dec 13 14:23:04.658775 kernel: SRAT: PXM 0 -> APIC 0xb6 -> Node 0 Dec 13 14:23:04.658781 kernel: SRAT: PXM 0 -> APIC 0xb8 -> Node 0 Dec 13 14:23:04.658786 kernel: SRAT: PXM 0 -> APIC 0xba -> Node 0 Dec 13 14:23:04.658791 kernel: SRAT: PXM 0 -> APIC 0xbc -> Node 0 Dec 13 14:23:04.658796 kernel: SRAT: PXM 0 -> APIC 0xbe -> Node 0 Dec 13 14:23:04.658801 kernel: SRAT: PXM 0 -> APIC 0xc0 -> Node 0 Dec 13 14:23:04.658806 kernel: SRAT: PXM 0 -> APIC 0xc2 -> Node 0 Dec 13 14:23:04.658812 kernel: SRAT: PXM 0 -> APIC 0xc4 -> Node 0 Dec 13 14:23:04.658817 kernel: SRAT: PXM 0 -> APIC 0xc6 -> Node 0 Dec 13 14:23:04.658822 kernel: SRAT: PXM 0 -> APIC 0xc8 -> Node 0 Dec 13 14:23:04.658827 kernel: SRAT: PXM 0 -> APIC 0xca -> Node 0 Dec 13 14:23:04.658833 kernel: SRAT: PXM 0 -> APIC 0xcc -> Node 0 Dec 13 14:23:04.658838 kernel: SRAT: PXM 0 -> APIC 0xce -> Node 0 Dec 13 14:23:04.658843 kernel: SRAT: PXM 0 -> APIC 0xd0 -> Node 0 Dec 13 14:23:04.658848 kernel: SRAT: PXM 0 -> APIC 0xd2 -> Node 0 Dec 13 14:23:04.658853 kernel: SRAT: PXM 0 -> APIC 0xd4 -> Node 0 Dec 13 14:23:04.658858 kernel: SRAT: PXM 0 -> APIC 0xd6 -> Node 0 Dec 13 14:23:04.658863 kernel: SRAT: PXM 0 -> APIC 0xd8 -> Node 0 Dec 13 14:23:04.658868 kernel: SRAT: PXM 0 -> APIC 0xda -> Node 0 Dec 13 14:23:04.658874 kernel: SRAT: PXM 0 -> APIC 0xdc -> Node 0 Dec 13 14:23:04.658879 kernel: SRAT: PXM 0 -> APIC 0xde -> Node 0 Dec 13 14:23:04.658885 kernel: SRAT: PXM 0 -> APIC 0xe0 -> Node 0 Dec 13 14:23:04.658890 kernel: SRAT: PXM 0 -> APIC 0xe2 -> Node 0 Dec 13 14:23:04.658895 kernel: SRAT: PXM 0 -> APIC 0xe4 -> Node 0 Dec 13 14:23:04.658900 kernel: SRAT: PXM 0 -> APIC 0xe6 -> Node 0 Dec 13 14:23:04.658905 kernel: SRAT: PXM 0 -> APIC 0xe8 -> Node 0 Dec 13 14:23:04.658910 kernel: SRAT: PXM 0 -> APIC 0xea -> Node 0 Dec 13 14:23:04.658916 kernel: SRAT: PXM 0 -> APIC 0xec -> Node 0 Dec 13 14:23:04.658921 kernel: SRAT: PXM 0 -> APIC 0xee -> Node 0 Dec 13 14:23:04.658926 kernel: SRAT: PXM 0 -> APIC 0xf0 -> Node 0 Dec 13 14:23:04.658931 kernel: SRAT: PXM 0 -> APIC 0xf2 -> Node 0 Dec 13 14:23:04.658937 kernel: SRAT: PXM 0 -> APIC 0xf4 -> Node 0 Dec 13 14:23:04.658942 kernel: SRAT: PXM 0 -> APIC 0xf6 -> Node 0 Dec 13 14:23:04.658947 kernel: SRAT: PXM 0 -> APIC 0xf8 -> Node 0 Dec 13 14:23:04.658953 kernel: SRAT: PXM 0 -> APIC 0xfa -> Node 0 Dec 13 14:23:04.658958 kernel: SRAT: PXM 0 -> APIC 0xfc -> Node 0 Dec 13 14:23:04.658963 kernel: SRAT: PXM 0 -> APIC 0xfe -> Node 0 Dec 13 14:23:04.658968 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Dec 13 14:23:04.658973 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Dec 13 14:23:04.658978 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000-0xbfffffff] hotplug Dec 13 14:23:04.658984 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7fffffff] -> [mem 0x00000000-0x7fffffff] Dec 13 14:23:04.658990 kernel: NODE_DATA(0) allocated [mem 0x7fffa000-0x7fffffff] Dec 13 14:23:04.658995 kernel: Zone ranges: Dec 13 14:23:04.659000 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 14:23:04.659006 kernel: DMA32 [mem 0x0000000001000000-0x000000007fffffff] Dec 13 14:23:04.659011 kernel: Normal empty Dec 13 14:23:04.659016 kernel: Movable zone start for each node Dec 13 14:23:04.659021 kernel: Early memory node ranges Dec 13 14:23:04.659027 kernel: node 0: [mem 0x0000000000001000-0x000000000009dfff] Dec 13 14:23:04.659032 kernel: node 0: [mem 0x0000000000100000-0x000000007fedffff] Dec 13 14:23:04.659038 kernel: node 0: [mem 0x000000007ff00000-0x000000007fffffff] Dec 13 14:23:04.659043 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007fffffff] Dec 13 14:23:04.659048 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:23:04.659053 kernel: On node 0, zone DMA: 98 pages in unavailable ranges Dec 13 14:23:04.659059 kernel: On node 0, zone DMA32: 32 pages in unavailable ranges Dec 13 14:23:04.659064 kernel: ACPI: PM-Timer IO Port: 0x1008 Dec 13 14:23:04.659069 kernel: system APIC only can use physical flat Dec 13 14:23:04.659074 kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) Dec 13 14:23:04.659079 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Dec 13 14:23:04.659085 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Dec 13 14:23:04.659091 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Dec 13 14:23:04.659096 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Dec 13 14:23:04.659101 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Dec 13 14:23:04.659106 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Dec 13 14:23:04.659111 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Dec 13 14:23:04.659116 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Dec 13 14:23:04.659121 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Dec 13 14:23:04.659126 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Dec 13 14:23:04.659132 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Dec 13 14:23:04.659139 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Dec 13 14:23:04.659144 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Dec 13 14:23:04.659149 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Dec 13 14:23:04.659154 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Dec 13 14:23:04.659159 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Dec 13 14:23:04.659164 kernel: ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1]) Dec 13 14:23:04.659169 kernel: ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1]) Dec 13 14:23:04.659174 kernel: ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1]) Dec 13 14:23:04.659180 kernel: ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1]) Dec 13 14:23:04.659186 kernel: ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1]) Dec 13 14:23:04.659191 kernel: ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1]) Dec 13 14:23:04.659196 kernel: ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1]) Dec 13 14:23:04.659201 kernel: ACPI: LAPIC_NMI (acpi_id[0x18] high edge lint[0x1]) Dec 13 14:23:04.659206 kernel: ACPI: LAPIC_NMI (acpi_id[0x19] high edge lint[0x1]) Dec 13 14:23:04.659212 kernel: ACPI: LAPIC_NMI (acpi_id[0x1a] high edge lint[0x1]) Dec 13 14:23:04.659217 kernel: ACPI: LAPIC_NMI (acpi_id[0x1b] high edge lint[0x1]) Dec 13 14:23:04.659222 kernel: ACPI: LAPIC_NMI (acpi_id[0x1c] high edge lint[0x1]) Dec 13 14:23:04.659227 kernel: ACPI: LAPIC_NMI (acpi_id[0x1d] high edge lint[0x1]) Dec 13 14:23:04.659232 kernel: ACPI: LAPIC_NMI (acpi_id[0x1e] high edge lint[0x1]) Dec 13 14:23:04.659238 kernel: ACPI: LAPIC_NMI (acpi_id[0x1f] high edge lint[0x1]) Dec 13 14:23:04.659244 kernel: ACPI: LAPIC_NMI (acpi_id[0x20] high edge lint[0x1]) Dec 13 14:23:04.659249 kernel: ACPI: LAPIC_NMI (acpi_id[0x21] high edge lint[0x1]) Dec 13 14:23:04.659254 kernel: ACPI: LAPIC_NMI (acpi_id[0x22] high edge lint[0x1]) Dec 13 14:23:04.659259 kernel: ACPI: LAPIC_NMI (acpi_id[0x23] high edge lint[0x1]) Dec 13 14:23:04.659264 kernel: ACPI: LAPIC_NMI (acpi_id[0x24] high edge lint[0x1]) Dec 13 14:23:04.659269 kernel: ACPI: LAPIC_NMI (acpi_id[0x25] high edge lint[0x1]) Dec 13 14:23:04.659274 kernel: ACPI: LAPIC_NMI (acpi_id[0x26] high edge lint[0x1]) Dec 13 14:23:04.659280 kernel: ACPI: LAPIC_NMI (acpi_id[0x27] high edge lint[0x1]) Dec 13 14:23:04.659286 kernel: ACPI: LAPIC_NMI (acpi_id[0x28] high edge lint[0x1]) Dec 13 14:23:04.659291 kernel: ACPI: LAPIC_NMI (acpi_id[0x29] high edge lint[0x1]) Dec 13 14:23:04.659296 kernel: ACPI: LAPIC_NMI (acpi_id[0x2a] high edge lint[0x1]) Dec 13 14:23:04.659301 kernel: ACPI: LAPIC_NMI (acpi_id[0x2b] high edge lint[0x1]) Dec 13 14:23:04.659307 kernel: ACPI: LAPIC_NMI (acpi_id[0x2c] high edge lint[0x1]) Dec 13 14:23:04.659312 kernel: ACPI: LAPIC_NMI (acpi_id[0x2d] high edge lint[0x1]) Dec 13 14:23:04.659317 kernel: ACPI: LAPIC_NMI (acpi_id[0x2e] high edge lint[0x1]) Dec 13 14:23:04.659322 kernel: ACPI: LAPIC_NMI (acpi_id[0x2f] high edge lint[0x1]) Dec 13 14:23:04.659327 kernel: ACPI: LAPIC_NMI (acpi_id[0x30] high edge lint[0x1]) Dec 13 14:23:04.659333 kernel: ACPI: LAPIC_NMI (acpi_id[0x31] high edge lint[0x1]) Dec 13 14:23:04.659339 kernel: ACPI: LAPIC_NMI (acpi_id[0x32] high edge lint[0x1]) Dec 13 14:23:04.659344 kernel: ACPI: LAPIC_NMI (acpi_id[0x33] high edge lint[0x1]) Dec 13 14:23:04.659349 kernel: ACPI: LAPIC_NMI (acpi_id[0x34] high edge lint[0x1]) Dec 13 14:23:04.659354 kernel: ACPI: LAPIC_NMI (acpi_id[0x35] high edge lint[0x1]) Dec 13 14:23:04.659359 kernel: ACPI: LAPIC_NMI (acpi_id[0x36] high edge lint[0x1]) Dec 13 14:23:04.659364 kernel: ACPI: LAPIC_NMI (acpi_id[0x37] high edge lint[0x1]) Dec 13 14:23:04.659370 kernel: ACPI: LAPIC_NMI (acpi_id[0x38] high edge lint[0x1]) Dec 13 14:23:04.659375 kernel: ACPI: LAPIC_NMI (acpi_id[0x39] high edge lint[0x1]) Dec 13 14:23:04.659380 kernel: ACPI: LAPIC_NMI (acpi_id[0x3a] high edge lint[0x1]) Dec 13 14:23:04.659386 kernel: ACPI: LAPIC_NMI (acpi_id[0x3b] high edge lint[0x1]) Dec 13 14:23:04.659391 kernel: ACPI: LAPIC_NMI (acpi_id[0x3c] high edge lint[0x1]) Dec 13 14:23:04.659396 kernel: ACPI: LAPIC_NMI (acpi_id[0x3d] high edge lint[0x1]) Dec 13 14:23:04.659401 kernel: ACPI: LAPIC_NMI (acpi_id[0x3e] high edge lint[0x1]) Dec 13 14:23:04.659406 kernel: ACPI: LAPIC_NMI (acpi_id[0x3f] high edge lint[0x1]) Dec 13 14:23:04.659411 kernel: ACPI: LAPIC_NMI (acpi_id[0x40] high edge lint[0x1]) Dec 13 14:23:04.659417 kernel: ACPI: LAPIC_NMI (acpi_id[0x41] high edge lint[0x1]) Dec 13 14:23:04.659422 kernel: ACPI: LAPIC_NMI (acpi_id[0x42] high edge lint[0x1]) Dec 13 14:23:04.659427 kernel: ACPI: LAPIC_NMI (acpi_id[0x43] high edge lint[0x1]) Dec 13 14:23:04.659433 kernel: ACPI: LAPIC_NMI (acpi_id[0x44] high edge lint[0x1]) Dec 13 14:23:04.659438 kernel: ACPI: LAPIC_NMI (acpi_id[0x45] high edge lint[0x1]) Dec 13 14:23:04.659443 kernel: ACPI: LAPIC_NMI (acpi_id[0x46] high edge lint[0x1]) Dec 13 14:23:04.659448 kernel: ACPI: LAPIC_NMI (acpi_id[0x47] high edge lint[0x1]) Dec 13 14:23:04.659454 kernel: ACPI: LAPIC_NMI (acpi_id[0x48] high edge lint[0x1]) Dec 13 14:23:04.659459 kernel: ACPI: LAPIC_NMI (acpi_id[0x49] high edge lint[0x1]) Dec 13 14:23:04.659464 kernel: ACPI: LAPIC_NMI (acpi_id[0x4a] high edge lint[0x1]) Dec 13 14:23:04.659469 kernel: ACPI: LAPIC_NMI (acpi_id[0x4b] high edge lint[0x1]) Dec 13 14:23:04.659474 kernel: ACPI: LAPIC_NMI (acpi_id[0x4c] high edge lint[0x1]) Dec 13 14:23:04.659479 kernel: ACPI: LAPIC_NMI (acpi_id[0x4d] high edge lint[0x1]) Dec 13 14:23:04.659486 kernel: ACPI: LAPIC_NMI (acpi_id[0x4e] high edge lint[0x1]) Dec 13 14:23:04.659491 kernel: ACPI: LAPIC_NMI (acpi_id[0x4f] high edge lint[0x1]) Dec 13 14:23:04.659496 kernel: ACPI: LAPIC_NMI (acpi_id[0x50] high edge lint[0x1]) Dec 13 14:23:04.659501 kernel: ACPI: LAPIC_NMI (acpi_id[0x51] high edge lint[0x1]) Dec 13 14:23:04.659506 kernel: ACPI: LAPIC_NMI (acpi_id[0x52] high edge lint[0x1]) Dec 13 14:23:04.659511 kernel: ACPI: LAPIC_NMI (acpi_id[0x53] high edge lint[0x1]) Dec 13 14:23:04.659517 kernel: ACPI: LAPIC_NMI (acpi_id[0x54] high edge lint[0x1]) Dec 13 14:23:04.659522 kernel: ACPI: LAPIC_NMI (acpi_id[0x55] high edge lint[0x1]) Dec 13 14:23:04.659527 kernel: ACPI: LAPIC_NMI (acpi_id[0x56] high edge lint[0x1]) Dec 13 14:23:04.659533 kernel: ACPI: LAPIC_NMI (acpi_id[0x57] high edge lint[0x1]) Dec 13 14:23:04.659538 kernel: ACPI: LAPIC_NMI (acpi_id[0x58] high edge lint[0x1]) Dec 13 14:23:04.659543 kernel: ACPI: LAPIC_NMI (acpi_id[0x59] high edge lint[0x1]) Dec 13 14:23:04.659549 kernel: ACPI: LAPIC_NMI (acpi_id[0x5a] high edge lint[0x1]) Dec 13 14:23:04.659554 kernel: ACPI: LAPIC_NMI (acpi_id[0x5b] high edge lint[0x1]) Dec 13 14:23:04.659559 kernel: ACPI: LAPIC_NMI (acpi_id[0x5c] high edge lint[0x1]) Dec 13 14:23:04.659564 kernel: ACPI: LAPIC_NMI (acpi_id[0x5d] high edge lint[0x1]) Dec 13 14:23:04.659569 kernel: ACPI: LAPIC_NMI (acpi_id[0x5e] high edge lint[0x1]) Dec 13 14:23:04.659574 kernel: ACPI: LAPIC_NMI (acpi_id[0x5f] high edge lint[0x1]) Dec 13 14:23:04.659580 kernel: ACPI: LAPIC_NMI (acpi_id[0x60] high edge lint[0x1]) Dec 13 14:23:04.659586 kernel: ACPI: LAPIC_NMI (acpi_id[0x61] high edge lint[0x1]) Dec 13 14:23:04.659591 kernel: ACPI: LAPIC_NMI (acpi_id[0x62] high edge lint[0x1]) Dec 13 14:23:04.659597 kernel: ACPI: LAPIC_NMI (acpi_id[0x63] high edge lint[0x1]) Dec 13 14:23:04.659602 kernel: ACPI: LAPIC_NMI (acpi_id[0x64] high edge lint[0x1]) Dec 13 14:23:04.659607 kernel: ACPI: LAPIC_NMI (acpi_id[0x65] high edge lint[0x1]) Dec 13 14:23:04.659612 kernel: ACPI: LAPIC_NMI (acpi_id[0x66] high edge lint[0x1]) Dec 13 14:23:04.659617 kernel: ACPI: LAPIC_NMI (acpi_id[0x67] high edge lint[0x1]) Dec 13 14:23:04.659623 kernel: ACPI: LAPIC_NMI (acpi_id[0x68] high edge lint[0x1]) Dec 13 14:23:04.659628 kernel: ACPI: LAPIC_NMI (acpi_id[0x69] high edge lint[0x1]) Dec 13 14:23:04.659634 kernel: ACPI: LAPIC_NMI (acpi_id[0x6a] high edge lint[0x1]) Dec 13 14:23:04.659639 kernel: ACPI: LAPIC_NMI (acpi_id[0x6b] high edge lint[0x1]) Dec 13 14:23:04.659644 kernel: ACPI: LAPIC_NMI (acpi_id[0x6c] high edge lint[0x1]) Dec 13 14:23:04.659650 kernel: ACPI: LAPIC_NMI (acpi_id[0x6d] high edge lint[0x1]) Dec 13 14:23:04.659655 kernel: ACPI: LAPIC_NMI (acpi_id[0x6e] high edge lint[0x1]) Dec 13 14:23:04.659660 kernel: ACPI: LAPIC_NMI (acpi_id[0x6f] high edge lint[0x1]) Dec 13 14:23:04.659665 kernel: ACPI: LAPIC_NMI (acpi_id[0x70] high edge lint[0x1]) Dec 13 14:23:04.659670 kernel: ACPI: LAPIC_NMI (acpi_id[0x71] high edge lint[0x1]) Dec 13 14:23:04.659675 kernel: ACPI: LAPIC_NMI (acpi_id[0x72] high edge lint[0x1]) Dec 13 14:23:04.659680 kernel: ACPI: LAPIC_NMI (acpi_id[0x73] high edge lint[0x1]) Dec 13 14:23:04.659687 kernel: ACPI: LAPIC_NMI (acpi_id[0x74] high edge lint[0x1]) Dec 13 14:23:04.659692 kernel: ACPI: LAPIC_NMI (acpi_id[0x75] high edge lint[0x1]) Dec 13 14:23:04.659697 kernel: ACPI: LAPIC_NMI (acpi_id[0x76] high edge lint[0x1]) Dec 13 14:23:04.659708 kernel: ACPI: LAPIC_NMI (acpi_id[0x77] high edge lint[0x1]) Dec 13 14:23:04.659715 kernel: ACPI: LAPIC_NMI (acpi_id[0x78] high edge lint[0x1]) Dec 13 14:23:04.659720 kernel: ACPI: LAPIC_NMI (acpi_id[0x79] high edge lint[0x1]) Dec 13 14:23:04.659725 kernel: ACPI: LAPIC_NMI (acpi_id[0x7a] high edge lint[0x1]) Dec 13 14:23:04.659730 kernel: ACPI: LAPIC_NMI (acpi_id[0x7b] high edge lint[0x1]) Dec 13 14:23:04.659736 kernel: ACPI: LAPIC_NMI (acpi_id[0x7c] high edge lint[0x1]) Dec 13 14:23:04.659742 kernel: ACPI: LAPIC_NMI (acpi_id[0x7d] high edge lint[0x1]) Dec 13 14:23:04.659747 kernel: ACPI: LAPIC_NMI (acpi_id[0x7e] high edge lint[0x1]) Dec 13 14:23:04.659752 kernel: ACPI: LAPIC_NMI (acpi_id[0x7f] high edge lint[0x1]) Dec 13 14:23:04.659758 kernel: IOAPIC[0]: apic_id 1, version 17, address 0xfec00000, GSI 0-23 Dec 13 14:23:04.659763 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 high edge) Dec 13 14:23:04.659768 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 14:23:04.659774 kernel: ACPI: HPET id: 0x8086af01 base: 0xfed00000 Dec 13 14:23:04.659779 kernel: TSC deadline timer available Dec 13 14:23:04.659784 kernel: smpboot: Allowing 128 CPUs, 126 hotplug CPUs Dec 13 14:23:04.659790 kernel: [mem 0x80000000-0xefffffff] available for PCI devices Dec 13 14:23:04.659796 kernel: Booting paravirtualized kernel on VMware hypervisor Dec 13 14:23:04.659801 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 14:23:04.659806 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:128 nr_node_ids:1 Dec 13 14:23:04.659812 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Dec 13 14:23:04.659817 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Dec 13 14:23:04.659822 kernel: pcpu-alloc: [0] 000 001 002 003 004 005 006 007 Dec 13 14:23:04.659828 kernel: pcpu-alloc: [0] 008 009 010 011 012 013 014 015 Dec 13 14:23:04.659833 kernel: pcpu-alloc: [0] 016 017 018 019 020 021 022 023 Dec 13 14:23:04.659839 kernel: pcpu-alloc: [0] 024 025 026 027 028 029 030 031 Dec 13 14:23:04.659844 kernel: pcpu-alloc: [0] 032 033 034 035 036 037 038 039 Dec 13 14:23:04.659849 kernel: pcpu-alloc: [0] 040 041 042 043 044 045 046 047 Dec 13 14:23:04.659854 kernel: pcpu-alloc: [0] 048 049 050 051 052 053 054 055 Dec 13 14:23:04.659866 kernel: pcpu-alloc: [0] 056 057 058 059 060 061 062 063 Dec 13 14:23:04.659873 kernel: pcpu-alloc: [0] 064 065 066 067 068 069 070 071 Dec 13 14:23:04.659878 kernel: pcpu-alloc: [0] 072 073 074 075 076 077 078 079 Dec 13 14:23:04.659884 kernel: pcpu-alloc: [0] 080 081 082 083 084 085 086 087 Dec 13 14:23:04.659889 kernel: pcpu-alloc: [0] 088 089 090 091 092 093 094 095 Dec 13 14:23:04.659896 kernel: pcpu-alloc: [0] 096 097 098 099 100 101 102 103 Dec 13 14:23:04.659902 kernel: pcpu-alloc: [0] 104 105 106 107 108 109 110 111 Dec 13 14:23:04.659907 kernel: pcpu-alloc: [0] 112 113 114 115 116 117 118 119 Dec 13 14:23:04.659913 kernel: pcpu-alloc: [0] 120 121 122 123 124 125 126 127 Dec 13 14:23:04.659918 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515808 Dec 13 14:23:04.659924 kernel: Policy zone: DMA32 Dec 13 14:23:04.659930 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:23:04.659936 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:23:04.659943 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes Dec 13 14:23:04.659948 kernel: printk: log_buf_len total cpu_extra contributions: 520192 bytes Dec 13 14:23:04.659954 kernel: printk: log_buf_len min size: 262144 bytes Dec 13 14:23:04.659959 kernel: printk: log_buf_len: 1048576 bytes Dec 13 14:23:04.659965 kernel: printk: early log buf free: 239728(91%) Dec 13 14:23:04.659971 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 14:23:04.659976 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 14:23:04.659982 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:23:04.659988 kernel: Memory: 1940392K/2096628K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 155976K reserved, 0K cma-reserved) Dec 13 14:23:04.659994 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=128, Nodes=1 Dec 13 14:23:04.660000 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 14:23:04.660006 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 14:23:04.660016 kernel: rcu: Hierarchical RCU implementation. Dec 13 14:23:04.660022 kernel: rcu: RCU event tracing is enabled. Dec 13 14:23:04.660029 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=128. Dec 13 14:23:04.660035 kernel: Rude variant of Tasks RCU enabled. Dec 13 14:23:04.660040 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:23:04.660046 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:23:04.660052 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=128 Dec 13 14:23:04.660058 kernel: NR_IRQS: 33024, nr_irqs: 1448, preallocated irqs: 16 Dec 13 14:23:04.660063 kernel: random: crng init done Dec 13 14:23:04.660069 kernel: Console: colour VGA+ 80x25 Dec 13 14:23:04.660074 kernel: printk: console [tty0] enabled Dec 13 14:23:04.660080 kernel: printk: console [ttyS0] enabled Dec 13 14:23:04.660086 kernel: ACPI: Core revision 20210730 Dec 13 14:23:04.660092 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns Dec 13 14:23:04.660098 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 14:23:04.660104 kernel: x2apic enabled Dec 13 14:23:04.660109 kernel: Switched APIC routing to physical x2apic. Dec 13 14:23:04.660115 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Dec 13 14:23:04.660121 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Dec 13 14:23:04.660126 kernel: Calibrating delay loop (skipped) preset value.. 6816.00 BogoMIPS (lpj=3408000) Dec 13 14:23:04.660132 kernel: Disabled fast string operations Dec 13 14:23:04.660138 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Dec 13 14:23:04.660144 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Dec 13 14:23:04.660150 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 14:23:04.660155 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Dec 13 14:23:04.660161 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Dec 13 14:23:04.660167 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Dec 13 14:23:04.660172 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Dec 13 14:23:04.660178 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 14:23:04.660185 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Dec 13 14:23:04.660190 kernel: RETBleed: Mitigation: Enhanced IBRS Dec 13 14:23:04.660196 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 14:23:04.660202 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 14:23:04.660207 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 14:23:04.660213 kernel: SRBDS: Unknown: Dependent on hypervisor status Dec 13 14:23:04.660219 kernel: GDS: Unknown: Dependent on hypervisor status Dec 13 14:23:04.660224 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 14:23:04.660230 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 14:23:04.660236 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 14:23:04.660242 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 14:23:04.660248 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Dec 13 14:23:04.660253 kernel: Freeing SMP alternatives memory: 32K Dec 13 14:23:04.660259 kernel: pid_max: default: 131072 minimum: 1024 Dec 13 14:23:04.660265 kernel: LSM: Security Framework initializing Dec 13 14:23:04.660271 kernel: SELinux: Initializing. Dec 13 14:23:04.660276 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 14:23:04.660282 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 14:23:04.660290 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Dec 13 14:23:04.660296 kernel: Performance Events: Skylake events, core PMU driver. Dec 13 14:23:04.660301 kernel: core: CPUID marked event: 'cpu cycles' unavailable Dec 13 14:23:04.660307 kernel: core: CPUID marked event: 'instructions' unavailable Dec 13 14:23:04.660313 kernel: core: CPUID marked event: 'bus cycles' unavailable Dec 13 14:23:04.660318 kernel: core: CPUID marked event: 'cache references' unavailable Dec 13 14:23:04.660324 kernel: core: CPUID marked event: 'cache misses' unavailable Dec 13 14:23:04.660329 kernel: core: CPUID marked event: 'branch instructions' unavailable Dec 13 14:23:04.660335 kernel: core: CPUID marked event: 'branch misses' unavailable Dec 13 14:23:04.660341 kernel: ... version: 1 Dec 13 14:23:04.660347 kernel: ... bit width: 48 Dec 13 14:23:04.660352 kernel: ... generic registers: 4 Dec 13 14:23:04.660358 kernel: ... value mask: 0000ffffffffffff Dec 13 14:23:04.660364 kernel: ... max period: 000000007fffffff Dec 13 14:23:04.660369 kernel: ... fixed-purpose events: 0 Dec 13 14:23:04.660375 kernel: ... event mask: 000000000000000f Dec 13 14:23:04.660380 kernel: signal: max sigframe size: 1776 Dec 13 14:23:04.660386 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:23:04.660393 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 14:23:04.660399 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:23:04.660404 kernel: x86: Booting SMP configuration: Dec 13 14:23:04.660410 kernel: .... node #0, CPUs: #1 Dec 13 14:23:04.660415 kernel: Disabled fast string operations Dec 13 14:23:04.660421 kernel: smpboot: CPU 1 Converting physical 2 to logical package 1 Dec 13 14:23:04.660426 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Dec 13 14:23:04.660432 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:23:04.660437 kernel: smpboot: Max logical packages: 128 Dec 13 14:23:04.660443 kernel: smpboot: Total of 2 processors activated (13632.00 BogoMIPS) Dec 13 14:23:04.660449 kernel: devtmpfs: initialized Dec 13 14:23:04.660455 kernel: x86/mm: Memory block size: 128MB Dec 13 14:23:04.660461 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7feff000-0x7fefffff] (4096 bytes) Dec 13 14:23:04.660466 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:23:04.660472 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) Dec 13 14:23:04.660478 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:23:04.660483 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:23:04.660489 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:23:04.660496 kernel: audit: type=2000 audit(1734099782.059:1): state=initialized audit_enabled=0 res=1 Dec 13 14:23:04.660501 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:23:04.660507 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 14:23:04.660512 kernel: cpuidle: using governor menu Dec 13 14:23:04.660518 kernel: Simple Boot Flag at 0x36 set to 0x80 Dec 13 14:23:04.660523 kernel: ACPI: bus type PCI registered Dec 13 14:23:04.660529 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:23:04.660535 kernel: dca service started, version 1.12.1 Dec 13 14:23:04.660540 kernel: PCI: MMCONFIG for domain 0000 [bus 00-7f] at [mem 0xf0000000-0xf7ffffff] (base 0xf0000000) Dec 13 14:23:04.660546 kernel: PCI: MMCONFIG at [mem 0xf0000000-0xf7ffffff] reserved in E820 Dec 13 14:23:04.660553 kernel: PCI: Using configuration type 1 for base access Dec 13 14:23:04.660558 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 14:23:04.660564 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:23:04.660570 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:23:04.660575 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:23:04.660581 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:23:04.660586 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:23:04.660592 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:23:04.660597 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:23:04.660604 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:23:04.660610 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:23:04.660615 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 14:23:04.660621 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Dec 13 14:23:04.660627 kernel: ACPI: Interpreter enabled Dec 13 14:23:04.660633 kernel: ACPI: PM: (supports S0 S1 S5) Dec 13 14:23:04.660639 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 14:23:04.660644 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 14:23:04.660650 kernel: ACPI: Enabled 4 GPEs in block 00 to 0F Dec 13 14:23:04.660657 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-7f]) Dec 13 14:23:04.660741 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:23:04.660793 kernel: acpi PNP0A03:00: _OSC: platform does not support [AER LTR] Dec 13 14:23:04.660841 kernel: acpi PNP0A03:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] Dec 13 14:23:04.660849 kernel: PCI host bridge to bus 0000:00 Dec 13 14:23:04.660899 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 14:23:04.660944 kernel: pci_bus 0000:00: root bus resource [mem 0x000cc000-0x000cffff window] Dec 13 14:23:04.660985 kernel: pci_bus 0000:00: root bus resource [mem 0x000d0000-0x000d3fff window] Dec 13 14:23:04.661025 kernel: pci_bus 0000:00: root bus resource [mem 0x000d4000-0x000d7fff window] Dec 13 14:23:04.661065 kernel: pci_bus 0000:00: root bus resource [mem 0x000d8000-0x000dbfff window] Dec 13 14:23:04.661105 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 13 14:23:04.661146 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 14:23:04.661187 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xfeff window] Dec 13 14:23:04.661230 kernel: pci_bus 0000:00: root bus resource [bus 00-7f] Dec 13 14:23:04.661283 kernel: pci 0000:00:00.0: [8086:7190] type 00 class 0x060000 Dec 13 14:23:04.661337 kernel: pci 0000:00:01.0: [8086:7191] type 01 class 0x060400 Dec 13 14:23:04.661388 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100 Dec 13 14:23:04.661445 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x01018a Dec 13 14:23:04.661493 kernel: pci 0000:00:07.1: reg 0x20: [io 0x1060-0x106f] Dec 13 14:23:04.661543 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Dec 13 14:23:04.661590 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Dec 13 14:23:04.661636 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Dec 13 14:23:04.661681 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Dec 13 14:23:04.661744 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000 Dec 13 14:23:04.661793 kernel: pci 0000:00:07.3: quirk: [io 0x1000-0x103f] claimed by PIIX4 ACPI Dec 13 14:23:04.661840 kernel: pci 0000:00:07.3: quirk: [io 0x1040-0x104f] claimed by PIIX4 SMB Dec 13 14:23:04.661892 kernel: pci 0000:00:07.7: [15ad:0740] type 00 class 0x088000 Dec 13 14:23:04.661939 kernel: pci 0000:00:07.7: reg 0x10: [io 0x1080-0x10bf] Dec 13 14:23:04.661985 kernel: pci 0000:00:07.7: reg 0x14: [mem 0xfebfe000-0xfebfffff 64bit] Dec 13 14:23:04.662035 kernel: pci 0000:00:0f.0: [15ad:0405] type 00 class 0x030000 Dec 13 14:23:04.662082 kernel: pci 0000:00:0f.0: reg 0x10: [io 0x1070-0x107f] Dec 13 14:23:04.662128 kernel: pci 0000:00:0f.0: reg 0x14: [mem 0xe8000000-0xefffffff pref] Dec 13 14:23:04.662175 kernel: pci 0000:00:0f.0: reg 0x18: [mem 0xfe000000-0xfe7fffff] Dec 13 14:23:04.662223 kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x00007fff pref] Dec 13 14:23:04.662268 kernel: pci 0000:00:0f.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 14:23:04.662318 kernel: pci 0000:00:11.0: [15ad:0790] type 01 class 0x060401 Dec 13 14:23:04.662370 kernel: pci 0000:00:15.0: [15ad:07a0] type 01 class 0x060400 Dec 13 14:23:04.662418 kernel: pci 0000:00:15.0: PME# supported from D0 D3hot D3cold Dec 13 14:23:04.662468 kernel: pci 0000:00:15.1: [15ad:07a0] type 01 class 0x060400 Dec 13 14:23:04.662517 kernel: pci 0000:00:15.1: PME# supported from D0 D3hot D3cold Dec 13 14:23:04.662571 kernel: pci 0000:00:15.2: [15ad:07a0] type 01 class 0x060400 Dec 13 14:23:04.662618 kernel: pci 0000:00:15.2: PME# supported from D0 D3hot D3cold Dec 13 14:23:04.662669 kernel: pci 0000:00:15.3: [15ad:07a0] type 01 class 0x060400 Dec 13 14:23:04.668915 kernel: pci 0000:00:15.3: PME# supported from D0 D3hot D3cold Dec 13 14:23:04.668989 kernel: pci 0000:00:15.4: [15ad:07a0] type 01 class 0x060400 Dec 13 14:23:04.669044 kernel: pci 0000:00:15.4: PME# supported from D0 D3hot D3cold Dec 13 14:23:04.669097 kernel: pci 0000:00:15.5: [15ad:07a0] type 01 class 0x060400 Dec 13 14:23:04.669146 kernel: pci 0000:00:15.5: PME# supported from D0 D3hot D3cold Dec 13 14:23:04.669198 kernel: pci 0000:00:15.6: [15ad:07a0] type 01 class 0x060400 Dec 13 14:23:04.669247 kernel: pci 0000:00:15.6: PME# supported from D0 D3hot D3cold Dec 13 14:23:04.669299 kernel: pci 0000:00:15.7: [15ad:07a0] type 01 class 0x060400 Dec 13 14:23:04.669347 kernel: pci 0000:00:15.7: PME# supported from D0 D3hot D3cold Dec 13 14:23:04.669400 kernel: pci 0000:00:16.0: [15ad:07a0] type 01 class 0x060400 Dec 13 14:23:04.669448 kernel: pci 0000:00:16.0: PME# supported from D0 D3hot D3cold Dec 13 14:23:04.669500 kernel: pci 0000:00:16.1: [15ad:07a0] type 01 class 0x060400 Dec 13 14:23:04.669549 kernel: pci 0000:00:16.1: PME# supported from D0 D3hot D3cold Dec 13 14:23:04.669602 kernel: pci 0000:00:16.2: [15ad:07a0] type 01 class 0x060400 Dec 13 14:23:04.669652 kernel: pci 0000:00:16.2: PME# supported from D0 D3hot D3cold Dec 13 14:23:04.669768 kernel: pci 0000:00:16.3: [15ad:07a0] type 01 class 0x060400 Dec 13 14:23:04.669825 kernel: pci 0000:00:16.3: PME# supported from D0 D3hot D3cold Dec 13 14:23:04.669877 kernel: pci 0000:00:16.4: [15ad:07a0] type 01 class 0x060400 Dec 13 14:23:04.669923 kernel: pci 0000:00:16.4: PME# supported from D0 D3hot D3cold Dec 13 14:23:04.669974 kernel: pci 0000:00:16.5: [15ad:07a0] type 01 class 0x060400 Dec 13 14:23:04.670024 kernel: pci 0000:00:16.5: PME# supported from D0 D3hot D3cold Dec 13 14:23:04.670075 kernel: pci 0000:00:16.6: [15ad:07a0] type 01 class 0x060400 Dec 13 14:23:04.670123 kernel: pci 0000:00:16.6: PME# supported from D0 D3hot D3cold Dec 13 14:23:04.670174 kernel: pci 0000:00:16.7: [15ad:07a0] type 01 class 0x060400 Dec 13 14:23:04.670222 kernel: pci 0000:00:16.7: PME# supported from D0 D3hot D3cold Dec 13 14:23:04.670509 kernel: pci 0000:00:17.0: [15ad:07a0] type 01 class 0x060400 Dec 13 14:23:04.670569 kernel: pci 0000:00:17.0: PME# supported from D0 D3hot D3cold Dec 13 14:23:04.670622 kernel: pci 0000:00:17.1: [15ad:07a0] type 01 class 0x060400 Dec 13 14:23:04.670672 kernel: pci 0000:00:17.1: PME# supported from D0 D3hot D3cold Dec 13 14:23:04.670750 kernel: pci 0000:00:17.2: [15ad:07a0] type 01 class 0x060400 Dec 13 14:23:04.670802 kernel: pci 0000:00:17.2: PME# supported from D0 D3hot D3cold Dec 13 14:23:04.670853 kernel: pci 0000:00:17.3: [15ad:07a0] type 01 class 0x060400 Dec 13 14:23:04.670902 kernel: pci 0000:00:17.3: PME# supported from D0 D3hot D3cold Dec 13 14:23:04.670955 kernel: pci 0000:00:17.4: [15ad:07a0] type 01 class 0x060400 Dec 13 14:23:04.671003 kernel: pci 0000:00:17.4: PME# supported from D0 D3hot D3cold Dec 13 14:23:04.671060 kernel: pci 0000:00:17.5: [15ad:07a0] type 01 class 0x060400 Dec 13 14:23:04.671108 kernel: pci 0000:00:17.5: PME# supported from D0 D3hot D3cold Dec 13 14:23:04.671159 kernel: pci 0000:00:17.6: [15ad:07a0] type 01 class 0x060400 Dec 13 14:23:04.671207 kernel: pci 0000:00:17.6: PME# supported from D0 D3hot D3cold Dec 13 14:23:04.671260 kernel: pci 0000:00:17.7: [15ad:07a0] type 01 class 0x060400 Dec 13 14:23:04.671309 kernel: pci 0000:00:17.7: PME# supported from D0 D3hot D3cold Dec 13 14:23:04.671360 kernel: pci 0000:00:18.0: [15ad:07a0] type 01 class 0x060400 Dec 13 14:23:04.671408 kernel: pci 0000:00:18.0: PME# supported from D0 D3hot D3cold Dec 13 14:23:04.671470 kernel: pci 0000:00:18.1: [15ad:07a0] type 01 class 0x060400 Dec 13 14:23:04.671520 kernel: pci 0000:00:18.1: PME# supported from D0 D3hot D3cold Dec 13 14:23:04.671573 kernel: pci 0000:00:18.2: [15ad:07a0] type 01 class 0x060400 Dec 13 14:23:04.671620 kernel: pci 0000:00:18.2: PME# supported from D0 D3hot D3cold Dec 13 14:23:04.671673 kernel: pci 0000:00:18.3: [15ad:07a0] type 01 class 0x060400 Dec 13 14:23:04.671740 kernel: pci 0000:00:18.3: PME# supported from D0 D3hot D3cold Dec 13 14:23:04.671794 kernel: pci 0000:00:18.4: [15ad:07a0] type 01 class 0x060400 Dec 13 14:23:04.671841 kernel: pci 0000:00:18.4: PME# supported from D0 D3hot D3cold Dec 13 14:23:04.671894 kernel: pci 0000:00:18.5: [15ad:07a0] type 01 class 0x060400 Dec 13 14:23:04.671941 kernel: pci 0000:00:18.5: PME# supported from D0 D3hot D3cold Dec 13 14:23:04.671992 kernel: pci 0000:00:18.6: [15ad:07a0] type 01 class 0x060400 Dec 13 14:23:04.672040 kernel: pci 0000:00:18.6: PME# supported from D0 D3hot D3cold Dec 13 14:23:04.672091 kernel: pci 0000:00:18.7: [15ad:07a0] type 01 class 0x060400 Dec 13 14:23:04.672139 kernel: pci 0000:00:18.7: PME# supported from D0 D3hot D3cold Dec 13 14:23:04.672191 kernel: pci_bus 0000:01: extended config space not accessible Dec 13 14:23:04.672244 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Dec 13 14:23:04.672293 kernel: pci_bus 0000:02: extended config space not accessible Dec 13 14:23:04.672301 kernel: acpiphp: Slot [32] registered Dec 13 14:23:04.672308 kernel: acpiphp: Slot [33] registered Dec 13 14:23:04.672313 kernel: acpiphp: Slot [34] registered Dec 13 14:23:04.672319 kernel: acpiphp: Slot [35] registered Dec 13 14:23:04.672325 kernel: acpiphp: Slot [36] registered Dec 13 14:23:04.672330 kernel: acpiphp: Slot [37] registered Dec 13 14:23:04.672338 kernel: acpiphp: Slot [38] registered Dec 13 14:23:04.672343 kernel: acpiphp: Slot [39] registered Dec 13 14:23:04.672349 kernel: acpiphp: Slot [40] registered Dec 13 14:23:04.672355 kernel: acpiphp: Slot [41] registered Dec 13 14:23:04.672360 kernel: acpiphp: Slot [42] registered Dec 13 14:23:04.672366 kernel: acpiphp: Slot [43] registered Dec 13 14:23:04.672371 kernel: acpiphp: Slot [44] registered Dec 13 14:23:04.672377 kernel: acpiphp: Slot [45] registered Dec 13 14:23:04.672383 kernel: acpiphp: Slot [46] registered Dec 13 14:23:04.672390 kernel: acpiphp: Slot [47] registered Dec 13 14:23:04.672395 kernel: acpiphp: Slot [48] registered Dec 13 14:23:04.672401 kernel: acpiphp: Slot [49] registered Dec 13 14:23:04.672407 kernel: acpiphp: Slot [50] registered Dec 13 14:23:04.672412 kernel: acpiphp: Slot [51] registered Dec 13 14:23:04.672418 kernel: acpiphp: Slot [52] registered Dec 13 14:23:04.672424 kernel: acpiphp: Slot [53] registered Dec 13 14:23:04.672429 kernel: acpiphp: Slot [54] registered Dec 13 14:23:04.672435 kernel: acpiphp: Slot [55] registered Dec 13 14:23:04.672440 kernel: acpiphp: Slot [56] registered Dec 13 14:23:04.672447 kernel: acpiphp: Slot [57] registered Dec 13 14:23:04.672453 kernel: acpiphp: Slot [58] registered Dec 13 14:23:04.672458 kernel: acpiphp: Slot [59] registered Dec 13 14:23:04.672464 kernel: acpiphp: Slot [60] registered Dec 13 14:23:04.672469 kernel: acpiphp: Slot [61] registered Dec 13 14:23:04.672475 kernel: acpiphp: Slot [62] registered Dec 13 14:23:04.672481 kernel: acpiphp: Slot [63] registered Dec 13 14:23:04.672528 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] (subtractive decode) Dec 13 14:23:04.672575 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Dec 13 14:23:04.672624 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Dec 13 14:23:04.672672 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Dec 13 14:23:04.672757 kernel: pci 0000:00:11.0: bridge window [mem 0x000a0000-0x000bffff window] (subtractive decode) Dec 13 14:23:04.672805 kernel: pci 0000:00:11.0: bridge window [mem 0x000cc000-0x000cffff window] (subtractive decode) Dec 13 14:23:04.672851 kernel: pci 0000:00:11.0: bridge window [mem 0x000d0000-0x000d3fff window] (subtractive decode) Dec 13 14:23:04.672897 kernel: pci 0000:00:11.0: bridge window [mem 0x000d4000-0x000d7fff window] (subtractive decode) Dec 13 14:23:04.672943 kernel: pci 0000:00:11.0: bridge window [mem 0x000d8000-0x000dbfff window] (subtractive decode) Dec 13 14:23:04.673221 kernel: pci 0000:00:11.0: bridge window [mem 0xc0000000-0xfebfffff window] (subtractive decode) Dec 13 14:23:04.673279 kernel: pci 0000:00:11.0: bridge window [io 0x0000-0x0cf7 window] (subtractive decode) Dec 13 14:23:04.673329 kernel: pci 0000:00:11.0: bridge window [io 0x0d00-0xfeff window] (subtractive decode) Dec 13 14:23:04.673388 kernel: pci 0000:03:00.0: [15ad:07c0] type 00 class 0x010700 Dec 13 14:23:04.673438 kernel: pci 0000:03:00.0: reg 0x10: [io 0x4000-0x4007] Dec 13 14:23:04.673486 kernel: pci 0000:03:00.0: reg 0x14: [mem 0xfd5f8000-0xfd5fffff 64bit] Dec 13 14:23:04.673535 kernel: pci 0000:03:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Dec 13 14:23:04.673587 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Dec 13 14:23:04.673636 kernel: pci 0000:03:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Dec 13 14:23:04.673685 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Dec 13 14:23:04.673748 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Dec 13 14:23:04.673804 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Dec 13 14:23:04.673854 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Dec 13 14:23:04.673901 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Dec 13 14:23:04.673948 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Dec 13 14:23:04.673999 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Dec 13 14:23:04.674060 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Dec 13 14:23:04.674109 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Dec 13 14:23:04.674156 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Dec 13 14:23:04.674204 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Dec 13 14:23:04.674252 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Dec 13 14:23:04.674300 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Dec 13 14:23:04.674349 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Dec 13 14:23:04.674396 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Dec 13 14:23:04.674443 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Dec 13 14:23:04.674490 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Dec 13 14:23:04.674536 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Dec 13 14:23:04.674586 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Dec 13 14:23:04.674632 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Dec 13 14:23:04.674678 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Dec 13 14:23:04.674773 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Dec 13 14:23:04.674822 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Dec 13 14:23:04.674869 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Dec 13 14:23:04.674916 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Dec 13 14:23:04.674989 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Dec 13 14:23:04.675252 kernel: pci 0000:0b:00.0: [15ad:07b0] type 00 class 0x020000 Dec 13 14:23:04.675308 kernel: pci 0000:0b:00.0: reg 0x10: [mem 0xfd4fc000-0xfd4fcfff] Dec 13 14:23:04.675358 kernel: pci 0000:0b:00.0: reg 0x14: [mem 0xfd4fd000-0xfd4fdfff] Dec 13 14:23:04.675407 kernel: pci 0000:0b:00.0: reg 0x18: [mem 0xfd4fe000-0xfd4fffff] Dec 13 14:23:04.675455 kernel: pci 0000:0b:00.0: reg 0x1c: [io 0x5000-0x500f] Dec 13 14:23:04.675503 kernel: pci 0000:0b:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Dec 13 14:23:04.675552 kernel: pci 0000:0b:00.0: supports D1 D2 Dec 13 14:23:04.675604 kernel: pci 0000:0b:00.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 14:23:04.675653 kernel: pci 0000:0b:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Dec 13 14:23:04.675701 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Dec 13 14:23:04.675771 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Dec 13 14:23:04.675819 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Dec 13 14:23:04.675867 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Dec 13 14:23:04.675915 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Dec 13 14:23:04.675961 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Dec 13 14:23:04.676011 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Dec 13 14:23:04.676059 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Dec 13 14:23:04.676106 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Dec 13 14:23:04.676154 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Dec 13 14:23:04.676201 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Dec 13 14:23:04.676248 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Dec 13 14:23:04.676294 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Dec 13 14:23:04.676343 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Dec 13 14:23:04.676391 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Dec 13 14:23:04.676438 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Dec 13 14:23:04.676485 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Dec 13 14:23:04.676531 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Dec 13 14:23:04.676584 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Dec 13 14:23:04.676631 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Dec 13 14:23:04.676678 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Dec 13 14:23:04.676765 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Dec 13 14:23:04.676813 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Dec 13 14:23:04.676859 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Dec 13 14:23:04.676905 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Dec 13 14:23:04.676972 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Dec 13 14:23:04.677240 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Dec 13 14:23:04.677293 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Dec 13 14:23:04.677341 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Dec 13 14:23:04.677388 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Dec 13 14:23:04.677439 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Dec 13 14:23:04.677485 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Dec 13 14:23:04.677531 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Dec 13 14:23:04.677578 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Dec 13 14:23:04.677628 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Dec 13 14:23:04.677675 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Dec 13 14:23:04.677741 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Dec 13 14:23:04.677793 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Dec 13 14:23:04.677840 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Dec 13 14:23:04.677887 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Dec 13 14:23:04.677933 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Dec 13 14:23:04.677981 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Dec 13 14:23:04.678026 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Dec 13 14:23:04.678074 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Dec 13 14:23:04.678120 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Dec 13 14:23:04.678169 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Dec 13 14:23:04.678216 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Dec 13 14:23:04.678277 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Dec 13 14:23:04.678500 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Dec 13 14:23:04.678550 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Dec 13 14:23:04.678599 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Dec 13 14:23:04.678646 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Dec 13 14:23:04.678692 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Dec 13 14:23:04.678790 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Dec 13 14:23:04.678838 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Dec 13 14:23:04.678885 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Dec 13 14:23:04.678931 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Dec 13 14:23:04.678978 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Dec 13 14:23:04.679025 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Dec 13 14:23:04.679070 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Dec 13 14:23:04.679118 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Dec 13 14:23:04.679166 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Dec 13 14:23:04.679212 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Dec 13 14:23:04.679258 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Dec 13 14:23:04.679305 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Dec 13 14:23:04.679351 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Dec 13 14:23:04.679398 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Dec 13 14:23:04.679443 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Dec 13 14:23:04.679492 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Dec 13 14:23:04.679538 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Dec 13 14:23:04.679585 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Dec 13 14:23:04.679630 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Dec 13 14:23:04.679677 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Dec 13 14:23:04.679743 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Dec 13 14:23:04.679792 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Dec 13 14:23:04.679839 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Dec 13 14:23:04.679889 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Dec 13 14:23:04.679936 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Dec 13 14:23:04.679982 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Dec 13 14:23:04.679990 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 9 Dec 13 14:23:04.679996 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 0 Dec 13 14:23:04.680002 kernel: ACPI: PCI: Interrupt link LNKB disabled Dec 13 14:23:04.680012 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 14:23:04.680018 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 10 Dec 13 14:23:04.680023 kernel: iommu: Default domain type: Translated Dec 13 14:23:04.680031 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 14:23:04.680079 kernel: pci 0000:00:0f.0: vgaarb: setting as boot VGA device Dec 13 14:23:04.680127 kernel: pci 0000:00:0f.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 14:23:04.680173 kernel: pci 0000:00:0f.0: vgaarb: bridge control possible Dec 13 14:23:04.680181 kernel: vgaarb: loaded Dec 13 14:23:04.680187 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:23:04.680193 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:23:04.680199 kernel: PTP clock support registered Dec 13 14:23:04.680205 kernel: PCI: Using ACPI for IRQ routing Dec 13 14:23:04.680212 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 14:23:04.680218 kernel: e820: reserve RAM buffer [mem 0x0009ec00-0x0009ffff] Dec 13 14:23:04.680223 kernel: e820: reserve RAM buffer [mem 0x7fee0000-0x7fffffff] Dec 13 14:23:04.680229 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 Dec 13 14:23:04.680235 kernel: hpet0: 16 comparators, 64-bit 14.318180 MHz counter Dec 13 14:23:04.680240 kernel: clocksource: Switched to clocksource tsc-early Dec 13 14:23:04.680246 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:23:04.680252 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:23:04.680258 kernel: pnp: PnP ACPI init Dec 13 14:23:04.680309 kernel: system 00:00: [io 0x1000-0x103f] has been reserved Dec 13 14:23:04.680354 kernel: system 00:00: [io 0x1040-0x104f] has been reserved Dec 13 14:23:04.680396 kernel: system 00:00: [io 0x0cf0-0x0cf1] has been reserved Dec 13 14:23:04.680443 kernel: system 00:04: [mem 0xfed00000-0xfed003ff] has been reserved Dec 13 14:23:04.680489 kernel: pnp 00:06: [dma 2] Dec 13 14:23:04.680536 kernel: system 00:07: [io 0xfce0-0xfcff] has been reserved Dec 13 14:23:04.680582 kernel: system 00:07: [mem 0xf0000000-0xf7ffffff] has been reserved Dec 13 14:23:04.680624 kernel: system 00:07: [mem 0xfe800000-0xfe9fffff] has been reserved Dec 13 14:23:04.680632 kernel: pnp: PnP ACPI: found 8 devices Dec 13 14:23:04.680638 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 14:23:04.680644 kernel: NET: Registered PF_INET protocol family Dec 13 14:23:04.680650 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 14:23:04.680656 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Dec 13 14:23:04.680662 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:23:04.680669 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:23:04.680675 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 14:23:04.680680 kernel: TCP: Hash tables configured (established 16384 bind 16384) Dec 13 14:23:04.680686 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 14:23:04.680692 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 14:23:04.680698 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:23:04.680750 kernel: NET: Registered PF_XDP protocol family Dec 13 14:23:04.680805 kernel: pci 0000:00:15.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Dec 13 14:23:04.680855 kernel: pci 0000:00:15.3: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Dec 13 14:23:04.681183 kernel: pci 0000:00:15.4: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Dec 13 14:23:04.681249 kernel: pci 0000:00:15.5: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Dec 13 14:23:04.681300 kernel: pci 0000:00:15.6: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Dec 13 14:23:04.681351 kernel: pci 0000:00:15.7: bridge window [io 0x1000-0x0fff] to [bus 0a] add_size 1000 Dec 13 14:23:04.681556 kernel: pci 0000:00:16.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 0b] add_size 200000 add_align 100000 Dec 13 14:23:04.681613 kernel: pci 0000:00:16.3: bridge window [io 0x1000-0x0fff] to [bus 0e] add_size 1000 Dec 13 14:23:04.681663 kernel: pci 0000:00:16.4: bridge window [io 0x1000-0x0fff] to [bus 0f] add_size 1000 Dec 13 14:23:04.682027 kernel: pci 0000:00:16.5: bridge window [io 0x1000-0x0fff] to [bus 10] add_size 1000 Dec 13 14:23:04.682088 kernel: pci 0000:00:16.6: bridge window [io 0x1000-0x0fff] to [bus 11] add_size 1000 Dec 13 14:23:04.682138 kernel: pci 0000:00:16.7: bridge window [io 0x1000-0x0fff] to [bus 12] add_size 1000 Dec 13 14:23:04.682187 kernel: pci 0000:00:17.3: bridge window [io 0x1000-0x0fff] to [bus 16] add_size 1000 Dec 13 14:23:04.682251 kernel: pci 0000:00:17.4: bridge window [io 0x1000-0x0fff] to [bus 17] add_size 1000 Dec 13 14:23:04.682301 kernel: pci 0000:00:17.5: bridge window [io 0x1000-0x0fff] to [bus 18] add_size 1000 Dec 13 14:23:04.682371 kernel: pci 0000:00:17.6: bridge window [io 0x1000-0x0fff] to [bus 19] add_size 1000 Dec 13 14:23:04.682419 kernel: pci 0000:00:17.7: bridge window [io 0x1000-0x0fff] to [bus 1a] add_size 1000 Dec 13 14:23:04.682466 kernel: pci 0000:00:18.2: bridge window [io 0x1000-0x0fff] to [bus 1d] add_size 1000 Dec 13 14:23:04.682512 kernel: pci 0000:00:18.3: bridge window [io 0x1000-0x0fff] to [bus 1e] add_size 1000 Dec 13 14:23:04.682562 kernel: pci 0000:00:18.4: bridge window [io 0x1000-0x0fff] to [bus 1f] add_size 1000 Dec 13 14:23:04.682608 kernel: pci 0000:00:18.5: bridge window [io 0x1000-0x0fff] to [bus 20] add_size 1000 Dec 13 14:23:04.682655 kernel: pci 0000:00:18.6: bridge window [io 0x1000-0x0fff] to [bus 21] add_size 1000 Dec 13 14:23:04.682709 kernel: pci 0000:00:18.7: bridge window [io 0x1000-0x0fff] to [bus 22] add_size 1000 Dec 13 14:23:04.682759 kernel: pci 0000:00:15.0: BAR 15: assigned [mem 0xc0000000-0xc01fffff 64bit pref] Dec 13 14:23:04.682806 kernel: pci 0000:00:16.0: BAR 15: assigned [mem 0xc0200000-0xc03fffff 64bit pref] Dec 13 14:23:04.682854 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.682900 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.682948 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.682993 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.683044 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.683110 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.683160 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.683212 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.683261 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.683308 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.683354 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.683401 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.683446 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.683493 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.683539 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.683585 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.683634 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.683681 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.683756 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.683805 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.683852 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.683898 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.683944 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.683990 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.684054 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.684102 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.684149 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.684197 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.684243 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.684290 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.684336 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.684382 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.684431 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.684478 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.684524 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.684571 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.684617 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.684665 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.684717 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.684765 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.684813 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.684859 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.684906 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.684952 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.684999 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.685046 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.685093 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.685140 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.685186 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.685232 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.685281 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.685327 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.685373 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.685419 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.685465 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.685530 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.685579 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.685626 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.685672 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.685736 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.685791 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.685838 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.685886 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.687647 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.687765 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.688100 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.688155 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.688205 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.688253 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.688304 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.688351 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.688398 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.688444 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.688490 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.688537 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.688585 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.688631 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.688678 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.688747 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.688796 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.688843 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.688890 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.688935 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Dec 13 14:23:04.688982 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:23:04.689029 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Dec 13 14:23:04.689077 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] Dec 13 14:23:04.689124 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Dec 13 14:23:04.689172 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Dec 13 14:23:04.689217 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Dec 13 14:23:04.689268 kernel: pci 0000:03:00.0: BAR 6: assigned [mem 0xfd500000-0xfd50ffff pref] Dec 13 14:23:04.689315 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Dec 13 14:23:04.689361 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Dec 13 14:23:04.689408 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Dec 13 14:23:04.689454 kernel: pci 0000:00:15.0: bridge window [mem 0xc0000000-0xc01fffff 64bit pref] Dec 13 14:23:04.689502 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Dec 13 14:23:04.689550 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Dec 13 14:23:04.689596 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Dec 13 14:23:04.689642 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Dec 13 14:23:04.689689 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Dec 13 14:23:04.689753 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Dec 13 14:23:04.689799 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Dec 13 14:23:04.689844 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Dec 13 14:23:04.689890 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Dec 13 14:23:04.689935 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Dec 13 14:23:04.689982 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Dec 13 14:23:04.690040 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Dec 13 14:23:04.690089 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Dec 13 14:23:04.690136 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Dec 13 14:23:04.690183 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Dec 13 14:23:04.690229 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Dec 13 14:23:04.690285 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Dec 13 14:23:04.690349 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Dec 13 14:23:04.690397 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Dec 13 14:23:04.690442 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Dec 13 14:23:04.690490 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Dec 13 14:23:04.690537 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Dec 13 14:23:04.690584 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Dec 13 14:23:04.690634 kernel: pci 0000:0b:00.0: BAR 6: assigned [mem 0xfd400000-0xfd40ffff pref] Dec 13 14:23:04.690682 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Dec 13 14:23:04.690736 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Dec 13 14:23:04.690787 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Dec 13 14:23:04.690833 kernel: pci 0000:00:16.0: bridge window [mem 0xc0200000-0xc03fffff 64bit pref] Dec 13 14:23:04.690882 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Dec 13 14:23:04.690928 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Dec 13 14:23:04.690975 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Dec 13 14:23:04.691022 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Dec 13 14:23:04.691070 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Dec 13 14:23:04.691117 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Dec 13 14:23:04.691164 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Dec 13 14:23:04.691212 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Dec 13 14:23:04.691258 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Dec 13 14:23:04.691304 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Dec 13 14:23:04.691351 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Dec 13 14:23:04.691397 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Dec 13 14:23:04.691443 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Dec 13 14:23:04.691489 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Dec 13 14:23:04.691535 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Dec 13 14:23:04.691582 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Dec 13 14:23:04.691627 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Dec 13 14:23:04.691674 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Dec 13 14:23:04.691732 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Dec 13 14:23:04.691779 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Dec 13 14:23:04.691825 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Dec 13 14:23:04.691872 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Dec 13 14:23:04.691928 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Dec 13 14:23:04.691977 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Dec 13 14:23:04.692024 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Dec 13 14:23:04.692072 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Dec 13 14:23:04.692413 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Dec 13 14:23:04.692470 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Dec 13 14:23:04.692519 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Dec 13 14:23:04.692875 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Dec 13 14:23:04.692927 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Dec 13 14:23:04.692976 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Dec 13 14:23:04.694217 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Dec 13 14:23:04.694271 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Dec 13 14:23:04.694535 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Dec 13 14:23:04.694591 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Dec 13 14:23:04.694642 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Dec 13 14:23:04.694690 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Dec 13 14:23:04.695024 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Dec 13 14:23:04.695079 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Dec 13 14:23:04.695128 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Dec 13 14:23:04.695473 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Dec 13 14:23:04.695532 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Dec 13 14:23:04.695583 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Dec 13 14:23:04.695909 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Dec 13 14:23:04.695971 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Dec 13 14:23:04.696022 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Dec 13 14:23:04.696072 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Dec 13 14:23:04.696120 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Dec 13 14:23:04.696166 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Dec 13 14:23:04.696214 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Dec 13 14:23:04.696260 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Dec 13 14:23:04.696307 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Dec 13 14:23:04.696353 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Dec 13 14:23:04.696402 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Dec 13 14:23:04.696450 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Dec 13 14:23:04.696497 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Dec 13 14:23:04.696548 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Dec 13 14:23:04.696613 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Dec 13 14:23:04.696661 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Dec 13 14:23:04.696714 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Dec 13 14:23:04.696763 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Dec 13 14:23:04.696809 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Dec 13 14:23:04.696856 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Dec 13 14:23:04.696906 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Dec 13 14:23:04.696952 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Dec 13 14:23:04.696998 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Dec 13 14:23:04.697050 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Dec 13 14:23:04.697097 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Dec 13 14:23:04.697143 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Dec 13 14:23:04.697202 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Dec 13 14:23:04.697270 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Dec 13 14:23:04.697319 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Dec 13 14:23:04.697379 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Dec 13 14:23:04.697568 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Dec 13 14:23:04.697630 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Dec 13 14:23:04.697695 kernel: pci_bus 0000:00: resource 4 [mem 0x000a0000-0x000bffff window] Dec 13 14:23:04.697788 kernel: pci_bus 0000:00: resource 5 [mem 0x000cc000-0x000cffff window] Dec 13 14:23:04.697973 kernel: pci_bus 0000:00: resource 6 [mem 0x000d0000-0x000d3fff window] Dec 13 14:23:04.698019 kernel: pci_bus 0000:00: resource 7 [mem 0x000d4000-0x000d7fff window] Dec 13 14:23:04.698060 kernel: pci_bus 0000:00: resource 8 [mem 0x000d8000-0x000dbfff window] Dec 13 14:23:04.698105 kernel: pci_bus 0000:00: resource 9 [mem 0xc0000000-0xfebfffff window] Dec 13 14:23:04.698437 kernel: pci_bus 0000:00: resource 10 [io 0x0000-0x0cf7 window] Dec 13 14:23:04.698484 kernel: pci_bus 0000:00: resource 11 [io 0x0d00-0xfeff window] Dec 13 14:23:04.698530 kernel: pci_bus 0000:02: resource 0 [io 0x2000-0x3fff] Dec 13 14:23:04.698573 kernel: pci_bus 0000:02: resource 1 [mem 0xfd600000-0xfdffffff] Dec 13 14:23:04.698615 kernel: pci_bus 0000:02: resource 2 [mem 0xe7b00000-0xe7ffffff 64bit pref] Dec 13 14:23:04.698658 kernel: pci_bus 0000:02: resource 4 [mem 0x000a0000-0x000bffff window] Dec 13 14:23:04.698701 kernel: pci_bus 0000:02: resource 5 [mem 0x000cc000-0x000cffff window] Dec 13 14:23:04.698769 kernel: pci_bus 0000:02: resource 6 [mem 0x000d0000-0x000d3fff window] Dec 13 14:23:04.698811 kernel: pci_bus 0000:02: resource 7 [mem 0x000d4000-0x000d7fff window] Dec 13 14:23:04.698854 kernel: pci_bus 0000:02: resource 8 [mem 0x000d8000-0x000dbfff window] Dec 13 14:23:04.698897 kernel: pci_bus 0000:02: resource 9 [mem 0xc0000000-0xfebfffff window] Dec 13 14:23:04.698939 kernel: pci_bus 0000:02: resource 10 [io 0x0000-0x0cf7 window] Dec 13 14:23:04.698982 kernel: pci_bus 0000:02: resource 11 [io 0x0d00-0xfeff window] Dec 13 14:23:04.699032 kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x4fff] Dec 13 14:23:04.699079 kernel: pci_bus 0000:03: resource 1 [mem 0xfd500000-0xfd5fffff] Dec 13 14:23:04.699121 kernel: pci_bus 0000:03: resource 2 [mem 0xc0000000-0xc01fffff 64bit pref] Dec 13 14:23:04.699167 kernel: pci_bus 0000:04: resource 0 [io 0x8000-0x8fff] Dec 13 14:23:04.699210 kernel: pci_bus 0000:04: resource 1 [mem 0xfd100000-0xfd1fffff] Dec 13 14:23:04.699262 kernel: pci_bus 0000:04: resource 2 [mem 0xe7800000-0xe78fffff 64bit pref] Dec 13 14:23:04.699311 kernel: pci_bus 0000:05: resource 0 [io 0xc000-0xcfff] Dec 13 14:23:04.699354 kernel: pci_bus 0000:05: resource 1 [mem 0xfcd00000-0xfcdfffff] Dec 13 14:23:04.699399 kernel: pci_bus 0000:05: resource 2 [mem 0xe7400000-0xe74fffff 64bit pref] Dec 13 14:23:04.699446 kernel: pci_bus 0000:06: resource 1 [mem 0xfc900000-0xfc9fffff] Dec 13 14:23:04.699490 kernel: pci_bus 0000:06: resource 2 [mem 0xe7000000-0xe70fffff 64bit pref] Dec 13 14:23:04.699538 kernel: pci_bus 0000:07: resource 1 [mem 0xfc500000-0xfc5fffff] Dec 13 14:23:04.699590 kernel: pci_bus 0000:07: resource 2 [mem 0xe6c00000-0xe6cfffff 64bit pref] Dec 13 14:23:04.699639 kernel: pci_bus 0000:08: resource 1 [mem 0xfc100000-0xfc1fffff] Dec 13 14:23:04.699685 kernel: pci_bus 0000:08: resource 2 [mem 0xe6800000-0xe68fffff 64bit pref] Dec 13 14:23:04.699775 kernel: pci_bus 0000:09: resource 1 [mem 0xfbd00000-0xfbdfffff] Dec 13 14:23:04.699820 kernel: pci_bus 0000:09: resource 2 [mem 0xe6400000-0xe64fffff 64bit pref] Dec 13 14:23:04.699868 kernel: pci_bus 0000:0a: resource 1 [mem 0xfb900000-0xfb9fffff] Dec 13 14:23:04.699911 kernel: pci_bus 0000:0a: resource 2 [mem 0xe6000000-0xe60fffff 64bit pref] Dec 13 14:23:04.699957 kernel: pci_bus 0000:0b: resource 0 [io 0x5000-0x5fff] Dec 13 14:23:04.700003 kernel: pci_bus 0000:0b: resource 1 [mem 0xfd400000-0xfd4fffff] Dec 13 14:23:04.700050 kernel: pci_bus 0000:0b: resource 2 [mem 0xc0200000-0xc03fffff 64bit pref] Dec 13 14:23:04.700098 kernel: pci_bus 0000:0c: resource 0 [io 0x9000-0x9fff] Dec 13 14:23:04.700141 kernel: pci_bus 0000:0c: resource 1 [mem 0xfd000000-0xfd0fffff] Dec 13 14:23:04.700184 kernel: pci_bus 0000:0c: resource 2 [mem 0xe7700000-0xe77fffff 64bit pref] Dec 13 14:23:04.700230 kernel: pci_bus 0000:0d: resource 0 [io 0xd000-0xdfff] Dec 13 14:23:04.700286 kernel: pci_bus 0000:0d: resource 1 [mem 0xfcc00000-0xfccfffff] Dec 13 14:23:04.700330 kernel: pci_bus 0000:0d: resource 2 [mem 0xe7300000-0xe73fffff 64bit pref] Dec 13 14:23:04.700376 kernel: pci_bus 0000:0e: resource 1 [mem 0xfc800000-0xfc8fffff] Dec 13 14:23:04.700420 kernel: pci_bus 0000:0e: resource 2 [mem 0xe6f00000-0xe6ffffff 64bit pref] Dec 13 14:23:04.700466 kernel: pci_bus 0000:0f: resource 1 [mem 0xfc400000-0xfc4fffff] Dec 13 14:23:04.700510 kernel: pci_bus 0000:0f: resource 2 [mem 0xe6b00000-0xe6bfffff 64bit pref] Dec 13 14:23:04.700559 kernel: pci_bus 0000:10: resource 1 [mem 0xfc000000-0xfc0fffff] Dec 13 14:23:04.700605 kernel: pci_bus 0000:10: resource 2 [mem 0xe6700000-0xe67fffff 64bit pref] Dec 13 14:23:04.700652 kernel: pci_bus 0000:11: resource 1 [mem 0xfbc00000-0xfbcfffff] Dec 13 14:23:04.700695 kernel: pci_bus 0000:11: resource 2 [mem 0xe6300000-0xe63fffff 64bit pref] Dec 13 14:23:04.700749 kernel: pci_bus 0000:12: resource 1 [mem 0xfb800000-0xfb8fffff] Dec 13 14:23:04.700792 kernel: pci_bus 0000:12: resource 2 [mem 0xe5f00000-0xe5ffffff 64bit pref] Dec 13 14:23:04.700840 kernel: pci_bus 0000:13: resource 0 [io 0x6000-0x6fff] Dec 13 14:23:04.700885 kernel: pci_bus 0000:13: resource 1 [mem 0xfd300000-0xfd3fffff] Dec 13 14:23:04.700950 kernel: pci_bus 0000:13: resource 2 [mem 0xe7a00000-0xe7afffff 64bit pref] Dec 13 14:23:04.701000 kernel: pci_bus 0000:14: resource 0 [io 0xa000-0xafff] Dec 13 14:23:04.701045 kernel: pci_bus 0000:14: resource 1 [mem 0xfcf00000-0xfcffffff] Dec 13 14:23:04.701087 kernel: pci_bus 0000:14: resource 2 [mem 0xe7600000-0xe76fffff 64bit pref] Dec 13 14:23:04.701135 kernel: pci_bus 0000:15: resource 0 [io 0xe000-0xefff] Dec 13 14:23:04.701178 kernel: pci_bus 0000:15: resource 1 [mem 0xfcb00000-0xfcbfffff] Dec 13 14:23:04.701223 kernel: pci_bus 0000:15: resource 2 [mem 0xe7200000-0xe72fffff 64bit pref] Dec 13 14:23:04.701272 kernel: pci_bus 0000:16: resource 1 [mem 0xfc700000-0xfc7fffff] Dec 13 14:23:04.701316 kernel: pci_bus 0000:16: resource 2 [mem 0xe6e00000-0xe6efffff 64bit pref] Dec 13 14:23:04.701363 kernel: pci_bus 0000:17: resource 1 [mem 0xfc300000-0xfc3fffff] Dec 13 14:23:04.701407 kernel: pci_bus 0000:17: resource 2 [mem 0xe6a00000-0xe6afffff 64bit pref] Dec 13 14:23:04.701453 kernel: pci_bus 0000:18: resource 1 [mem 0xfbf00000-0xfbffffff] Dec 13 14:23:04.701499 kernel: pci_bus 0000:18: resource 2 [mem 0xe6600000-0xe66fffff 64bit pref] Dec 13 14:23:04.701547 kernel: pci_bus 0000:19: resource 1 [mem 0xfbb00000-0xfbbfffff] Dec 13 14:23:04.701591 kernel: pci_bus 0000:19: resource 2 [mem 0xe6200000-0xe62fffff 64bit pref] Dec 13 14:23:04.701648 kernel: pci_bus 0000:1a: resource 1 [mem 0xfb700000-0xfb7fffff] Dec 13 14:23:04.701699 kernel: pci_bus 0000:1a: resource 2 [mem 0xe5e00000-0xe5efffff 64bit pref] Dec 13 14:23:04.701764 kernel: pci_bus 0000:1b: resource 0 [io 0x7000-0x7fff] Dec 13 14:23:04.701812 kernel: pci_bus 0000:1b: resource 1 [mem 0xfd200000-0xfd2fffff] Dec 13 14:23:04.702140 kernel: pci_bus 0000:1b: resource 2 [mem 0xe7900000-0xe79fffff 64bit pref] Dec 13 14:23:04.702201 kernel: pci_bus 0000:1c: resource 0 [io 0xb000-0xbfff] Dec 13 14:23:04.702247 kernel: pci_bus 0000:1c: resource 1 [mem 0xfce00000-0xfcefffff] Dec 13 14:23:04.702292 kernel: pci_bus 0000:1c: resource 2 [mem 0xe7500000-0xe75fffff 64bit pref] Dec 13 14:23:04.702622 kernel: pci_bus 0000:1d: resource 1 [mem 0xfca00000-0xfcafffff] Dec 13 14:23:04.702674 kernel: pci_bus 0000:1d: resource 2 [mem 0xe7100000-0xe71fffff 64bit pref] Dec 13 14:23:04.702749 kernel: pci_bus 0000:1e: resource 1 [mem 0xfc600000-0xfc6fffff] Dec 13 14:23:04.703088 kernel: pci_bus 0000:1e: resource 2 [mem 0xe6d00000-0xe6dfffff 64bit pref] Dec 13 14:23:04.703147 kernel: pci_bus 0000:1f: resource 1 [mem 0xfc200000-0xfc2fffff] Dec 13 14:23:04.703192 kernel: pci_bus 0000:1f: resource 2 [mem 0xe6900000-0xe69fffff 64bit pref] Dec 13 14:23:04.703383 kernel: pci_bus 0000:20: resource 1 [mem 0xfbe00000-0xfbefffff] Dec 13 14:23:04.703432 kernel: pci_bus 0000:20: resource 2 [mem 0xe6500000-0xe65fffff 64bit pref] Dec 13 14:23:04.703483 kernel: pci_bus 0000:21: resource 1 [mem 0xfba00000-0xfbafffff] Dec 13 14:23:04.703528 kernel: pci_bus 0000:21: resource 2 [mem 0xe6100000-0xe61fffff 64bit pref] Dec 13 14:23:04.703878 kernel: pci_bus 0000:22: resource 1 [mem 0xfb600000-0xfb6fffff] Dec 13 14:23:04.703926 kernel: pci_bus 0000:22: resource 2 [mem 0xe5d00000-0xe5dfffff 64bit pref] Dec 13 14:23:04.703980 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 13 14:23:04.703990 kernel: PCI: CLS 32 bytes, default 64 Dec 13 14:23:04.703999 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 14:23:04.704006 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Dec 13 14:23:04.704022 kernel: clocksource: Switched to clocksource tsc Dec 13 14:23:04.704028 kernel: Initialise system trusted keyrings Dec 13 14:23:04.704034 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Dec 13 14:23:04.704041 kernel: Key type asymmetric registered Dec 13 14:23:04.704047 kernel: Asymmetric key parser 'x509' registered Dec 13 14:23:04.704052 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:23:04.704059 kernel: io scheduler mq-deadline registered Dec 13 14:23:04.704067 kernel: io scheduler kyber registered Dec 13 14:23:04.704072 kernel: io scheduler bfq registered Dec 13 14:23:04.704126 kernel: pcieport 0000:00:15.0: PME: Signaling with IRQ 24 Dec 13 14:23:04.704177 kernel: pcieport 0000:00:15.0: pciehp: Slot #160 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:23:04.704227 kernel: pcieport 0000:00:15.1: PME: Signaling with IRQ 25 Dec 13 14:23:04.704276 kernel: pcieport 0000:00:15.1: pciehp: Slot #161 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:23:04.704325 kernel: pcieport 0000:00:15.2: PME: Signaling with IRQ 26 Dec 13 14:23:04.704373 kernel: pcieport 0000:00:15.2: pciehp: Slot #162 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:23:04.704424 kernel: pcieport 0000:00:15.3: PME: Signaling with IRQ 27 Dec 13 14:23:04.704473 kernel: pcieport 0000:00:15.3: pciehp: Slot #163 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:23:04.704521 kernel: pcieport 0000:00:15.4: PME: Signaling with IRQ 28 Dec 13 14:23:04.704569 kernel: pcieport 0000:00:15.4: pciehp: Slot #164 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:23:04.704617 kernel: pcieport 0000:00:15.5: PME: Signaling with IRQ 29 Dec 13 14:23:04.704664 kernel: pcieport 0000:00:15.5: pciehp: Slot #165 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:23:04.704785 kernel: pcieport 0000:00:15.6: PME: Signaling with IRQ 30 Dec 13 14:23:04.704837 kernel: pcieport 0000:00:15.6: pciehp: Slot #166 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:23:04.704884 kernel: pcieport 0000:00:15.7: PME: Signaling with IRQ 31 Dec 13 14:23:04.704932 kernel: pcieport 0000:00:15.7: pciehp: Slot #167 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:23:04.704979 kernel: pcieport 0000:00:16.0: PME: Signaling with IRQ 32 Dec 13 14:23:04.705030 kernel: pcieport 0000:00:16.0: pciehp: Slot #192 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:23:04.705077 kernel: pcieport 0000:00:16.1: PME: Signaling with IRQ 33 Dec 13 14:23:04.705124 kernel: pcieport 0000:00:16.1: pciehp: Slot #193 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:23:04.705171 kernel: pcieport 0000:00:16.2: PME: Signaling with IRQ 34 Dec 13 14:23:04.705218 kernel: pcieport 0000:00:16.2: pciehp: Slot #194 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:23:04.705266 kernel: pcieport 0000:00:16.3: PME: Signaling with IRQ 35 Dec 13 14:23:04.705313 kernel: pcieport 0000:00:16.3: pciehp: Slot #195 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:23:04.705362 kernel: pcieport 0000:00:16.4: PME: Signaling with IRQ 36 Dec 13 14:23:04.705409 kernel: pcieport 0000:00:16.4: pciehp: Slot #196 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:23:04.705465 kernel: pcieport 0000:00:16.5: PME: Signaling with IRQ 37 Dec 13 14:23:04.705513 kernel: pcieport 0000:00:16.5: pciehp: Slot #197 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:23:04.705565 kernel: pcieport 0000:00:16.6: PME: Signaling with IRQ 38 Dec 13 14:23:04.705615 kernel: pcieport 0000:00:16.6: pciehp: Slot #198 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:23:04.705662 kernel: pcieport 0000:00:16.7: PME: Signaling with IRQ 39 Dec 13 14:23:04.705716 kernel: pcieport 0000:00:16.7: pciehp: Slot #199 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:23:04.705765 kernel: pcieport 0000:00:17.0: PME: Signaling with IRQ 40 Dec 13 14:23:04.705812 kernel: pcieport 0000:00:17.0: pciehp: Slot #224 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:23:04.705859 kernel: pcieport 0000:00:17.1: PME: Signaling with IRQ 41 Dec 13 14:23:04.705916 kernel: pcieport 0000:00:17.1: pciehp: Slot #225 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:23:04.705976 kernel: pcieport 0000:00:17.2: PME: Signaling with IRQ 42 Dec 13 14:23:04.706024 kernel: pcieport 0000:00:17.2: pciehp: Slot #226 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:23:04.706072 kernel: pcieport 0000:00:17.3: PME: Signaling with IRQ 43 Dec 13 14:23:04.706119 kernel: pcieport 0000:00:17.3: pciehp: Slot #227 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:23:04.706166 kernel: pcieport 0000:00:17.4: PME: Signaling with IRQ 44 Dec 13 14:23:04.706216 kernel: pcieport 0000:00:17.4: pciehp: Slot #228 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:23:04.706273 kernel: pcieport 0000:00:17.5: PME: Signaling with IRQ 45 Dec 13 14:23:04.706322 kernel: pcieport 0000:00:17.5: pciehp: Slot #229 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:23:04.706370 kernel: pcieport 0000:00:17.6: PME: Signaling with IRQ 46 Dec 13 14:23:04.706423 kernel: pcieport 0000:00:17.6: pciehp: Slot #230 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:23:04.706473 kernel: pcieport 0000:00:17.7: PME: Signaling with IRQ 47 Dec 13 14:23:04.706524 kernel: pcieport 0000:00:17.7: pciehp: Slot #231 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:23:04.706571 kernel: pcieport 0000:00:18.0: PME: Signaling with IRQ 48 Dec 13 14:23:04.706618 kernel: pcieport 0000:00:18.0: pciehp: Slot #256 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:23:04.706664 kernel: pcieport 0000:00:18.1: PME: Signaling with IRQ 49 Dec 13 14:23:04.706731 kernel: pcieport 0000:00:18.1: pciehp: Slot #257 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:23:04.706782 kernel: pcieport 0000:00:18.2: PME: Signaling with IRQ 50 Dec 13 14:23:04.706832 kernel: pcieport 0000:00:18.2: pciehp: Slot #258 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:23:04.706879 kernel: pcieport 0000:00:18.3: PME: Signaling with IRQ 51 Dec 13 14:23:04.707224 kernel: pcieport 0000:00:18.3: pciehp: Slot #259 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:23:04.707280 kernel: pcieport 0000:00:18.4: PME: Signaling with IRQ 52 Dec 13 14:23:04.707331 kernel: pcieport 0000:00:18.4: pciehp: Slot #260 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:23:04.707663 kernel: pcieport 0000:00:18.5: PME: Signaling with IRQ 53 Dec 13 14:23:04.707746 kernel: pcieport 0000:00:18.5: pciehp: Slot #261 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:23:04.707798 kernel: pcieport 0000:00:18.6: PME: Signaling with IRQ 54 Dec 13 14:23:04.708132 kernel: pcieport 0000:00:18.6: pciehp: Slot #262 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:23:04.708185 kernel: pcieport 0000:00:18.7: PME: Signaling with IRQ 55 Dec 13 14:23:04.708234 kernel: pcieport 0000:00:18.7: pciehp: Slot #263 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:23:04.708246 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 14:23:04.708423 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:23:04.708432 kernel: 00:05: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 14:23:04.708439 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBC,PNP0f13:MOUS] at 0x60,0x64 irq 1,12 Dec 13 14:23:04.708445 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 14:23:04.708451 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 14:23:04.708510 kernel: rtc_cmos 00:01: registered as rtc0 Dec 13 14:23:04.708558 kernel: rtc_cmos 00:01: setting system clock to 2024-12-13T14:23:04 UTC (1734099784) Dec 13 14:23:04.708888 kernel: rtc_cmos 00:01: alarms up to one month, y3k, 114 bytes nvram Dec 13 14:23:04.708900 kernel: fail to initialize ptp_kvm Dec 13 14:23:04.708907 kernel: intel_pstate: CPU model not supported Dec 13 14:23:04.708914 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:23:04.708920 kernel: Segment Routing with IPv6 Dec 13 14:23:04.708926 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:23:04.708932 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:23:04.708939 kernel: Key type dns_resolver registered Dec 13 14:23:04.708947 kernel: IPI shorthand broadcast: enabled Dec 13 14:23:04.708953 kernel: sched_clock: Marking stable (847031182, 222191825)->(1134954772, -65731765) Dec 13 14:23:04.708960 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 14:23:04.708966 kernel: registered taskstats version 1 Dec 13 14:23:04.708973 kernel: Loading compiled-in X.509 certificates Dec 13 14:23:04.708979 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 14:23:04.708985 kernel: Key type .fscrypt registered Dec 13 14:23:04.708991 kernel: Key type fscrypt-provisioning registered Dec 13 14:23:04.708999 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:23:04.709005 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:23:04.709011 kernel: ima: No architecture policies found Dec 13 14:23:04.709017 kernel: clk: Disabling unused clocks Dec 13 14:23:04.709023 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 14:23:04.709030 kernel: Write protecting the kernel read-only data: 28672k Dec 13 14:23:04.709036 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 14:23:04.709042 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 14:23:04.709048 kernel: Run /init as init process Dec 13 14:23:04.709054 kernel: with arguments: Dec 13 14:23:04.709061 kernel: /init Dec 13 14:23:04.709067 kernel: with environment: Dec 13 14:23:04.709074 kernel: HOME=/ Dec 13 14:23:04.709079 kernel: TERM=linux Dec 13 14:23:04.709085 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:23:04.709093 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:23:04.709100 systemd[1]: Detected virtualization vmware. Dec 13 14:23:04.709107 systemd[1]: Detected architecture x86-64. Dec 13 14:23:04.709114 systemd[1]: Running in initrd. Dec 13 14:23:04.709120 systemd[1]: No hostname configured, using default hostname. Dec 13 14:23:04.709126 systemd[1]: Hostname set to . Dec 13 14:23:04.709133 systemd[1]: Initializing machine ID from random generator. Dec 13 14:23:04.709139 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:23:04.709145 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:23:04.709151 systemd[1]: Reached target cryptsetup.target. Dec 13 14:23:04.709157 systemd[1]: Reached target paths.target. Dec 13 14:23:04.709164 systemd[1]: Reached target slices.target. Dec 13 14:23:04.709170 systemd[1]: Reached target swap.target. Dec 13 14:23:04.709176 systemd[1]: Reached target timers.target. Dec 13 14:23:04.709182 systemd[1]: Listening on iscsid.socket. Dec 13 14:23:04.709188 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:23:04.709194 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:23:04.709201 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:23:04.709207 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:23:04.709214 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:23:04.709220 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:23:04.709227 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:23:04.709233 systemd[1]: Reached target sockets.target. Dec 13 14:23:04.709239 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:23:04.709245 systemd[1]: Finished network-cleanup.service. Dec 13 14:23:04.709251 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:23:04.709257 systemd[1]: Starting systemd-journald.service... Dec 13 14:23:04.709265 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:23:04.709272 systemd[1]: Starting systemd-resolved.service... Dec 13 14:23:04.709278 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:23:04.709284 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:23:04.709290 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:23:04.709297 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:23:04.709303 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:23:04.709309 systemd[1]: Started systemd-resolved.service. Dec 13 14:23:04.709315 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:23:04.709322 systemd[1]: Reached target nss-lookup.target. Dec 13 14:23:04.709329 kernel: audit: type=1130 audit(1734099784.656:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:04.709336 kernel: audit: type=1130 audit(1734099784.656:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:04.709342 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:23:04.709348 kernel: audit: type=1130 audit(1734099784.657:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:04.709355 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:23:04.709361 kernel: audit: type=1130 audit(1734099784.682:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:04.709368 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:23:04.709375 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:23:04.709382 kernel: Bridge firewalling registered Dec 13 14:23:04.709391 systemd-journald[217]: Journal started Dec 13 14:23:04.709424 systemd-journald[217]: Runtime Journal (/run/log/journal/4c5d9b45ba574c7db3f9bd69ff1b2ad5) is 4.8M, max 38.8M, 34.0M free. Dec 13 14:23:04.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:04.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:04.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:04.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:04.653556 systemd-resolved[219]: Positive Trust Anchors: Dec 13 14:23:04.710916 systemd[1]: Started systemd-journald.service. Dec 13 14:23:04.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:04.653563 systemd-resolved[219]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:23:04.719333 kernel: audit: type=1130 audit(1734099784.709:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:04.719346 kernel: SCSI subsystem initialized Dec 13 14:23:04.653582 systemd-resolved[219]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:23:04.655198 systemd-resolved[219]: Defaulting to hostname 'linux'. Dec 13 14:23:04.656777 systemd-modules-load[218]: Inserted module 'overlay' Dec 13 14:23:04.701876 systemd-modules-load[218]: Inserted module 'br_netfilter' Dec 13 14:23:04.720955 dracut-cmdline[233]: dracut-dracut-053 Dec 13 14:23:04.720955 dracut-cmdline[233]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Dec 13 14:23:04.720955 dracut-cmdline[233]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:23:04.728858 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:23:04.728881 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:23:04.728890 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:23:04.730970 systemd-modules-load[218]: Inserted module 'dm_multipath' Dec 13 14:23:04.731322 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:23:04.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:04.734242 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:23:04.735328 kernel: audit: type=1130 audit(1734099784.729:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:04.738220 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:23:04.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:04.741755 kernel: audit: type=1130 audit(1734099784.736:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:04.751719 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:23:04.763717 kernel: iscsi: registered transport (tcp) Dec 13 14:23:04.780058 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:23:04.780104 kernel: QLogic iSCSI HBA Driver Dec 13 14:23:04.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:04.797343 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:23:04.800899 kernel: audit: type=1130 audit(1734099784.795:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:04.797997 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:23:04.836735 kernel: raid6: avx2x4 gen() 47115 MB/s Dec 13 14:23:04.852733 kernel: raid6: avx2x4 xor() 19748 MB/s Dec 13 14:23:04.869727 kernel: raid6: avx2x2 gen() 52343 MB/s Dec 13 14:23:04.886724 kernel: raid6: avx2x2 xor() 30919 MB/s Dec 13 14:23:04.903750 kernel: raid6: avx2x1 gen() 44194 MB/s Dec 13 14:23:04.920724 kernel: raid6: avx2x1 xor() 27545 MB/s Dec 13 14:23:04.937726 kernel: raid6: sse2x4 gen() 21007 MB/s Dec 13 14:23:04.954725 kernel: raid6: sse2x4 xor() 11826 MB/s Dec 13 14:23:04.971725 kernel: raid6: sse2x2 gen() 21339 MB/s Dec 13 14:23:04.988728 kernel: raid6: sse2x2 xor() 13290 MB/s Dec 13 14:23:05.005729 kernel: raid6: sse2x1 gen() 17983 MB/s Dec 13 14:23:05.022946 kernel: raid6: sse2x1 xor() 8845 MB/s Dec 13 14:23:05.022990 kernel: raid6: using algorithm avx2x2 gen() 52343 MB/s Dec 13 14:23:05.022998 kernel: raid6: .... xor() 30919 MB/s, rmw enabled Dec 13 14:23:05.024140 kernel: raid6: using avx2x2 recovery algorithm Dec 13 14:23:05.032720 kernel: xor: automatically using best checksumming function avx Dec 13 14:23:05.092724 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 14:23:05.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:05.097306 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:23:05.095000 audit: BPF prog-id=7 op=LOAD Dec 13 14:23:05.096000 audit: BPF prog-id=8 op=LOAD Dec 13 14:23:05.097983 systemd[1]: Starting systemd-udevd.service... Dec 13 14:23:05.100803 kernel: audit: type=1130 audit(1734099785.095:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:05.108764 systemd-udevd[416]: Using default interface naming scheme 'v252'. Dec 13 14:23:05.111670 systemd[1]: Started systemd-udevd.service. Dec 13 14:23:05.112234 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:23:05.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:05.119582 dracut-pre-trigger[420]: rd.md=0: removing MD RAID activation Dec 13 14:23:05.134572 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:23:05.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:05.135107 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:23:05.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:05.195334 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:23:05.257883 kernel: VMware PVSCSI driver - version 1.0.7.0-k Dec 13 14:23:05.257921 kernel: vmw_pvscsi: using 64bit dma Dec 13 14:23:05.258925 kernel: vmw_pvscsi: max_id: 16 Dec 13 14:23:05.258944 kernel: vmw_pvscsi: setting ring_pages to 8 Dec 13 14:23:05.261713 kernel: VMware vmxnet3 virtual NIC driver - version 1.6.0.0-k-NAPI Dec 13 14:23:05.270717 kernel: vmxnet3 0000:0b:00.0: # of Tx queues : 2, # of Rx queues : 2 Dec 13 14:23:05.273569 kernel: vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps Dec 13 14:23:05.275713 kernel: libata version 3.00 loaded. Dec 13 14:23:05.280715 kernel: ata_piix 0000:00:07.1: version 2.13 Dec 13 14:23:05.292862 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:23:05.292875 kernel: scsi host1: ata_piix Dec 13 14:23:05.292948 kernel: scsi host2: ata_piix Dec 13 14:23:05.293048 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0x1060 irq 14 Dec 13 14:23:05.293057 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0x1068 irq 15 Dec 13 14:23:05.293065 kernel: vmw_pvscsi: enabling reqCallThreshold Dec 13 14:23:05.293072 kernel: vmw_pvscsi: driver-based request coalescing enabled Dec 13 14:23:05.293079 kernel: vmw_pvscsi: using MSI-X Dec 13 14:23:05.293088 kernel: vmxnet3 0000:0b:00.0 ens192: renamed from eth0 Dec 13 14:23:05.295718 kernel: scsi host0: VMware PVSCSI storage adapter rev 2, req/cmp/msg rings: 8/8/1 pages, cmd_per_lun=254 Dec 13 14:23:05.298560 kernel: vmw_pvscsi 0000:03:00.0: VMware PVSCSI rev 2 host #0 Dec 13 14:23:05.302278 kernel: scsi 0:0:0:0: Direct-Access VMware Virtual disk 2.0 PQ: 0 ANSI: 6 Dec 13 14:23:05.302354 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 14:23:05.302363 kernel: AES CTR mode by8 optimization enabled Dec 13 14:23:05.455773 kernel: ata2.00: ATAPI: VMware Virtual IDE CDROM Drive, 00000001, max UDMA/33 Dec 13 14:23:05.462125 kernel: scsi 2:0:0:0: CD-ROM NECVMWar VMware IDE CDR10 1.00 PQ: 0 ANSI: 5 Dec 13 14:23:05.473514 kernel: sd 0:0:0:0: [sda] 17805312 512-byte logical blocks: (9.12 GB/8.49 GiB) Dec 13 14:23:05.575105 kernel: sd 0:0:0:0: [sda] Write Protect is off Dec 13 14:23:05.575215 kernel: sd 0:0:0:0: [sda] Mode Sense: 31 00 00 00 Dec 13 14:23:05.575300 kernel: sd 0:0:0:0: [sda] Cache data unavailable Dec 13 14:23:05.575381 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through Dec 13 14:23:05.575461 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:23:05.575473 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Dec 13 14:23:05.594223 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 1x/1x writer dvd-ram cd/rw xa/form2 cdda tray Dec 13 14:23:05.626155 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 14:23:05.626168 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Dec 13 14:23:05.605081 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:23:05.605214 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:23:05.605863 systemd[1]: Starting disk-uuid.service... Dec 13 14:23:05.627599 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:23:05.629735 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (467) Dec 13 14:23:05.629915 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:23:05.636099 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:23:06.674283 disk-uuid[546]: The operation has completed successfully. Dec 13 14:23:06.676740 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:23:06.744828 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:23:06.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:06.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:06.744881 systemd[1]: Finished disk-uuid.service. Dec 13 14:23:06.745492 systemd[1]: Starting verity-setup.service... Dec 13 14:23:06.757719 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 14:23:06.811041 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:23:06.811921 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:23:06.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:06.813418 systemd[1]: Finished verity-setup.service. Dec 13 14:23:06.866721 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:23:06.866854 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:23:06.867427 systemd[1]: Starting afterburn-network-kargs.service... Dec 13 14:23:06.867878 systemd[1]: Starting ignition-setup.service... Dec 13 14:23:06.893165 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:23:06.893202 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:23:06.893211 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:23:06.898714 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 14:23:06.905698 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:23:06.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:06.912649 systemd[1]: Finished ignition-setup.service. Dec 13 14:23:06.913211 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:23:07.003807 systemd[1]: Finished afterburn-network-kargs.service. Dec 13 14:23:07.004419 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:23:07.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:07.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:07.047000 audit: BPF prog-id=9 op=LOAD Dec 13 14:23:07.049098 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:23:07.050002 systemd[1]: Starting systemd-networkd.service... Dec 13 14:23:07.064551 systemd-networkd[732]: lo: Link UP Dec 13 14:23:07.064557 systemd-networkd[732]: lo: Gained carrier Dec 13 14:23:07.064852 systemd-networkd[732]: Enumeration completed Dec 13 14:23:07.065054 systemd-networkd[732]: ens192: Configuring with /etc/systemd/network/10-dracut-cmdline-99.network. Dec 13 14:23:07.066774 systemd[1]: Started systemd-networkd.service. Dec 13 14:23:07.068859 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Dec 13 14:23:07.068953 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Dec 13 14:23:07.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:07.067181 systemd[1]: Reached target network.target. Dec 13 14:23:07.068318 systemd-networkd[732]: ens192: Link UP Dec 13 14:23:07.068320 systemd-networkd[732]: ens192: Gained carrier Dec 13 14:23:07.068506 systemd[1]: Starting iscsiuio.service... Dec 13 14:23:07.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:07.072300 systemd[1]: Started iscsiuio.service. Dec 13 14:23:07.072918 systemd[1]: Starting iscsid.service... Dec 13 14:23:07.074976 iscsid[737]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:23:07.074976 iscsid[737]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:23:07.074976 iscsid[737]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:23:07.074976 iscsid[737]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:23:07.074976 iscsid[737]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:23:07.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:07.077190 iscsid[737]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:23:07.076391 systemd[1]: Started iscsid.service. Dec 13 14:23:07.076971 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:23:07.084449 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:23:07.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:07.084646 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:23:07.084746 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:23:07.085070 systemd[1]: Reached target remote-fs.target. Dec 13 14:23:07.085606 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:23:07.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:07.090824 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:23:07.113369 ignition[603]: Ignition 2.14.0 Dec 13 14:23:07.113646 ignition[603]: Stage: fetch-offline Dec 13 14:23:07.113684 ignition[603]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:23:07.113700 ignition[603]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 14:23:07.116971 ignition[603]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 14:23:07.117211 ignition[603]: parsed url from cmdline: "" Dec 13 14:23:07.117253 ignition[603]: no config URL provided Dec 13 14:23:07.117369 ignition[603]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:23:07.117513 ignition[603]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:23:07.124909 ignition[603]: config successfully fetched Dec 13 14:23:07.124997 ignition[603]: parsing config with SHA512: fc7579a36dd85ed902116dac89ef0406b858a1af67a18d1d94591212ae92c58211076c5d509dfcb721313651783652c7b10ed3d340180df62d88badc78b695ef Dec 13 14:23:07.129014 unknown[603]: fetched base config from "system" Dec 13 14:23:07.129192 unknown[603]: fetched user config from "vmware" Dec 13 14:23:07.129678 ignition[603]: fetch-offline: fetch-offline passed Dec 13 14:23:07.129870 ignition[603]: Ignition finished successfully Dec 13 14:23:07.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:07.130479 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:23:07.130627 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 14:23:07.131189 systemd[1]: Starting ignition-kargs.service... Dec 13 14:23:07.136907 ignition[751]: Ignition 2.14.0 Dec 13 14:23:07.137169 ignition[751]: Stage: kargs Dec 13 14:23:07.137345 ignition[751]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:23:07.137509 ignition[751]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 14:23:07.138875 ignition[751]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 14:23:07.140539 ignition[751]: kargs: kargs passed Dec 13 14:23:07.140578 ignition[751]: Ignition finished successfully Dec 13 14:23:07.141498 systemd[1]: Finished ignition-kargs.service. Dec 13 14:23:07.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:07.142115 systemd[1]: Starting ignition-disks.service... Dec 13 14:23:07.146477 ignition[758]: Ignition 2.14.0 Dec 13 14:23:07.146733 ignition[758]: Stage: disks Dec 13 14:23:07.147063 ignition[758]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:23:07.147220 ignition[758]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 14:23:07.148587 ignition[758]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 14:23:07.150129 ignition[758]: disks: disks passed Dec 13 14:23:07.150294 ignition[758]: Ignition finished successfully Dec 13 14:23:07.150930 systemd[1]: Finished ignition-disks.service. Dec 13 14:23:07.151108 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:23:07.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:07.151219 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:23:07.151379 systemd[1]: Reached target local-fs.target. Dec 13 14:23:07.151542 systemd[1]: Reached target sysinit.target. Dec 13 14:23:07.151697 systemd[1]: Reached target basic.target. Dec 13 14:23:07.152344 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:23:07.227018 systemd-fsck[766]: ROOT: clean, 621/1628000 files, 124058/1617920 blocks Dec 13 14:23:07.228297 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:23:07.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:07.228940 systemd[1]: Mounting sysroot.mount... Dec 13 14:23:07.242719 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:23:07.242989 systemd[1]: Mounted sysroot.mount. Dec 13 14:23:07.243139 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:23:07.243989 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:23:07.244349 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 14:23:07.244370 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:23:07.244384 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:23:07.245825 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:23:07.246434 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:23:07.249367 initrd-setup-root[776]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:23:07.253076 initrd-setup-root[784]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:23:07.255693 initrd-setup-root[792]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:23:07.257975 initrd-setup-root[800]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:23:07.292231 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:23:07.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:07.292804 systemd[1]: Starting ignition-mount.service... Dec 13 14:23:07.293230 systemd[1]: Starting sysroot-boot.service... Dec 13 14:23:07.296666 bash[817]: umount: /sysroot/usr/share/oem: not mounted. Dec 13 14:23:07.301940 ignition[818]: INFO : Ignition 2.14.0 Dec 13 14:23:07.302196 ignition[818]: INFO : Stage: mount Dec 13 14:23:07.302375 ignition[818]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:23:07.302534 ignition[818]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 14:23:07.304113 ignition[818]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 14:23:07.306199 ignition[818]: INFO : mount: mount passed Dec 13 14:23:07.306345 ignition[818]: INFO : Ignition finished successfully Dec 13 14:23:07.306914 systemd[1]: Finished ignition-mount.service. Dec 13 14:23:07.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:07.315200 systemd[1]: Finished sysroot-boot.service. Dec 13 14:23:07.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:07.828258 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:23:07.836722 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (827) Dec 13 14:23:07.839008 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:23:07.839026 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:23:07.839034 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:23:07.843720 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 14:23:07.844891 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:23:07.845577 systemd[1]: Starting ignition-files.service... Dec 13 14:23:07.854644 ignition[847]: INFO : Ignition 2.14.0 Dec 13 14:23:07.854644 ignition[847]: INFO : Stage: files Dec 13 14:23:07.854982 ignition[847]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:23:07.854982 ignition[847]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 14:23:07.856254 ignition[847]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 14:23:07.858396 ignition[847]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:23:07.858811 ignition[847]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:23:07.858811 ignition[847]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:23:07.860950 ignition[847]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:23:07.861152 ignition[847]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:23:07.861989 unknown[847]: wrote ssh authorized keys file for user: core Dec 13 14:23:07.862431 ignition[847]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:23:07.862903 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 14:23:07.862903 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 14:23:08.020260 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 13 14:23:08.098383 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 14:23:08.098647 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:23:08.098962 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:23:08.099144 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:23:08.135795 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:23:08.136057 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:23:08.136339 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:23:08.136552 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:23:08.136799 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:23:08.156722 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:23:08.157004 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:23:08.157190 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:23:08.157444 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:23:08.163112 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Dec 13 14:23:08.163344 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:23:08.196019 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2860013411" Dec 13 14:23:08.196261 ignition[847]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2860013411": device or resource busy Dec 13 14:23:08.196465 ignition[847]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2860013411", trying btrfs: device or resource busy Dec 13 14:23:08.196695 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2860013411" Dec 13 14:23:08.198767 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (852) Dec 13 14:23:08.198793 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2860013411" Dec 13 14:23:08.210461 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem2860013411" Dec 13 14:23:08.210686 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem2860013411" Dec 13 14:23:08.210904 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Dec 13 14:23:08.211110 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:23:08.211290 systemd[1]: mnt-oem2860013411.mount: Deactivated successfully. Dec 13 14:23:08.211700 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-x86-64.raw: attempt #1 Dec 13 14:23:08.692231 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Dec 13 14:23:08.899714 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 14:23:08.903972 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/network/00-vmware.network" Dec 13 14:23:08.904254 ignition[847]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/network/00-vmware.network" Dec 13 14:23:08.904447 ignition[847]: INFO : files: op(10): [started] processing unit "vmtoolsd.service" Dec 13 14:23:08.904588 ignition[847]: INFO : files: op(10): [finished] processing unit "vmtoolsd.service" Dec 13 14:23:08.904751 ignition[847]: INFO : files: op(11): [started] processing unit "prepare-helm.service" Dec 13 14:23:08.904916 ignition[847]: INFO : files: op(11): op(12): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:23:08.905152 ignition[847]: INFO : files: op(11): op(12): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:23:08.905336 ignition[847]: INFO : files: op(11): [finished] processing unit "prepare-helm.service" Dec 13 14:23:08.905480 ignition[847]: INFO : files: op(13): [started] processing unit "coreos-metadata.service" Dec 13 14:23:08.905644 ignition[847]: INFO : files: op(13): op(14): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 14:23:08.905885 ignition[847]: INFO : files: op(13): op(14): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 14:23:08.906071 ignition[847]: INFO : files: op(13): [finished] processing unit "coreos-metadata.service" Dec 13 14:23:08.906216 ignition[847]: INFO : files: op(15): [started] setting preset to enabled for "prepare-helm.service" Dec 13 14:23:08.906414 ignition[847]: INFO : files: op(15): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 14:23:08.906568 ignition[847]: INFO : files: op(16): [started] setting preset to disabled for "coreos-metadata.service" Dec 13 14:23:08.906848 systemd-networkd[732]: ens192: Gained IPv6LL Dec 13 14:23:08.907158 ignition[847]: INFO : files: op(16): op(17): [started] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 14:23:09.126456 ignition[847]: INFO : files: op(16): op(17): [finished] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 14:23:09.126730 ignition[847]: INFO : files: op(16): [finished] setting preset to disabled for "coreos-metadata.service" Dec 13 14:23:09.126899 ignition[847]: INFO : files: op(18): [started] setting preset to enabled for "vmtoolsd.service" Dec 13 14:23:09.127080 ignition[847]: INFO : files: op(18): [finished] setting preset to enabled for "vmtoolsd.service" Dec 13 14:23:09.127341 ignition[847]: INFO : files: createResultFile: createFiles: op(19): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:23:09.127589 ignition[847]: INFO : files: createResultFile: createFiles: op(19): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:23:09.127783 ignition[847]: INFO : files: files passed Dec 13 14:23:09.127918 ignition[847]: INFO : Ignition finished successfully Dec 13 14:23:09.129432 systemd[1]: Finished ignition-files.service. Dec 13 14:23:09.133048 kernel: kauditd_printk_skb: 24 callbacks suppressed Dec 13 14:23:09.133063 kernel: audit: type=1130 audit(1734099789.127:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.130068 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:23:09.133114 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:23:09.133506 systemd[1]: Starting ignition-quench.service... Dec 13 14:23:09.135940 initrd-setup-root-after-ignition[873]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:23:09.136087 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:23:09.141126 kernel: audit: type=1130 audit(1734099789.134:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.141142 kernel: audit: type=1131 audit(1734099789.134:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.136142 systemd[1]: Finished ignition-quench.service. Dec 13 14:23:09.143835 kernel: audit: type=1130 audit(1734099789.139:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.136463 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:23:09.141285 systemd[1]: Reached target ignition-complete.target. Dec 13 14:23:09.144668 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:23:09.152768 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:23:09.152976 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:23:09.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.153300 systemd[1]: Reached target initrd-fs.target. Dec 13 14:23:09.157958 kernel: audit: type=1130 audit(1734099789.151:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.157973 kernel: audit: type=1131 audit(1734099789.151:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.158101 systemd[1]: Reached target initrd.target. Dec 13 14:23:09.158331 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:23:09.158975 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:23:09.165794 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:23:09.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.166589 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:23:09.169424 kernel: audit: type=1130 audit(1734099789.164:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.173820 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:23:09.173871 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:23:09.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.174453 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:23:09.178885 kernel: audit: type=1130 audit(1734099789.172:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.178907 kernel: audit: type=1131 audit(1734099789.172:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.179038 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:23:09.179273 systemd[1]: Stopped target timers.target. Dec 13 14:23:09.179497 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:23:09.179661 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:23:09.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.180025 systemd[1]: Stopped target initrd.target. Dec 13 14:23:09.182501 systemd[1]: Stopped target basic.target. Dec 13 14:23:09.182699 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:23:09.182825 kernel: audit: type=1131 audit(1734099789.178:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.182934 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:23:09.183142 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:23:09.183353 systemd[1]: Stopped target remote-fs.target. Dec 13 14:23:09.183623 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:23:09.183831 systemd[1]: Stopped target sysinit.target. Dec 13 14:23:09.183992 systemd[1]: Stopped target local-fs.target. Dec 13 14:23:09.184138 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:23:09.184305 systemd[1]: Stopped target swap.target. Dec 13 14:23:09.184475 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:23:09.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.184504 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:23:09.184655 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:23:09.184862 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:23:09.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.184911 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:23:09.185051 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:23:09.185074 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:23:09.185201 systemd[1]: Stopped target paths.target. Dec 13 14:23:09.185324 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:23:09.189740 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:23:09.189860 systemd[1]: Stopped target slices.target. Dec 13 14:23:09.190161 systemd[1]: Stopped target sockets.target. Dec 13 14:23:09.190331 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:23:09.190366 systemd[1]: Closed iscsid.socket. Dec 13 14:23:09.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.190522 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:23:09.190547 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:23:09.190683 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:23:09.190708 systemd[1]: Stopped ignition-files.service. Dec 13 14:23:09.191252 systemd[1]: Stopping ignition-mount.service... Dec 13 14:23:09.192049 systemd[1]: Stopping iscsiuio.service... Dec 13 14:23:09.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.193738 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:23:09.193911 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:23:09.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.194633 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:23:09.194877 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:23:09.195040 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:23:09.195294 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:23:09.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.195476 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:23:09.196003 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:23:09.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.196224 systemd[1]: Stopped iscsiuio.service. Dec 13 14:23:09.196483 ignition[886]: INFO : Ignition 2.14.0 Dec 13 14:23:09.196483 ignition[886]: INFO : Stage: umount Dec 13 14:23:09.196795 ignition[886]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:23:09.196795 ignition[886]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 14:23:09.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.197168 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:23:09.197313 systemd[1]: Closed iscsiuio.socket. Dec 13 14:23:09.198738 ignition[886]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 14:23:09.204301 ignition[886]: INFO : umount: umount passed Dec 13 14:23:09.204301 ignition[886]: INFO : Ignition finished successfully Dec 13 14:23:09.205006 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:23:09.205392 systemd[1]: Stopped ignition-mount.service. Dec 13 14:23:09.203000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.206358 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:23:09.206675 systemd[1]: Stopped target network.target. Dec 13 14:23:09.206936 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:23:09.207088 systemd[1]: Stopped ignition-disks.service. Dec 13 14:23:09.205000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.207353 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:23:09.207505 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:23:09.205000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.207815 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:23:09.207966 systemd[1]: Stopped ignition-setup.service. Dec 13 14:23:09.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.208289 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:23:09.208567 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:23:09.212267 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:23:09.212470 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:23:09.210000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.213831 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:23:09.214043 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:23:09.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.214672 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:23:09.213000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:23:09.214886 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:23:09.215483 systemd[1]: Stopping network-cleanup.service... Dec 13 14:23:09.215855 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:23:09.216020 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:23:09.214000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.216303 systemd[1]: afterburn-network-kargs.service: Deactivated successfully. Dec 13 14:23:09.216473 systemd[1]: Stopped afterburn-network-kargs.service. Dec 13 14:23:09.214000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.215000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:23:09.216835 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:23:09.216989 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:23:09.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.217279 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:23:09.217438 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:23:09.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.217746 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:23:09.219924 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:23:09.222072 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:23:09.222130 systemd[1]: Stopped network-cleanup.service. Dec 13 14:23:09.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.224686 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:23:09.224762 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:23:09.223000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.225018 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:23:09.225037 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:23:09.225305 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:23:09.225320 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:23:09.223000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.225459 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:23:09.224000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.225479 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:23:09.224000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.225650 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:23:09.225669 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:23:09.225833 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:23:09.225853 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:23:09.226377 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:23:09.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.226536 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:23:09.226559 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:23:09.230156 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:23:09.230206 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:23:09.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.311014 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:23:09.311075 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:23:09.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.311350 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:23:09.311454 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:23:09.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:09.311478 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:23:09.312021 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:23:09.318516 systemd[1]: Switching root. Dec 13 14:23:09.334910 iscsid[737]: iscsid shutting down. Dec 13 14:23:09.335071 systemd-journald[217]: Journal stopped Dec 13 14:23:12.046097 systemd-journald[217]: Received SIGTERM from PID 1 (systemd). Dec 13 14:23:12.046114 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:23:12.046122 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:23:12.046130 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:23:12.046135 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:23:12.046142 kernel: SELinux: policy capability open_perms=1 Dec 13 14:23:12.046148 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:23:12.046154 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:23:12.046159 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:23:12.046164 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:23:12.046169 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:23:12.046175 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:23:12.046181 systemd[1]: Successfully loaded SELinux policy in 39.642ms. Dec 13 14:23:12.046188 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 9.775ms. Dec 13 14:23:12.046196 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:23:12.046202 systemd[1]: Detected virtualization vmware. Dec 13 14:23:12.046209 systemd[1]: Detected architecture x86-64. Dec 13 14:23:12.046215 systemd[1]: Detected first boot. Dec 13 14:23:12.046222 systemd[1]: Initializing machine ID from random generator. Dec 13 14:23:12.046228 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:23:12.046234 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:23:12.046240 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:23:12.046247 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:23:12.046254 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:23:12.046263 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:23:12.046269 systemd[1]: Stopped iscsid.service. Dec 13 14:23:12.046275 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:23:12.046282 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:23:12.046288 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:23:12.046295 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:23:12.046301 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:23:12.046308 systemd[1]: Created slice system-getty.slice. Dec 13 14:23:12.046314 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:23:12.046321 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:23:12.046327 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:23:12.046333 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:23:12.046339 systemd[1]: Created slice user.slice. Dec 13 14:23:12.046345 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:23:12.046351 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:23:12.046358 systemd[1]: Set up automount boot.automount. Dec 13 14:23:12.046365 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:23:12.046373 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:23:12.046379 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:23:12.046386 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:23:12.046392 systemd[1]: Reached target integritysetup.target. Dec 13 14:23:12.046399 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:23:12.046406 systemd[1]: Reached target remote-fs.target. Dec 13 14:23:12.046412 systemd[1]: Reached target slices.target. Dec 13 14:23:12.046420 systemd[1]: Reached target swap.target. Dec 13 14:23:12.046426 systemd[1]: Reached target torcx.target. Dec 13 14:23:12.046432 systemd[1]: Reached target veritysetup.target. Dec 13 14:23:12.046439 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:23:12.046445 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:23:12.046452 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:23:12.046460 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:23:12.046466 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:23:12.046473 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:23:12.046479 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:23:12.046486 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:23:12.046492 systemd[1]: Mounting media.mount... Dec 13 14:23:12.046499 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:23:12.046507 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:23:12.046513 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:23:12.046520 systemd[1]: Mounting tmp.mount... Dec 13 14:23:12.046526 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:23:12.046533 systemd[1]: Starting ignition-delete-config.service... Dec 13 14:23:12.046540 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:23:12.046547 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:23:12.046553 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:23:12.046560 systemd[1]: Starting modprobe@drm.service... Dec 13 14:23:12.046567 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:23:12.046574 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:23:12.046581 systemd[1]: Starting modprobe@loop.service... Dec 13 14:23:12.046587 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:23:12.046594 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:23:12.046601 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:23:12.046607 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:23:12.046614 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:23:12.046621 systemd[1]: Stopped systemd-journald.service. Dec 13 14:23:12.046628 systemd[1]: Starting systemd-journald.service... Dec 13 14:23:12.046635 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:23:12.046642 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:23:12.046648 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:23:12.046655 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:23:12.046661 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:23:12.046668 systemd[1]: Stopped verity-setup.service. Dec 13 14:23:12.046674 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:23:12.046682 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:23:12.046689 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:23:12.046696 systemd[1]: Mounted media.mount. Dec 13 14:23:12.046715 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:23:12.046726 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:23:12.046733 systemd[1]: Mounted tmp.mount. Dec 13 14:23:12.046739 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:23:12.046746 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:23:12.046753 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:23:12.046760 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:23:12.046768 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:23:12.046776 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:23:12.046783 systemd[1]: Finished modprobe@drm.service. Dec 13 14:23:12.046790 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:23:12.046814 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:23:12.046823 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:23:12.046830 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:23:12.046837 systemd[1]: Reached target network-pre.target. Dec 13 14:23:12.046845 systemd-journald[1000]: Journal started Dec 13 14:23:12.046878 systemd-journald[1000]: Runtime Journal (/run/log/journal/fe1db627c26e42d48769709642a0be39) is 4.8M, max 38.8M, 34.0M free. Dec 13 14:23:09.851000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:23:10.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:23:10.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:23:10.098000 audit: BPF prog-id=10 op=LOAD Dec 13 14:23:10.098000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:23:10.098000 audit: BPF prog-id=11 op=LOAD Dec 13 14:23:10.098000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:23:10.200000 audit[920]: AVC avc: denied { associate } for pid=920 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:23:10.200000 audit[920]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8b2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=903 pid=920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.200000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:23:10.202000 audit[920]: AVC avc: denied { associate } for pid=920 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:23:10.202000 audit[920]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d989 a2=1ed a3=0 items=2 ppid=903 pid=920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:10.202000 audit: CWD cwd="/" Dec 13 14:23:10.202000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:10.202000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:10.202000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:23:11.919000 audit: BPF prog-id=12 op=LOAD Dec 13 14:23:11.919000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:23:11.919000 audit: BPF prog-id=13 op=LOAD Dec 13 14:23:11.919000 audit: BPF prog-id=14 op=LOAD Dec 13 14:23:11.919000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:23:11.919000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:23:11.921000 audit: BPF prog-id=15 op=LOAD Dec 13 14:23:11.921000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:23:11.921000 audit: BPF prog-id=16 op=LOAD Dec 13 14:23:11.921000 audit: BPF prog-id=17 op=LOAD Dec 13 14:23:11.921000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:23:11.921000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:23:11.921000 audit: BPF prog-id=18 op=LOAD Dec 13 14:23:11.921000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:23:11.921000 audit: BPF prog-id=19 op=LOAD Dec 13 14:23:11.921000 audit: BPF prog-id=20 op=LOAD Dec 13 14:23:11.921000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:23:11.921000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:23:11.922000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:11.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:11.926000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:23:11.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:11.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:11.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:11.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:11.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:11.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:11.996000 audit: BPF prog-id=21 op=LOAD Dec 13 14:23:11.996000 audit: BPF prog-id=22 op=LOAD Dec 13 14:23:11.997000 audit: BPF prog-id=23 op=LOAD Dec 13 14:23:11.997000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:23:11.997000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:23:12.017000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:12.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:12.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:12.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:12.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:12.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:12.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:12.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:12.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:12.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:12.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:12.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:12.042000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:23:12.042000 audit[1000]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffffcd18200 a2=4000 a3=7ffffcd1829c items=0 ppid=1 pid=1000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:12.042000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:23:11.920269 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:23:10.199996 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:23:10Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:23:11.923997 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:23:10.200497 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:23:10Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:23:10.200510 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:23:10Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:23:10.200530 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:23:10Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:23:10.200536 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:23:10Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:23:10.200555 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:23:10Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:23:10.200563 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:23:10Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:23:10.200688 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:23:10Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:23:12.049788 jq[987]: true Dec 13 14:23:10.200720 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:23:10Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:23:10.200728 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:23:10Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:23:10.201475 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:23:10Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:23:10.201495 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:23:10Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:23:10.201506 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:23:10Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:23:10.201515 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:23:10Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:23:10.201525 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:23:10Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:23:10.201532 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:23:10Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:23:11.676898 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:23:11Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:23:11.677061 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:23:11Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:23:11.677132 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:23:11Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:23:11.677249 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:23:11Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:23:12.050733 jq[1009]: true Dec 13 14:23:12.054104 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:23:12.054119 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:23:11.677281 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:23:11Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:23:11.677334 /usr/lib/systemd/system-generators/torcx-generator[920]: time="2024-12-13T14:23:11Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:23:12.061200 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:23:12.061228 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:23:12.062721 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:23:12.065007 systemd[1]: Started systemd-journald.service. Dec 13 14:23:12.065032 kernel: fuse: init (API version 7.34) Dec 13 14:23:12.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:12.065226 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:23:12.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:12.065405 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:23:12.067836 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:23:12.069003 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:23:12.073988 systemd-journald[1000]: Time spent on flushing to /var/log/journal/fe1db627c26e42d48769709642a0be39 is 62.865ms for 2001 entries. Dec 13 14:23:12.073988 systemd-journald[1000]: System Journal (/var/log/journal/fe1db627c26e42d48769709642a0be39) is 8.0M, max 584.8M, 576.8M free. Dec 13 14:23:12.144900 systemd-journald[1000]: Received client request to flush runtime journal. Dec 13 14:23:12.144949 kernel: loop: module loaded Dec 13 14:23:12.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:12.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:12.075000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:12.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:12.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:12.105000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:12.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:12.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:12.075665 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:23:12.075912 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:23:12.076656 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:23:12.076749 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:23:12.077668 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:23:12.079878 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:23:12.102388 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:23:12.107056 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:23:12.107134 systemd[1]: Finished modprobe@loop.service. Dec 13 14:23:12.107312 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:23:12.134984 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:23:12.135946 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:23:12.145617 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:23:12.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:12.172027 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:23:12.173356 ignition[1015]: Ignition 2.14.0 Dec 13 14:23:12.173550 ignition[1015]: deleting config from guestinfo properties Dec 13 14:23:12.175641 ignition[1015]: Successfully deleted config Dec 13 14:23:12.176095 systemd[1]: Finished ignition-delete-config.service. Dec 13 14:23:12.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ignition-delete-config comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:12.187898 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:23:12.188831 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:23:12.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:12.193891 udevadm[1051]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 14:23:12.496053 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:23:12.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:12.495000 audit: BPF prog-id=24 op=LOAD Dec 13 14:23:12.495000 audit: BPF prog-id=25 op=LOAD Dec 13 14:23:12.495000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:23:12.495000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:23:12.497200 systemd[1]: Starting systemd-udevd.service... Dec 13 14:23:12.508628 systemd-udevd[1052]: Using default interface naming scheme 'v252'. Dec 13 14:23:12.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:12.526000 audit: BPF prog-id=26 op=LOAD Dec 13 14:23:12.527661 systemd[1]: Started systemd-udevd.service. Dec 13 14:23:12.528908 systemd[1]: Starting systemd-networkd.service... Dec 13 14:23:12.533000 audit: BPF prog-id=27 op=LOAD Dec 13 14:23:12.534000 audit: BPF prog-id=28 op=LOAD Dec 13 14:23:12.534000 audit: BPF prog-id=29 op=LOAD Dec 13 14:23:12.536144 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:23:12.563229 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:23:12.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:12.566043 systemd[1]: Started systemd-userdbd.service. Dec 13 14:23:12.609750 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1057) Dec 13 14:23:12.611718 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 14:23:12.611803 systemd-networkd[1061]: lo: Link UP Dec 13 14:23:12.611808 systemd-networkd[1061]: lo: Gained carrier Dec 13 14:23:12.612266 systemd-networkd[1061]: Enumeration completed Dec 13 14:23:12.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:12.612324 systemd[1]: Started systemd-networkd.service. Dec 13 14:23:12.612733 systemd-networkd[1061]: ens192: Configuring with /etc/systemd/network/00-vmware.network. Dec 13 14:23:12.614749 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Dec 13 14:23:12.614857 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Dec 13 14:23:12.615738 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens192: link becomes ready Dec 13 14:23:12.617079 kernel: ACPI: button: Power Button [PWRF] Dec 13 14:23:12.616939 systemd-networkd[1061]: ens192: Link UP Dec 13 14:23:12.617014 systemd-networkd[1061]: ens192: Gained carrier Dec 13 14:23:12.636298 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:23:12.667000 audit[1054]: AVC avc: denied { confidentiality } for pid=1054 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:23:12.667000 audit[1054]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55966d1aa540 a1=337fc a2=7f4674ce6bc5 a3=5 items=110 ppid=1052 pid=1054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:12.667000 audit: CWD cwd="/" Dec 13 14:23:12.667000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=1 name=(null) inode=24522 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=2 name=(null) inode=24522 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=3 name=(null) inode=24523 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=4 name=(null) inode=24522 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=5 name=(null) inode=24524 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=6 name=(null) inode=24522 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=7 name=(null) inode=24525 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=8 name=(null) inode=24525 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=9 name=(null) inode=24526 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=10 name=(null) inode=24525 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=11 name=(null) inode=24527 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=12 name=(null) inode=24525 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=13 name=(null) inode=24528 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=14 name=(null) inode=24525 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=15 name=(null) inode=24529 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=16 name=(null) inode=24525 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=17 name=(null) inode=24530 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=18 name=(null) inode=24522 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=19 name=(null) inode=24531 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=20 name=(null) inode=24531 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=21 name=(null) inode=24532 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=22 name=(null) inode=24531 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=23 name=(null) inode=24533 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=24 name=(null) inode=24531 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=25 name=(null) inode=24534 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=26 name=(null) inode=24531 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=27 name=(null) inode=24535 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=28 name=(null) inode=24531 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=29 name=(null) inode=24536 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=30 name=(null) inode=24522 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=31 name=(null) inode=24537 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=32 name=(null) inode=24537 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=33 name=(null) inode=24538 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=34 name=(null) inode=24537 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=35 name=(null) inode=24539 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=36 name=(null) inode=24537 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=37 name=(null) inode=24540 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=38 name=(null) inode=24537 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=39 name=(null) inode=24541 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=40 name=(null) inode=24537 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=41 name=(null) inode=24542 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=42 name=(null) inode=24522 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=43 name=(null) inode=24543 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=44 name=(null) inode=24543 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=45 name=(null) inode=24544 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=46 name=(null) inode=24543 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=47 name=(null) inode=24545 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=48 name=(null) inode=24543 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=49 name=(null) inode=24546 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=50 name=(null) inode=24543 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=51 name=(null) inode=24547 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=52 name=(null) inode=24543 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=53 name=(null) inode=24548 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=55 name=(null) inode=24549 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=56 name=(null) inode=24549 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=57 name=(null) inode=24550 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=58 name=(null) inode=24549 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=59 name=(null) inode=24551 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=60 name=(null) inode=24549 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=61 name=(null) inode=24552 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=62 name=(null) inode=24552 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=63 name=(null) inode=24553 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=64 name=(null) inode=24552 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=65 name=(null) inode=24554 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=66 name=(null) inode=24552 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=67 name=(null) inode=24555 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=68 name=(null) inode=24552 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=69 name=(null) inode=24556 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=70 name=(null) inode=24552 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=71 name=(null) inode=24557 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=72 name=(null) inode=24549 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=73 name=(null) inode=24558 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=74 name=(null) inode=24558 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=75 name=(null) inode=24559 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=76 name=(null) inode=24558 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=77 name=(null) inode=24560 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=78 name=(null) inode=24558 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=79 name=(null) inode=24561 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=80 name=(null) inode=24558 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=81 name=(null) inode=24562 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=82 name=(null) inode=24558 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=83 name=(null) inode=24563 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=84 name=(null) inode=24549 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=85 name=(null) inode=24564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=86 name=(null) inode=24564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=87 name=(null) inode=24565 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=88 name=(null) inode=24564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=89 name=(null) inode=24566 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=90 name=(null) inode=24564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=91 name=(null) inode=24567 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=92 name=(null) inode=24564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=93 name=(null) inode=24568 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=94 name=(null) inode=24564 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=95 name=(null) inode=24569 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=96 name=(null) inode=24549 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=97 name=(null) inode=24570 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=98 name=(null) inode=24570 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=99 name=(null) inode=24571 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=100 name=(null) inode=24570 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=101 name=(null) inode=24572 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=102 name=(null) inode=24570 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=103 name=(null) inode=24573 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=104 name=(null) inode=24570 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=105 name=(null) inode=24574 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=106 name=(null) inode=24570 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=107 name=(null) inode=24575 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PATH item=109 name=(null) inode=24576 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:23:12.667000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:23:12.673730 kernel: piix4_smbus 0000:00:07.3: SMBus Host Controller not enabled! Dec 13 14:23:12.678980 kernel: vmw_vmci 0000:00:07.7: Found VMCI PCI device at 0x11080, irq 16 Dec 13 14:23:12.679338 kernel: vmw_vmci 0000:00:07.7: Using capabilities 0xc Dec 13 14:23:12.680071 kernel: Guest personality initialized and is active Dec 13 14:23:12.681414 kernel: VMCI host device registered (name=vmci, major=10, minor=125) Dec 13 14:23:12.681436 kernel: Initialized host personality Dec 13 14:23:12.720717 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input3 Dec 13 14:23:12.723720 (udev-worker)[1058]: id: Truncating stdout of 'dmi_memory_id' up to 16384 byte. Dec 13 14:23:12.727715 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:23:12.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:12.741036 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:23:12.741963 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:23:12.760842 lvm[1085]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:23:12.784222 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:23:12.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:12.784384 systemd[1]: Reached target cryptsetup.target. Dec 13 14:23:12.785230 systemd[1]: Starting lvm2-activation.service... Dec 13 14:23:12.787585 lvm[1086]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:23:12.806337 systemd[1]: Finished lvm2-activation.service. Dec 13 14:23:12.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:12.806493 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:23:12.806586 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:23:12.806603 systemd[1]: Reached target local-fs.target. Dec 13 14:23:12.806689 systemd[1]: Reached target machines.target. Dec 13 14:23:12.807636 systemd[1]: Starting ldconfig.service... Dec 13 14:23:12.808177 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:23:12.808210 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:23:12.808871 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:23:12.809477 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:23:12.810279 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:23:12.811032 systemd[1]: Starting systemd-sysext.service... Dec 13 14:23:12.822889 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1088 (bootctl) Dec 13 14:23:12.823581 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:23:12.832107 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:23:12.834040 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:23:12.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:12.843628 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:23:12.843739 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:23:12.864725 kernel: loop0: detected capacity change from 0 to 211296 Dec 13 14:23:13.103320 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:23:13.104308 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:23:13.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.153801 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:23:13.175110 systemd-fsck[1097]: fsck.fat 4.2 (2021-01-31) Dec 13 14:23:13.175110 systemd-fsck[1097]: /dev/sda1: 789 files, 119291/258078 clusters Dec 13 14:23:13.175723 kernel: loop1: detected capacity change from 0 to 211296 Dec 13 14:23:13.178254 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:23:13.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.179519 systemd[1]: Mounting boot.mount... Dec 13 14:23:13.193575 systemd[1]: Mounted boot.mount. Dec 13 14:23:13.200789 (sd-sysext)[1100]: Using extensions 'kubernetes'. Dec 13 14:23:13.201005 (sd-sysext)[1100]: Merged extensions into '/usr'. Dec 13 14:23:13.203781 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:23:13.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.213577 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:23:13.214747 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:23:13.215476 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:23:13.217163 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:23:13.217887 systemd[1]: Starting modprobe@loop.service... Dec 13 14:23:13.218012 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:23:13.218093 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:23:13.218168 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:23:13.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.219000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.220999 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:23:13.221240 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:23:13.221315 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:23:13.221603 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:23:13.221668 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:23:13.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.221961 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:23:13.222047 systemd[1]: Finished modprobe@loop.service. Dec 13 14:23:13.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.222377 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:23:13.222435 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:23:13.223417 systemd[1]: Finished systemd-sysext.service. Dec 13 14:23:13.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.224584 systemd[1]: Starting ensure-sysext.service... Dec 13 14:23:13.225512 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:23:13.231276 systemd[1]: Reloading. Dec 13 14:23:13.243925 systemd-tmpfiles[1108]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:23:13.247985 systemd-tmpfiles[1108]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:23:13.259833 systemd-tmpfiles[1108]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:23:13.277451 /usr/lib/systemd/system-generators/torcx-generator[1127]: time="2024-12-13T14:23:13Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:23:13.277467 /usr/lib/systemd/system-generators/torcx-generator[1127]: time="2024-12-13T14:23:13Z" level=info msg="torcx already run" Dec 13 14:23:13.349877 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:23:13.349887 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:23:13.361490 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:23:13.396000 audit: BPF prog-id=30 op=LOAD Dec 13 14:23:13.397000 audit: BPF prog-id=31 op=LOAD Dec 13 14:23:13.397000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:23:13.397000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:23:13.397000 audit: BPF prog-id=32 op=LOAD Dec 13 14:23:13.397000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:23:13.397000 audit: BPF prog-id=33 op=LOAD Dec 13 14:23:13.398000 audit: BPF prog-id=34 op=LOAD Dec 13 14:23:13.398000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:23:13.398000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:23:13.398000 audit: BPF prog-id=35 op=LOAD Dec 13 14:23:13.398000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:23:13.398000 audit: BPF prog-id=36 op=LOAD Dec 13 14:23:13.398000 audit: BPF prog-id=37 op=LOAD Dec 13 14:23:13.398000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:23:13.398000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:23:13.399000 audit: BPF prog-id=38 op=LOAD Dec 13 14:23:13.399000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:23:13.402511 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:23:13.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.405295 systemd[1]: Starting audit-rules.service... Dec 13 14:23:13.406143 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:23:13.405000 audit: BPF prog-id=39 op=LOAD Dec 13 14:23:13.407016 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:23:13.408104 systemd[1]: Starting systemd-resolved.service... Dec 13 14:23:13.408000 audit: BPF prog-id=40 op=LOAD Dec 13 14:23:13.410260 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:23:13.412024 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:23:13.417030 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:23:13.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.418676 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:23:13.419361 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:23:13.420163 systemd[1]: Starting modprobe@loop.service... Dec 13 14:23:13.420285 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:23:13.420353 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:23:13.420426 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:23:13.421060 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:23:13.421144 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:23:13.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.422523 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:23:13.422593 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:23:13.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.422850 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:23:13.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.422000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.423859 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:23:13.423931 systemd[1]: Finished modprobe@loop.service. Dec 13 14:23:13.424191 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:23:13.428342 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:23:13.429035 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:23:13.429878 systemd[1]: Starting modprobe@loop.service... Dec 13 14:23:13.430122 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:23:13.430196 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:23:13.430317 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:23:13.430747 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:23:13.430819 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:23:13.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.429000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.433893 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:23:13.434806 systemd[1]: Starting modprobe@drm.service... Dec 13 14:23:13.434958 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:23:13.435028 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:23:13.436103 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:23:13.436313 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:23:13.438228 systemd[1]: Finished ensure-sysext.service. Dec 13 14:23:13.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.444000 audit[1193]: SYSTEM_BOOT pid=1193 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.447213 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:23:13.449071 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:23:13.449163 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:23:13.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.449378 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:23:13.449440 systemd[1]: Finished modprobe@loop.service. Dec 13 14:23:13.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.449591 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:23:13.451898 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:23:13.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.452106 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:23:13.452185 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:23:13.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.452342 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:23:13.460321 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:23:13.460393 systemd[1]: Finished modprobe@drm.service. Dec 13 14:23:13.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.458000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.466500 ldconfig[1087]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:23:13.482614 systemd[1]: Finished ldconfig.service. Dec 13 14:23:13.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:23:13.483580 systemd[1]: Starting systemd-update-done.service... Dec 13 14:23:13.482000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:23:13.482000 audit[1217]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe5183f940 a2=420 a3=0 items=0 ppid=1188 pid=1217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:23:13.484342 augenrules[1217]: No rules Dec 13 14:23:13.482000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:23:13.484767 systemd[1]: Finished audit-rules.service. Dec 13 14:23:13.487948 systemd[1]: Finished systemd-update-done.service. Dec 13 14:23:13.494285 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:23:13.494412 systemd[1]: Reached target time-set.target. Dec 13 14:23:13.494814 systemd-resolved[1191]: Positive Trust Anchors: Dec 13 14:23:13.494937 systemd-resolved[1191]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:23:13.494993 systemd-resolved[1191]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:23:13.514282 systemd-resolved[1191]: Defaulting to hostname 'linux'. Dec 13 14:23:13.515251 systemd[1]: Started systemd-resolved.service. Dec 13 14:23:13.515384 systemd[1]: Reached target network.target. Dec 13 14:23:13.515476 systemd[1]: Reached target nss-lookup.target. Dec 13 14:23:13.515570 systemd[1]: Reached target sysinit.target. Dec 13 14:23:13.515710 systemd[1]: Started motdgen.path. Dec 13 14:23:13.515810 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:23:13.515992 systemd[1]: Started logrotate.timer. Dec 13 14:23:13.516113 systemd[1]: Started mdadm.timer. Dec 13 14:23:13.516226 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:23:13.516318 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:23:13.516336 systemd[1]: Reached target paths.target. Dec 13 14:23:13.516416 systemd[1]: Reached target timers.target. Dec 13 14:23:13.516646 systemd[1]: Listening on dbus.socket. Dec 13 14:23:13.517455 systemd[1]: Starting docker.socket... Dec 13 14:23:13.519127 systemd[1]: Listening on sshd.socket. Dec 13 14:23:13.519274 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:23:13.519509 systemd[1]: Listening on docker.socket. Dec 13 14:23:13.519630 systemd[1]: Reached target sockets.target. Dec 13 14:23:13.519753 systemd[1]: Reached target basic.target. Dec 13 14:23:13.519864 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:23:13.519878 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:23:13.520490 systemd[1]: Starting containerd.service... Dec 13 14:23:13.521266 systemd[1]: Starting dbus.service... Dec 13 14:23:13.522033 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:23:13.523235 systemd[1]: Starting extend-filesystems.service... Dec 13 14:23:13.524357 jq[1228]: false Dec 13 14:23:13.523356 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:23:13.524350 systemd[1]: Starting motdgen.service... Dec 13 14:23:13.525539 systemd[1]: Starting prepare-helm.service... Dec 13 14:23:13.526783 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:23:13.527531 systemd[1]: Starting sshd-keygen.service... Dec 13 14:23:13.531220 systemd[1]: Starting systemd-logind.service... Dec 13 14:23:13.531325 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:23:13.531362 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:23:13.531753 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:23:13.532231 systemd[1]: Starting update-engine.service... Dec 13 14:23:13.533201 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:23:13.534339 systemd[1]: Starting vmtoolsd.service... Dec 13 14:23:13.536436 jq[1239]: true Dec 13 14:23:13.536430 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:23:13.536547 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:23:13.541329 jq[1244]: true Dec 13 14:23:13.547750 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:23:13.547847 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:23:13.562241 systemd[1]: Started vmtoolsd.service. Dec 13 14:23:13.576803 tar[1243]: linux-amd64/helm Dec 13 14:23:13.582035 bash[1263]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:23:13.584588 extend-filesystems[1229]: Found loop1 Dec 13 14:23:13.584831 extend-filesystems[1229]: Found sda Dec 13 14:23:13.584831 extend-filesystems[1229]: Found sda1 Dec 13 14:23:13.584831 extend-filesystems[1229]: Found sda2 Dec 13 14:23:13.584831 extend-filesystems[1229]: Found sda3 Dec 13 14:23:13.584831 extend-filesystems[1229]: Found usr Dec 13 14:23:13.584831 extend-filesystems[1229]: Found sda4 Dec 13 14:23:13.584831 extend-filesystems[1229]: Found sda6 Dec 13 14:23:13.584831 extend-filesystems[1229]: Found sda7 Dec 13 14:23:13.584831 extend-filesystems[1229]: Found sda9 Dec 13 14:23:13.584831 extend-filesystems[1229]: Checking size of /dev/sda9 Dec 13 14:23:13.585466 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:23:13.594437 systemd-logind[1236]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 14:23:13.594455 systemd-logind[1236]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 14:23:13.596487 systemd-logind[1236]: New seat seat0. Dec 13 14:23:13.597958 dbus-daemon[1227]: [system] SELinux support is enabled Dec 13 14:23:13.598203 systemd[1]: Started dbus.service. Dec 13 14:23:13.607173 extend-filesystems[1229]: Old size kept for /dev/sda9 Dec 13 14:23:13.607173 extend-filesystems[1229]: Found sr0 Dec 13 14:23:13.609936 dbus-daemon[1227]: [system] Successfully activated service 'org.freedesktop.systemd1' Dec 13 14:23:13.609022 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:23:13.609112 systemd[1]: Finished extend-filesystems.service. Dec 13 14:23:13.609330 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:23:13.609404 systemd[1]: Finished motdgen.service. Dec 13 14:23:13.609564 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:23:13.609586 systemd[1]: Reached target system-config.target. Dec 13 14:23:13.609701 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:23:13.609717 systemd[1]: Reached target user-config.target. Dec 13 14:23:13.609866 systemd[1]: Started systemd-logind.service. Dec 13 14:23:13.623861 kernel: NET: Registered PF_VSOCK protocol family Dec 13 14:23:13.631410 env[1266]: time="2024-12-13T14:23:13.631384642Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:23:13.633933 update_engine[1237]: I1213 14:23:13.633302 1237 main.cc:92] Flatcar Update Engine starting Dec 13 14:23:13.636924 systemd[1]: Started update-engine.service. Dec 13 14:23:13.638394 systemd[1]: Started locksmithd.service. Dec 13 14:23:13.639686 update_engine[1237]: I1213 14:23:13.639609 1237 update_check_scheduler.cc:74] Next update check in 11m34s Dec 13 14:24:23.166980 systemd-resolved[1191]: Clock change detected. Flushing caches. Dec 13 14:24:23.167471 systemd-timesyncd[1192]: Contacted time server 148.113.194.34:123 (0.flatcar.pool.ntp.org). Dec 13 14:24:23.168089 systemd-timesyncd[1192]: Initial clock synchronization to Fri 2024-12-13 14:24:23.166890 UTC. Dec 13 14:24:23.210734 env[1266]: time="2024-12-13T14:24:23.210707733Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:24:23.210900 env[1266]: time="2024-12-13T14:24:23.210889002Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:24:23.211997 env[1266]: time="2024-12-13T14:24:23.211978642Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:24:23.213574 env[1266]: time="2024-12-13T14:24:23.213561492Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:24:23.213756 env[1266]: time="2024-12-13T14:24:23.213743294Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:24:23.213812 env[1266]: time="2024-12-13T14:24:23.213801413Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:24:23.213858 env[1266]: time="2024-12-13T14:24:23.213847884Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:24:23.213900 env[1266]: time="2024-12-13T14:24:23.213890806Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:24:23.213986 env[1266]: time="2024-12-13T14:24:23.213976779Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:24:23.214155 env[1266]: time="2024-12-13T14:24:23.214145992Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:24:23.214276 env[1266]: time="2024-12-13T14:24:23.214264454Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:24:23.214322 env[1266]: time="2024-12-13T14:24:23.214312329Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:24:23.214392 env[1266]: time="2024-12-13T14:24:23.214380133Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:24:23.214439 env[1266]: time="2024-12-13T14:24:23.214429777Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:24:23.216217 env[1266]: time="2024-12-13T14:24:23.216205051Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:24:23.216275 env[1266]: time="2024-12-13T14:24:23.216263842Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:24:23.216322 env[1266]: time="2024-12-13T14:24:23.216311985Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:24:23.216388 env[1266]: time="2024-12-13T14:24:23.216379442Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:24:23.216456 env[1266]: time="2024-12-13T14:24:23.216425172Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:24:23.216502 env[1266]: time="2024-12-13T14:24:23.216492853Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:24:23.216577 env[1266]: time="2024-12-13T14:24:23.216566755Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:24:23.216623 env[1266]: time="2024-12-13T14:24:23.216613894Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:24:23.216673 env[1266]: time="2024-12-13T14:24:23.216664135Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:24:23.216724 env[1266]: time="2024-12-13T14:24:23.216713730Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:24:23.216771 env[1266]: time="2024-12-13T14:24:23.216761963Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:24:23.216819 env[1266]: time="2024-12-13T14:24:23.216810081Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:24:23.216921 env[1266]: time="2024-12-13T14:24:23.216912637Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:24:23.217029 env[1266]: time="2024-12-13T14:24:23.217019682Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:24:23.217253 env[1266]: time="2024-12-13T14:24:23.217242315Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:24:23.217308 env[1266]: time="2024-12-13T14:24:23.217297672Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:24:23.217368 env[1266]: time="2024-12-13T14:24:23.217357951Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:24:23.217442 env[1266]: time="2024-12-13T14:24:23.217433228Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:24:23.217516 env[1266]: time="2024-12-13T14:24:23.217478317Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:24:23.217575 env[1266]: time="2024-12-13T14:24:23.217566067Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:24:23.217620 env[1266]: time="2024-12-13T14:24:23.217610272Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:24:23.217671 env[1266]: time="2024-12-13T14:24:23.217659746Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:24:23.217736 env[1266]: time="2024-12-13T14:24:23.217723567Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:24:23.217795 env[1266]: time="2024-12-13T14:24:23.217783124Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:24:23.217861 env[1266]: time="2024-12-13T14:24:23.217852030Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:24:23.217918 env[1266]: time="2024-12-13T14:24:23.217908114Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:24:23.218053 env[1266]: time="2024-12-13T14:24:23.218044072Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:24:23.218100 env[1266]: time="2024-12-13T14:24:23.218089778Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:24:23.218145 env[1266]: time="2024-12-13T14:24:23.218135393Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:24:23.218190 env[1266]: time="2024-12-13T14:24:23.218180413Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:24:23.218238 env[1266]: time="2024-12-13T14:24:23.218227114Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:24:23.218281 env[1266]: time="2024-12-13T14:24:23.218271245Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:24:23.218332 env[1266]: time="2024-12-13T14:24:23.218319743Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:24:23.218411 env[1266]: time="2024-12-13T14:24:23.218399614Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:24:23.218682 env[1266]: time="2024-12-13T14:24:23.218640636Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:24:23.220930 env[1266]: time="2024-12-13T14:24:23.218770827Z" level=info msg="Connect containerd service" Dec 13 14:24:23.220930 env[1266]: time="2024-12-13T14:24:23.218797892Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:24:23.220930 env[1266]: time="2024-12-13T14:24:23.219170838Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:24:23.220930 env[1266]: time="2024-12-13T14:24:23.219307867Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:24:23.220930 env[1266]: time="2024-12-13T14:24:23.219333178Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:24:23.220930 env[1266]: time="2024-12-13T14:24:23.219979583Z" level=info msg="containerd successfully booted in 0.066619s" Dec 13 14:24:23.219414 systemd[1]: Started containerd.service. Dec 13 14:24:23.222371 env[1266]: time="2024-12-13T14:24:23.222330526Z" level=info msg="Start subscribing containerd event" Dec 13 14:24:23.222457 env[1266]: time="2024-12-13T14:24:23.222447030Z" level=info msg="Start recovering state" Dec 13 14:24:23.222570 env[1266]: time="2024-12-13T14:24:23.222559996Z" level=info msg="Start event monitor" Dec 13 14:24:23.222629 env[1266]: time="2024-12-13T14:24:23.222617282Z" level=info msg="Start snapshots syncer" Dec 13 14:24:23.222674 env[1266]: time="2024-12-13T14:24:23.222664720Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:24:23.222719 env[1266]: time="2024-12-13T14:24:23.222709863Z" level=info msg="Start streaming server" Dec 13 14:24:23.465243 tar[1243]: linux-amd64/LICENSE Dec 13 14:24:23.465308 tar[1243]: linux-amd64/README.md Dec 13 14:24:23.468431 systemd[1]: Finished prepare-helm.service. Dec 13 14:24:23.544678 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:24:23.544722 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:24:23.563083 locksmithd[1288]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:24:23.869731 systemd-networkd[1061]: ens192: Gained IPv6LL Dec 13 14:24:23.870634 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:24:23.870954 systemd[1]: Reached target network-online.target. Dec 13 14:24:23.872164 systemd[1]: Starting kubelet.service... Dec 13 14:24:23.961567 sshd_keygen[1238]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:24:23.975438 systemd[1]: Finished sshd-keygen.service. Dec 13 14:24:23.976633 systemd[1]: Starting issuegen.service... Dec 13 14:24:23.980152 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:24:23.980251 systemd[1]: Finished issuegen.service. Dec 13 14:24:23.981512 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:24:23.990166 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:24:23.991231 systemd[1]: Started getty@tty1.service. Dec 13 14:24:23.992057 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:24:23.992261 systemd[1]: Reached target getty.target. Dec 13 14:24:24.732923 systemd[1]: Started kubelet.service. Dec 13 14:24:24.733527 systemd[1]: Reached target multi-user.target. Dec 13 14:24:24.734733 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:24:24.741310 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:24:24.741434 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:24:24.741701 systemd[1]: Startup finished in 884ms (kernel) + 5.160s (initrd) + 5.513s (userspace) = 11.559s. Dec 13 14:24:24.809926 login[1355]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 14:24:24.812735 login[1356]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 14:24:24.818834 systemd[1]: Created slice user-500.slice. Dec 13 14:24:24.820260 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:24:24.823016 systemd-logind[1236]: New session 1 of user core. Dec 13 14:24:24.825294 systemd-logind[1236]: New session 2 of user core. Dec 13 14:24:24.827899 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:24:24.828896 systemd[1]: Starting user@500.service... Dec 13 14:24:24.831265 (systemd)[1362]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:24:24.879722 systemd[1362]: Queued start job for default target default.target. Dec 13 14:24:24.880229 systemd[1362]: Reached target paths.target. Dec 13 14:24:24.880324 systemd[1362]: Reached target sockets.target. Dec 13 14:24:24.880380 systemd[1362]: Reached target timers.target. Dec 13 14:24:24.880458 systemd[1362]: Reached target basic.target. Dec 13 14:24:24.880532 systemd[1362]: Reached target default.target. Dec 13 14:24:24.880577 systemd[1]: Started user@500.service. Dec 13 14:24:24.880692 systemd[1362]: Startup finished in 45ms. Dec 13 14:24:24.881327 systemd[1]: Started session-1.scope. Dec 13 14:24:24.881844 systemd[1]: Started session-2.scope. Dec 13 14:24:25.541573 kubelet[1359]: E1213 14:24:25.541508 1359 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:24:25.542923 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:24:25.542996 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:24:35.793611 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:24:35.793784 systemd[1]: Stopped kubelet.service. Dec 13 14:24:35.794972 systemd[1]: Starting kubelet.service... Dec 13 14:24:35.845017 systemd[1]: Started kubelet.service. Dec 13 14:24:35.968339 kubelet[1392]: E1213 14:24:35.968306 1392 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:24:35.970838 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:24:35.970914 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:24:46.221472 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 14:24:46.221647 systemd[1]: Stopped kubelet.service. Dec 13 14:24:46.222859 systemd[1]: Starting kubelet.service... Dec 13 14:24:46.444044 systemd[1]: Started kubelet.service. Dec 13 14:24:46.476736 kubelet[1402]: E1213 14:24:46.476668 1402 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:24:46.478064 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:24:46.478136 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:24:56.728780 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 14:24:56.728945 systemd[1]: Stopped kubelet.service. Dec 13 14:24:56.730434 systemd[1]: Starting kubelet.service... Dec 13 14:24:56.891965 systemd[1]: Started kubelet.service. Dec 13 14:24:56.927519 kubelet[1414]: E1213 14:24:56.927492 1414 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:24:56.928836 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:24:56.928926 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:25:03.201956 systemd[1]: Created slice system-sshd.slice. Dec 13 14:25:03.202920 systemd[1]: Started sshd@0-139.178.70.104:22-147.75.109.163:50794.service. Dec 13 14:25:03.241582 sshd[1422]: Accepted publickey for core from 147.75.109.163 port 50794 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:25:03.242463 sshd[1422]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:25:03.246031 systemd[1]: Started session-3.scope. Dec 13 14:25:03.246328 systemd-logind[1236]: New session 3 of user core. Dec 13 14:25:03.294072 systemd[1]: Started sshd@1-139.178.70.104:22-147.75.109.163:50808.service. Dec 13 14:25:03.324138 sshd[1427]: Accepted publickey for core from 147.75.109.163 port 50808 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:25:03.325065 sshd[1427]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:25:03.328398 systemd[1]: Started session-4.scope. Dec 13 14:25:03.328686 systemd-logind[1236]: New session 4 of user core. Dec 13 14:25:03.379935 sshd[1427]: pam_unix(sshd:session): session closed for user core Dec 13 14:25:03.382231 systemd[1]: Started sshd@2-139.178.70.104:22-147.75.109.163:50816.service. Dec 13 14:25:03.383868 systemd-logind[1236]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:25:03.384028 systemd[1]: sshd@1-139.178.70.104:22-147.75.109.163:50808.service: Deactivated successfully. Dec 13 14:25:03.384472 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:25:03.386014 systemd-logind[1236]: Removed session 4. Dec 13 14:25:03.412369 sshd[1432]: Accepted publickey for core from 147.75.109.163 port 50816 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:25:03.413401 sshd[1432]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:25:03.416502 systemd[1]: Started session-5.scope. Dec 13 14:25:03.416907 systemd-logind[1236]: New session 5 of user core. Dec 13 14:25:03.463358 sshd[1432]: pam_unix(sshd:session): session closed for user core Dec 13 14:25:03.465438 systemd[1]: sshd@2-139.178.70.104:22-147.75.109.163:50816.service: Deactivated successfully. Dec 13 14:25:03.465770 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:25:03.466121 systemd-logind[1236]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:25:03.466693 systemd[1]: Started sshd@3-139.178.70.104:22-147.75.109.163:50824.service. Dec 13 14:25:03.467229 systemd-logind[1236]: Removed session 5. Dec 13 14:25:03.494639 sshd[1439]: Accepted publickey for core from 147.75.109.163 port 50824 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:25:03.495379 sshd[1439]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:25:03.497865 systemd-logind[1236]: New session 6 of user core. Dec 13 14:25:03.498303 systemd[1]: Started session-6.scope. Dec 13 14:25:03.549820 sshd[1439]: pam_unix(sshd:session): session closed for user core Dec 13 14:25:03.552150 systemd[1]: Started sshd@4-139.178.70.104:22-147.75.109.163:50840.service. Dec 13 14:25:03.552886 systemd[1]: sshd@3-139.178.70.104:22-147.75.109.163:50824.service: Deactivated successfully. Dec 13 14:25:03.553358 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:25:03.554708 systemd-logind[1236]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:25:03.555406 systemd-logind[1236]: Removed session 6. Dec 13 14:25:03.582688 sshd[1444]: Accepted publickey for core from 147.75.109.163 port 50840 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:25:03.584030 sshd[1444]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:25:03.587994 systemd[1]: Started session-7.scope. Dec 13 14:25:03.589474 systemd-logind[1236]: New session 7 of user core. Dec 13 14:25:03.741205 sudo[1448]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:25:03.741384 sudo[1448]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:25:03.752713 dbus-daemon[1227]: \xd0}\x96\xc2\xdaU: received setenforce notice (enforcing=696716192) Dec 13 14:25:03.754107 sudo[1448]: pam_unix(sudo:session): session closed for user root Dec 13 14:25:03.761736 sshd[1444]: pam_unix(sshd:session): session closed for user core Dec 13 14:25:03.763927 systemd[1]: Started sshd@5-139.178.70.104:22-147.75.109.163:50844.service. Dec 13 14:25:03.765015 systemd[1]: sshd@4-139.178.70.104:22-147.75.109.163:50840.service: Deactivated successfully. Dec 13 14:25:03.765619 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:25:03.766236 systemd-logind[1236]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:25:03.767197 systemd-logind[1236]: Removed session 7. Dec 13 14:25:03.796315 sshd[1451]: Accepted publickey for core from 147.75.109.163 port 50844 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:25:03.797365 sshd[1451]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:25:03.800393 systemd[1]: Started session-8.scope. Dec 13 14:25:03.800683 systemd-logind[1236]: New session 8 of user core. Dec 13 14:25:03.851129 sudo[1456]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:25:03.851478 sudo[1456]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:25:03.853454 sudo[1456]: pam_unix(sudo:session): session closed for user root Dec 13 14:25:03.856466 sudo[1455]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:25:03.856610 sudo[1455]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:25:03.862036 systemd[1]: Stopping audit-rules.service... Dec 13 14:25:03.865927 kernel: kauditd_printk_skb: 293 callbacks suppressed Dec 13 14:25:03.865966 kernel: audit: type=1305 audit(1734099903.861:214): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:25:03.865984 kernel: audit: type=1300 audit(1734099903.861:214): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffa9214710 a2=420 a3=0 items=0 ppid=1 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:03.861000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:25:03.861000 audit[1459]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffa9214710 a2=420 a3=0 items=0 ppid=1 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:03.863192 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:25:03.866155 auditctl[1459]: No rules Dec 13 14:25:03.863286 systemd[1]: Stopped audit-rules.service. Dec 13 14:25:03.865494 systemd[1]: Starting audit-rules.service... Dec 13 14:25:03.861000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:25:03.873308 kernel: audit: type=1327 audit(1734099903.861:214): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:25:03.873339 kernel: audit: type=1131 audit(1734099903.861:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.880408 augenrules[1476]: No rules Dec 13 14:25:03.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.880919 systemd[1]: Finished audit-rules.service. Dec 13 14:25:03.881492 sudo[1455]: pam_unix(sudo:session): session closed for user root Dec 13 14:25:03.884556 kernel: audit: type=1130 audit(1734099903.879:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.884742 sshd[1451]: pam_unix(sshd:session): session closed for user core Dec 13 14:25:03.879000 audit[1455]: USER_END pid=1455 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.888555 kernel: audit: type=1106 audit(1734099903.879:217): pid=1455 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.889417 systemd[1]: sshd@5-139.178.70.104:22-147.75.109.163:50844.service: Deactivated successfully. Dec 13 14:25:03.889876 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 14:25:03.880000 audit[1455]: CRED_DISP pid=1455 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.892904 systemd-logind[1236]: Session 8 logged out. Waiting for processes to exit. Dec 13 14:25:03.897005 kernel: audit: type=1104 audit(1734099903.880:218): pid=1455 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.897046 kernel: audit: type=1106 audit(1734099903.885:219): pid=1451 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:25:03.885000 audit[1451]: USER_END pid=1451 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:25:03.893618 systemd[1]: Started sshd@6-139.178.70.104:22-147.75.109.163:50856.service. Dec 13 14:25:03.885000 audit[1451]: CRED_DISP pid=1451 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:25:03.900734 systemd-logind[1236]: Removed session 8. Dec 13 14:25:03.903957 kernel: audit: type=1104 audit(1734099903.885:220): pid=1451 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:25:03.903990 kernel: audit: type=1131 audit(1734099903.888:221): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.104:22-147.75.109.163:50844 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.104:22-147.75.109.163:50844 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.104:22-147.75.109.163:50856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.920000 audit[1482]: USER_ACCT pid=1482 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:25:03.922478 sshd[1482]: Accepted publickey for core from 147.75.109.163 port 50856 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:25:03.921000 audit[1482]: CRED_ACQ pid=1482 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:25:03.921000 audit[1482]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6cb9f770 a2=3 a3=0 items=0 ppid=1 pid=1482 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:03.921000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:25:03.923232 sshd[1482]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:25:03.925447 systemd-logind[1236]: New session 9 of user core. Dec 13 14:25:03.926237 systemd[1]: Started session-9.scope. Dec 13 14:25:03.927000 audit[1482]: USER_START pid=1482 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:25:03.928000 audit[1484]: CRED_ACQ pid=1484 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:25:03.974000 audit[1485]: USER_ACCT pid=1485 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.975631 sudo[1485]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:25:03.975771 sudo[1485]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:25:03.974000 audit[1485]: CRED_REFR pid=1485 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.975000 audit[1485]: USER_START pid=1485 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:25:03.990061 systemd[1]: Starting docker.service... Dec 13 14:25:04.014845 env[1495]: time="2024-12-13T14:25:04.013210427Z" level=info msg="Starting up" Dec 13 14:25:04.015824 env[1495]: time="2024-12-13T14:25:04.015807602Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:25:04.015881 env[1495]: time="2024-12-13T14:25:04.015871131Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:25:04.015941 env[1495]: time="2024-12-13T14:25:04.015929447Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:25:04.015983 env[1495]: time="2024-12-13T14:25:04.015974490Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:25:04.016961 env[1495]: time="2024-12-13T14:25:04.016949088Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:25:04.017015 env[1495]: time="2024-12-13T14:25:04.017005027Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:25:04.017061 env[1495]: time="2024-12-13T14:25:04.017050617Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:25:04.017108 env[1495]: time="2024-12-13T14:25:04.017099233Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:25:04.021701 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport4012055092-merged.mount: Deactivated successfully. Dec 13 14:25:04.089039 env[1495]: time="2024-12-13T14:25:04.089013916Z" level=info msg="Loading containers: start." Dec 13 14:25:04.152000 audit[1527]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1527 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:04.152000 audit[1527]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd2a5b0c50 a2=0 a3=7ffd2a5b0c3c items=0 ppid=1495 pid=1527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:04.152000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 14:25:04.153000 audit[1529]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1529 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:04.153000 audit[1529]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd8a8b1640 a2=0 a3=7ffd8a8b162c items=0 ppid=1495 pid=1529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:04.153000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 14:25:04.154000 audit[1531]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1531 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:04.154000 audit[1531]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd922e6cc0 a2=0 a3=7ffd922e6cac items=0 ppid=1495 pid=1531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:04.154000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:25:04.156000 audit[1533]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1533 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:04.156000 audit[1533]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff91f8d930 a2=0 a3=7fff91f8d91c items=0 ppid=1495 pid=1533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:04.156000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:25:04.157000 audit[1535]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1535 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:04.157000 audit[1535]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff1b7dc290 a2=0 a3=7fff1b7dc27c items=0 ppid=1495 pid=1535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:04.157000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 14:25:04.172000 audit[1540]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1540 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:04.172000 audit[1540]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffefd1b4570 a2=0 a3=7ffefd1b455c items=0 ppid=1495 pid=1540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:04.172000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 14:25:04.180000 audit[1542]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1542 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:04.180000 audit[1542]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffefa735b50 a2=0 a3=7ffefa735b3c items=0 ppid=1495 pid=1542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:04.180000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 14:25:04.181000 audit[1544]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1544 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:04.181000 audit[1544]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffd07690b80 a2=0 a3=7ffd07690b6c items=0 ppid=1495 pid=1544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:04.181000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 14:25:04.183000 audit[1546]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1546 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:04.183000 audit[1546]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fffd36390e0 a2=0 a3=7fffd36390cc items=0 ppid=1495 pid=1546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:04.183000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:25:04.190000 audit[1550]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1550 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:04.190000 audit[1550]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffddb998e90 a2=0 a3=7ffddb998e7c items=0 ppid=1495 pid=1550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:04.190000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:25:04.195000 audit[1551]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1551 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:04.195000 audit[1551]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc860b3680 a2=0 a3=7ffc860b366c items=0 ppid=1495 pid=1551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:04.195000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:25:04.228562 kernel: Initializing XFRM netlink socket Dec 13 14:25:04.293001 env[1495]: time="2024-12-13T14:25:04.292929268Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 14:25:04.311000 audit[1559]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1559 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:04.311000 audit[1559]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fff7941c0b0 a2=0 a3=7fff7941c09c items=0 ppid=1495 pid=1559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:04.311000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 14:25:04.322000 audit[1562]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1562 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:04.322000 audit[1562]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe67feec50 a2=0 a3=7ffe67feec3c items=0 ppid=1495 pid=1562 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:04.322000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 14:25:04.324000 audit[1565]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1565 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:04.324000 audit[1565]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff9423fcd0 a2=0 a3=7fff9423fcbc items=0 ppid=1495 pid=1565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:04.324000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 14:25:04.325000 audit[1567]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1567 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:04.325000 audit[1567]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd84fb9ef0 a2=0 a3=7ffd84fb9edc items=0 ppid=1495 pid=1567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:04.325000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 14:25:04.327000 audit[1569]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1569 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:04.327000 audit[1569]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffde955e760 a2=0 a3=7ffde955e74c items=0 ppid=1495 pid=1569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:04.327000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 14:25:04.329000 audit[1571]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1571 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:04.329000 audit[1571]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffdb4ade330 a2=0 a3=7ffdb4ade31c items=0 ppid=1495 pid=1571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:04.329000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 14:25:04.330000 audit[1573]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1573 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:04.330000 audit[1573]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fffcaddb160 a2=0 a3=7fffcaddb14c items=0 ppid=1495 pid=1573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:04.330000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 14:25:04.338000 audit[1576]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1576 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:04.338000 audit[1576]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc1fa929c0 a2=0 a3=7ffc1fa929ac items=0 ppid=1495 pid=1576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:04.338000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 14:25:04.340000 audit[1578]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1578 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:04.340000 audit[1578]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fffb0da1110 a2=0 a3=7fffb0da10fc items=0 ppid=1495 pid=1578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:04.340000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:25:04.341000 audit[1580]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1580 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:04.341000 audit[1580]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd7f6b4920 a2=0 a3=7ffd7f6b490c items=0 ppid=1495 pid=1580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:04.341000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:25:04.343000 audit[1582]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1582 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:04.343000 audit[1582]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc278cc4d0 a2=0 a3=7ffc278cc4bc items=0 ppid=1495 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:04.343000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 14:25:04.345596 systemd-networkd[1061]: docker0: Link UP Dec 13 14:25:04.349000 audit[1586]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1586 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:04.349000 audit[1586]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc69311c70 a2=0 a3=7ffc69311c5c items=0 ppid=1495 pid=1586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:04.349000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:25:04.354000 audit[1587]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1587 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:04.354000 audit[1587]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff69ef0810 a2=0 a3=7fff69ef07fc items=0 ppid=1495 pid=1587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:04.354000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:25:04.356856 env[1495]: time="2024-12-13T14:25:04.356835235Z" level=info msg="Loading containers: done." Dec 13 14:25:04.364035 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1015167561-merged.mount: Deactivated successfully. Dec 13 14:25:04.387475 env[1495]: time="2024-12-13T14:25:04.387441957Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 14:25:04.387592 env[1495]: time="2024-12-13T14:25:04.387573813Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 14:25:04.387648 env[1495]: time="2024-12-13T14:25:04.387634574Z" level=info msg="Daemon has completed initialization" Dec 13 14:25:04.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:04.432972 systemd[1]: Started docker.service. Dec 13 14:25:04.435578 env[1495]: time="2024-12-13T14:25:04.435539542Z" level=info msg="API listen on /run/docker.sock" Dec 13 14:25:05.779748 env[1266]: time="2024-12-13T14:25:05.779723124Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\"" Dec 13 14:25:06.438469 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1111074341.mount: Deactivated successfully. Dec 13 14:25:06.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.986000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:06.988112 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Dec 13 14:25:06.988232 systemd[1]: Stopped kubelet.service. Dec 13 14:25:06.989418 systemd[1]: Starting kubelet.service... Dec 13 14:25:07.058696 systemd[1]: Started kubelet.service. Dec 13 14:25:07.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:07.118564 kubelet[1628]: E1213 14:25:07.118501 1628 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:25:07.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:25:07.119903 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:25:07.119976 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:25:07.894224 env[1266]: time="2024-12-13T14:25:07.894183014Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:07.895694 env[1266]: time="2024-12-13T14:25:07.895661019Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:92fbbe8caf9c923e0406b93c082b9e7af30032ace2d836c785633f90514bfefa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:07.897228 env[1266]: time="2024-12-13T14:25:07.897196853Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:07.898715 env[1266]: time="2024-12-13T14:25:07.898680470Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2804b1e7b9e08f3a3468f8fd2f6487c55968b9293ee51b9efb865b3298acfa26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:07.899268 env[1266]: time="2024-12-13T14:25:07.899248052Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\" returns image reference \"sha256:92fbbe8caf9c923e0406b93c082b9e7af30032ace2d836c785633f90514bfefa\"" Dec 13 14:25:07.907525 env[1266]: time="2024-12-13T14:25:07.907490971Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\"" Dec 13 14:25:08.188074 update_engine[1237]: I1213 14:25:08.187584 1237 update_attempter.cc:509] Updating boot flags... Dec 13 14:25:10.195252 env[1266]: time="2024-12-13T14:25:10.195209911Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:10.211836 env[1266]: time="2024-12-13T14:25:10.211814014Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f3b58a53109c96b6bf82adb5973fefa4baec46e2e9ee200be5cc03f3afbf127d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:10.219295 env[1266]: time="2024-12-13T14:25:10.219275236Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:10.228331 env[1266]: time="2024-12-13T14:25:10.228311394Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:e2f26a3f5ef3fd01f6330cab8b078cf303cfb6d36911a210d0915d535910e412,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:10.228909 env[1266]: time="2024-12-13T14:25:10.228889665Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\" returns image reference \"sha256:f3b58a53109c96b6bf82adb5973fefa4baec46e2e9ee200be5cc03f3afbf127d\"" Dec 13 14:25:10.236007 env[1266]: time="2024-12-13T14:25:10.235973349Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\"" Dec 13 14:25:11.415080 env[1266]: time="2024-12-13T14:25:11.415040873Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:11.433960 env[1266]: time="2024-12-13T14:25:11.433937701Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6d3373aa79026111619cc6cc1ffff8b27006c56422e7c95724b03a61b530eaf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:11.441689 env[1266]: time="2024-12-13T14:25:11.441670239Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:11.453223 env[1266]: time="2024-12-13T14:25:11.453205863Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:ed66e2102f4705d45de7513decf3ac61879704984409323779d19e98b970568c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:11.453788 env[1266]: time="2024-12-13T14:25:11.453768505Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\" returns image reference \"sha256:e6d3373aa79026111619cc6cc1ffff8b27006c56422e7c95724b03a61b530eaf\"" Dec 13 14:25:11.460280 env[1266]: time="2024-12-13T14:25:11.460260294Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 14:25:12.520470 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount944559081.mount: Deactivated successfully. Dec 13 14:25:13.158726 env[1266]: time="2024-12-13T14:25:13.158681642Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:13.186022 env[1266]: time="2024-12-13T14:25:13.185981189Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:13.202499 env[1266]: time="2024-12-13T14:25:13.202098306Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:13.212709 env[1266]: time="2024-12-13T14:25:13.212680244Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:13.212856 env[1266]: time="2024-12-13T14:25:13.212826312Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153\"" Dec 13 14:25:13.220615 env[1266]: time="2024-12-13T14:25:13.220589874Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 14:25:13.890615 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2167228395.mount: Deactivated successfully. Dec 13 14:25:14.847149 env[1266]: time="2024-12-13T14:25:14.847103047Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:14.866407 env[1266]: time="2024-12-13T14:25:14.866381343Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:14.880085 env[1266]: time="2024-12-13T14:25:14.880063316Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:14.889762 env[1266]: time="2024-12-13T14:25:14.889736551Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:14.890263 env[1266]: time="2024-12-13T14:25:14.890241650Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 14:25:14.897673 env[1266]: time="2024-12-13T14:25:14.897644006Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Dec 13 14:25:15.560020 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount117720897.mount: Deactivated successfully. Dec 13 14:25:15.607713 env[1266]: time="2024-12-13T14:25:15.607682066Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:15.625978 env[1266]: time="2024-12-13T14:25:15.625952670Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:15.631212 env[1266]: time="2024-12-13T14:25:15.631184002Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:15.636036 env[1266]: time="2024-12-13T14:25:15.636019633Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:15.636435 env[1266]: time="2024-12-13T14:25:15.636413824Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Dec 13 14:25:15.642876 env[1266]: time="2024-12-13T14:25:15.642856145Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Dec 13 14:25:16.267910 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1178821372.mount: Deactivated successfully. Dec 13 14:25:17.238256 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Dec 13 14:25:17.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:17.238431 systemd[1]: Stopped kubelet.service. Dec 13 14:25:17.239880 systemd[1]: Starting kubelet.service... Dec 13 14:25:17.247942 kernel: kauditd_printk_skb: 88 callbacks suppressed Dec 13 14:25:17.247997 kernel: audit: type=1130 audit(1734099917.236:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:17.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:17.254177 kernel: audit: type=1131 audit(1734099917.236:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:19.629819 env[1266]: time="2024-12-13T14:25:19.629567588Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:19.896304 env[1266]: time="2024-12-13T14:25:19.896187835Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:19.983077 env[1266]: time="2024-12-13T14:25:19.983036756Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:20.143230 env[1266]: time="2024-12-13T14:25:20.143196840Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:20.144145 env[1266]: time="2024-12-13T14:25:20.144120709Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7\"" Dec 13 14:25:21.344930 systemd[1]: Started kubelet.service. Dec 13 14:25:21.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:21.355613 kernel: audit: type=1130 audit(1734099921.343:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:21.415201 kubelet[1694]: E1213 14:25:21.415160 1694 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:25:21.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:25:21.419600 kernel: audit: type=1131 audit(1734099921.415:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:25:21.416497 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:25:21.416586 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:25:22.870870 systemd[1]: Stopped kubelet.service. Dec 13 14:25:22.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:22.872494 systemd[1]: Starting kubelet.service... Dec 13 14:25:22.876999 kernel: audit: type=1130 audit(1734099922.869:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:22.877041 kernel: audit: type=1131 audit(1734099922.869:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:22.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:22.888105 systemd[1]: Reloading. Dec 13 14:25:22.935352 /usr/lib/systemd/system-generators/torcx-generator[1779]: time="2024-12-13T14:25:22Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:25:22.935601 /usr/lib/systemd/system-generators/torcx-generator[1779]: time="2024-12-13T14:25:22Z" level=info msg="torcx already run" Dec 13 14:25:22.996979 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:25:22.996992 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:25:23.008570 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:25:23.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.059937 kernel: audit: type=1400 audit(1734099923.053:266): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.059970 kernel: audit: type=1400 audit(1734099923.056:267): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.059990 kernel: audit: type=1400 audit(1734099923.056:268): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.072486 kernel: audit: type=1400 audit(1734099923.056:269): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.072549 kernel: audit: type=1400 audit(1734099923.056:270): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.072567 kernel: audit: type=1400 audit(1734099923.056:271): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.072581 kernel: audit: type=1400 audit(1734099923.056:272): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.072595 kernel: audit: type=1400 audit(1734099923.056:273): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.056000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.056000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.066000 audit: BPF prog-id=46 op=LOAD Dec 13 14:25:23.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.071000 audit: BPF prog-id=47 op=LOAD Dec 13 14:25:23.071000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:25:23.071000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:25:23.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.074000 audit: BPF prog-id=48 op=LOAD Dec 13 14:25:23.074000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:25:23.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.074000 audit: BPF prog-id=49 op=LOAD Dec 13 14:25:23.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.074000 audit: BPF prog-id=50 op=LOAD Dec 13 14:25:23.074000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:25:23.074000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:25:23.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.075000 audit: BPF prog-id=51 op=LOAD Dec 13 14:25:23.075000 audit: BPF prog-id=44 op=UNLOAD Dec 13 14:25:23.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.076000 audit: BPF prog-id=52 op=LOAD Dec 13 14:25:23.076000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:25:23.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.077000 audit: BPF prog-id=53 op=LOAD Dec 13 14:25:23.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.077000 audit: BPF prog-id=54 op=LOAD Dec 13 14:25:23.077000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:25:23.077000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.078000 audit: BPF prog-id=55 op=LOAD Dec 13 14:25:23.078000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.078000 audit: BPF prog-id=56 op=LOAD Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.078000 audit: BPF prog-id=57 op=LOAD Dec 13 14:25:23.078000 audit: BPF prog-id=42 op=UNLOAD Dec 13 14:25:23.078000 audit: BPF prog-id=43 op=UNLOAD Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.079000 audit: BPF prog-id=58 op=LOAD Dec 13 14:25:23.079000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:25:23.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.079000 audit: BPF prog-id=59 op=LOAD Dec 13 14:25:23.079000 audit: BPF prog-id=39 op=UNLOAD Dec 13 14:25:23.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:23.080000 audit: BPF prog-id=60 op=LOAD Dec 13 14:25:23.080000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:25:23.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:25:23.177413 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 14:25:23.177461 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 14:25:23.177630 systemd[1]: Stopped kubelet.service. Dec 13 14:25:23.179024 systemd[1]: Starting kubelet.service... Dec 13 14:25:24.499681 systemd[1]: Started kubelet.service. Dec 13 14:25:24.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:24.535178 kubelet[1843]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:25:24.535428 kubelet[1843]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:25:24.535483 kubelet[1843]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:25:24.535606 kubelet[1843]: I1213 14:25:24.535582 1843 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:25:24.772636 kubelet[1843]: I1213 14:25:24.772277 1843 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 14:25:24.772767 kubelet[1843]: I1213 14:25:24.772755 1843 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:25:24.772992 kubelet[1843]: I1213 14:25:24.772981 1843 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 14:25:24.915359 kubelet[1843]: E1213 14:25:24.915338 1843 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://139.178.70.104:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:25:24.917235 kubelet[1843]: I1213 14:25:24.917213 1843 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:25:24.926603 kubelet[1843]: I1213 14:25:24.926583 1843 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:25:24.927664 kubelet[1843]: I1213 14:25:24.927651 1843 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:25:24.927872 kubelet[1843]: I1213 14:25:24.927861 1843 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:25:24.927991 kubelet[1843]: I1213 14:25:24.927982 1843 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:25:24.928047 kubelet[1843]: I1213 14:25:24.928038 1843 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:25:24.928164 kubelet[1843]: I1213 14:25:24.928157 1843 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:25:24.928269 kubelet[1843]: I1213 14:25:24.928262 1843 kubelet.go:396] "Attempting to sync node with API server" Dec 13 14:25:24.928325 kubelet[1843]: I1213 14:25:24.928316 1843 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:25:24.928403 kubelet[1843]: I1213 14:25:24.928395 1843 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:25:24.928464 kubelet[1843]: I1213 14:25:24.928455 1843 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:25:24.928722 kubelet[1843]: W1213 14:25:24.928683 1843 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://139.178.70.104:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:25:24.928765 kubelet[1843]: E1213 14:25:24.928725 1843 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.70.104:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:25:24.929905 kubelet[1843]: I1213 14:25:24.929893 1843 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:25:24.935883 kubelet[1843]: W1213 14:25:24.935779 1843 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://139.178.70.104:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:25:24.935883 kubelet[1843]: E1213 14:25:24.935813 1843 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.70.104:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:25:24.937374 kubelet[1843]: I1213 14:25:24.937359 1843 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:25:24.938488 kubelet[1843]: W1213 14:25:24.938476 1843 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:25:24.939010 kubelet[1843]: I1213 14:25:24.938998 1843 server.go:1256] "Started kubelet" Dec 13 14:25:24.938000 audit[1843]: AVC avc: denied { mac_admin } for pid=1843 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:24.938000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:25:24.938000 audit[1843]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00084d0e0 a1=c000c53638 a2=c00084d0b0 a3=25 items=0 ppid=1 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:24.938000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:25:24.939951 kubelet[1843]: I1213 14:25:24.939941 1843 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:25:24.938000 audit[1843]: AVC avc: denied { mac_admin } for pid=1843 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:24.938000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:25:24.938000 audit[1843]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009975a0 a1=c000c53650 a2=c00084d170 a3=25 items=0 ppid=1 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:24.938000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:25:24.940202 kubelet[1843]: I1213 14:25:24.940191 1843 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:25:24.940296 kubelet[1843]: I1213 14:25:24.940287 1843 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:25:24.944504 kubelet[1843]: E1213 14:25:24.944480 1843 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://139.178.70.104:6443/api/v1/namespaces/default/events\": dial tcp 139.178.70.104:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.1810c2b1af04fc3c default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2024-12-13 14:25:24.938980412 +0000 UTC m=+0.433727551,LastTimestamp:2024-12-13 14:25:24.938980412 +0000 UTC m=+0.433727551,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Dec 13 14:25:24.946006 kubelet[1843]: I1213 14:25:24.945934 1843 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:25:24.944000 audit[1854]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1854 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:24.944000 audit[1854]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff1777eca0 a2=0 a3=7fff1777ec8c items=0 ppid=1843 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:24.944000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:25:24.946663 kubelet[1843]: I1213 14:25:24.946657 1843 server.go:461] "Adding debug handlers to kubelet server" Dec 13 14:25:24.947388 kubelet[1843]: I1213 14:25:24.947371 1843 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:25:24.947523 kubelet[1843]: I1213 14:25:24.947510 1843 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:25:24.945000 audit[1855]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1855 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:24.945000 audit[1855]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe84de1980 a2=0 a3=7ffe84de196c items=0 ppid=1843 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:24.945000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:25:24.948756 kubelet[1843]: I1213 14:25:24.948745 1843 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:25:24.950395 kubelet[1843]: I1213 14:25:24.950383 1843 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 14:25:24.950668 kubelet[1843]: I1213 14:25:24.950651 1843 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 14:25:24.949000 audit[1857]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1857 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:24.949000 audit[1857]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe62a61510 a2=0 a3=7ffe62a614fc items=0 ppid=1843 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:24.949000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:25:24.950945 kubelet[1843]: E1213 14:25:24.950937 1843 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.104:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.104:6443: connect: connection refused" interval="200ms" Dec 13 14:25:24.951186 kubelet[1843]: I1213 14:25:24.951176 1843 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:25:24.951302 kubelet[1843]: I1213 14:25:24.951290 1843 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:25:24.952379 kubelet[1843]: E1213 14:25:24.952369 1843 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:25:24.950000 audit[1859]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1859 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:24.950000 audit[1859]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc9fa23bb0 a2=0 a3=7ffc9fa23b9c items=0 ppid=1843 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:24.950000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:25:24.952678 kubelet[1843]: I1213 14:25:24.952669 1843 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:25:24.961355 kubelet[1843]: W1213 14:25:24.961312 1843 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://139.178.70.104:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:25:24.961355 kubelet[1843]: E1213 14:25:24.961357 1843 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.70.104:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:25:24.967000 audit[1863]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1863 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:24.967000 audit[1863]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff32ce6cd0 a2=0 a3=7fff32ce6cbc items=0 ppid=1843 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:24.967000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:25:24.968928 kubelet[1843]: I1213 14:25:24.968874 1843 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:25:24.967000 audit[1864]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1864 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:24.967000 audit[1864]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffce987b360 a2=0 a3=7ffce987b34c items=0 ppid=1843 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:24.967000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:25:24.969605 kubelet[1843]: I1213 14:25:24.969562 1843 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:25:24.969605 kubelet[1843]: I1213 14:25:24.969584 1843 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:25:24.969605 kubelet[1843]: I1213 14:25:24.969600 1843 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 14:25:24.969684 kubelet[1843]: E1213 14:25:24.969626 1843 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:25:24.968000 audit[1865]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1865 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:24.968000 audit[1865]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe2b123ac0 a2=0 a3=7ffe2b123aac items=0 ppid=1843 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:24.968000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:25:24.969000 audit[1866]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1866 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:24.969000 audit[1866]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc78a8eb0 a2=0 a3=7fffc78a8e9c items=0 ppid=1843 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:24.969000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:25:24.970000 audit[1867]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1867 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:24.970000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffbd1c3f50 a2=0 a3=7fffbd1c3f3c items=0 ppid=1843 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:24.970000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:25:24.970000 audit[1868]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1868 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:24.970000 audit[1868]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc73a5b670 a2=0 a3=7ffc73a5b65c items=0 ppid=1843 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:24.970000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:25:24.971000 audit[1869]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1869 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:24.971000 audit[1869]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffed503ae20 a2=0 a3=7ffed503ae0c items=0 ppid=1843 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:24.971000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:25:24.972000 audit[1870]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1870 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:24.972000 audit[1870]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdef1461c0 a2=0 a3=7ffdef1461ac items=0 ppid=1843 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:24.972000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:25:24.974624 kubelet[1843]: W1213 14:25:24.974345 1843 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://139.178.70.104:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:25:24.974624 kubelet[1843]: E1213 14:25:24.974372 1843 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.70.104:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:25:24.974732 kubelet[1843]: I1213 14:25:24.974713 1843 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:25:24.974732 kubelet[1843]: I1213 14:25:24.974724 1843 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:25:24.974732 kubelet[1843]: I1213 14:25:24.974734 1843 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:25:24.984261 kubelet[1843]: I1213 14:25:24.984236 1843 policy_none.go:49] "None policy: Start" Dec 13 14:25:24.984754 kubelet[1843]: I1213 14:25:24.984740 1843 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:25:24.984802 kubelet[1843]: I1213 14:25:24.984759 1843 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:25:25.045915 systemd[1]: Created slice kubepods.slice. Dec 13 14:25:25.051739 kubelet[1843]: I1213 14:25:25.051565 1843 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 14:25:25.051645 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:25:25.051854 kubelet[1843]: E1213 14:25:25.051841 1843 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://139.178.70.104:6443/api/v1/nodes\": dial tcp 139.178.70.104:6443: connect: connection refused" node="localhost" Dec 13 14:25:25.054289 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:25:25.059221 kubelet[1843]: I1213 14:25:25.059201 1843 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:25:25.057000 audit[1843]: AVC avc: denied { mac_admin } for pid=1843 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:25.057000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:25:25.057000 audit[1843]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a841e0 a1=c000c53f08 a2=c000a841b0 a3=25 items=0 ppid=1 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:25.057000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:25:25.059441 kubelet[1843]: I1213 14:25:25.059266 1843 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:25:25.059441 kubelet[1843]: I1213 14:25:25.059402 1843 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:25:25.061163 kubelet[1843]: E1213 14:25:25.061118 1843 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Dec 13 14:25:25.069825 kubelet[1843]: I1213 14:25:25.069802 1843 topology_manager.go:215] "Topology Admit Handler" podUID="a0525f50a72949ae7f052484c75cd1b8" podNamespace="kube-system" podName="kube-apiserver-localhost" Dec 13 14:25:25.070526 kubelet[1843]: I1213 14:25:25.070513 1843 topology_manager.go:215] "Topology Admit Handler" podUID="4f8e0d694c07e04969646aa3c152c34a" podNamespace="kube-system" podName="kube-controller-manager-localhost" Dec 13 14:25:25.071530 kubelet[1843]: I1213 14:25:25.071516 1843 topology_manager.go:215] "Topology Admit Handler" podUID="c4144e8f85b2123a6afada0c1705bbba" podNamespace="kube-system" podName="kube-scheduler-localhost" Dec 13 14:25:25.076047 systemd[1]: Created slice kubepods-burstable-poda0525f50a72949ae7f052484c75cd1b8.slice. Dec 13 14:25:25.091962 systemd[1]: Created slice kubepods-burstable-pod4f8e0d694c07e04969646aa3c152c34a.slice. Dec 13 14:25:25.095196 systemd[1]: Created slice kubepods-burstable-podc4144e8f85b2123a6afada0c1705bbba.slice. Dec 13 14:25:25.127184 kubelet[1843]: E1213 14:25:25.127169 1843 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://139.178.70.104:6443/api/v1/namespaces/default/events\": dial tcp 139.178.70.104:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.1810c2b1af04fc3c default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2024-12-13 14:25:24.938980412 +0000 UTC m=+0.433727551,LastTimestamp:2024-12-13 14:25:24.938980412 +0000 UTC m=+0.433727551,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Dec 13 14:25:25.151827 kubelet[1843]: E1213 14:25:25.151814 1843 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.104:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.104:6443: connect: connection refused" interval="400ms" Dec 13 14:25:25.252357 kubelet[1843]: I1213 14:25:25.252337 1843 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a0525f50a72949ae7f052484c75cd1b8-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"a0525f50a72949ae7f052484c75cd1b8\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:25:25.252418 kubelet[1843]: I1213 14:25:25.252370 1843 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:25:25.252418 kubelet[1843]: I1213 14:25:25.252387 1843 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:25:25.252418 kubelet[1843]: I1213 14:25:25.252402 1843 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:25:25.252418 kubelet[1843]: I1213 14:25:25.252418 1843 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:25:25.252526 kubelet[1843]: I1213 14:25:25.252434 1843 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/c4144e8f85b2123a6afada0c1705bbba-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"c4144e8f85b2123a6afada0c1705bbba\") " pod="kube-system/kube-scheduler-localhost" Dec 13 14:25:25.252526 kubelet[1843]: I1213 14:25:25.252458 1843 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a0525f50a72949ae7f052484c75cd1b8-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"a0525f50a72949ae7f052484c75cd1b8\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:25:25.252526 kubelet[1843]: I1213 14:25:25.252474 1843 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a0525f50a72949ae7f052484c75cd1b8-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"a0525f50a72949ae7f052484c75cd1b8\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:25:25.252526 kubelet[1843]: I1213 14:25:25.252504 1843 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:25:25.253281 kubelet[1843]: I1213 14:25:25.253267 1843 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 14:25:25.253510 kubelet[1843]: E1213 14:25:25.253500 1843 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://139.178.70.104:6443/api/v1/nodes\": dial tcp 139.178.70.104:6443: connect: connection refused" node="localhost" Dec 13 14:25:25.393349 env[1266]: time="2024-12-13T14:25:25.393269883Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:a0525f50a72949ae7f052484c75cd1b8,Namespace:kube-system,Attempt:0,}" Dec 13 14:25:25.394134 env[1266]: time="2024-12-13T14:25:25.393930017Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:4f8e0d694c07e04969646aa3c152c34a,Namespace:kube-system,Attempt:0,}" Dec 13 14:25:25.397944 env[1266]: time="2024-12-13T14:25:25.397875136Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:c4144e8f85b2123a6afada0c1705bbba,Namespace:kube-system,Attempt:0,}" Dec 13 14:25:25.552164 kubelet[1843]: E1213 14:25:25.552144 1843 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.104:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.104:6443: connect: connection refused" interval="800ms" Dec 13 14:25:25.655246 kubelet[1843]: I1213 14:25:25.655175 1843 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 14:25:25.655639 kubelet[1843]: E1213 14:25:25.655627 1843 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://139.178.70.104:6443/api/v1/nodes\": dial tcp 139.178.70.104:6443: connect: connection refused" node="localhost" Dec 13 14:25:26.039375 kubelet[1843]: W1213 14:25:26.039329 1843 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://139.178.70.104:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:25:26.039375 kubelet[1843]: E1213 14:25:26.039376 1843 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.70.104:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:25:26.096030 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount97225054.mount: Deactivated successfully. Dec 13 14:25:26.101652 env[1266]: time="2024-12-13T14:25:26.101505355Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:26.102108 env[1266]: time="2024-12-13T14:25:26.102086929Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:26.103442 env[1266]: time="2024-12-13T14:25:26.103423502Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:26.104187 env[1266]: time="2024-12-13T14:25:26.104167715Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:26.105380 env[1266]: time="2024-12-13T14:25:26.105367297Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:26.106048 env[1266]: time="2024-12-13T14:25:26.106034527Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:26.108095 env[1266]: time="2024-12-13T14:25:26.108075940Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:26.111128 env[1266]: time="2024-12-13T14:25:26.111101802Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:26.112986 env[1266]: time="2024-12-13T14:25:26.112965358Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:26.113975 env[1266]: time="2024-12-13T14:25:26.113956071Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:26.114506 env[1266]: time="2024-12-13T14:25:26.114489536Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:26.115177 env[1266]: time="2024-12-13T14:25:26.115161000Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:26.160141 env[1266]: time="2024-12-13T14:25:26.160086153Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:25:26.160225 env[1266]: time="2024-12-13T14:25:26.160142498Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:25:26.160225 env[1266]: time="2024-12-13T14:25:26.160158690Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:25:26.160327 env[1266]: time="2024-12-13T14:25:26.160298598Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b14c309f426acd15efc9c4bea61bb2a9d6ecf724ee2fc387a3ace748774fb70b pid=1881 runtime=io.containerd.runc.v2 Dec 13 14:25:26.170246 systemd[1]: Started cri-containerd-b14c309f426acd15efc9c4bea61bb2a9d6ecf724ee2fc387a3ace748774fb70b.scope. Dec 13 14:25:26.177951 kubelet[1843]: W1213 14:25:26.172683 1843 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://139.178.70.104:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:25:26.177951 kubelet[1843]: E1213 14:25:26.172730 1843 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.70.104:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:25:26.187132 env[1266]: time="2024-12-13T14:25:26.187090213Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:25:26.191308 env[1266]: time="2024-12-13T14:25:26.187194446Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:25:26.191308 env[1266]: time="2024-12-13T14:25:26.187216144Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:25:26.191308 env[1266]: time="2024-12-13T14:25:26.187326473Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/63fa41a21063609a09c3dc3207bc86d740475af88945183c38903029aa8421c2 pid=1911 runtime=io.containerd.runc.v2 Dec 13 14:25:26.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.191000 audit: BPF prog-id=61 op=LOAD Dec 13 14:25:26.191000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.191000 audit[1889]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1881 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:26.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231346333303966343236616364313565666339633462656136316262 Dec 13 14:25:26.191000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.191000 audit[1889]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1881 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:26.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231346333303966343236616364313565666339633462656136316262 Dec 13 14:25:26.192000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.192000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.192000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.192000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.192000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.192000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.192000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.192000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.192000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.192000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.192000 audit: BPF prog-id=62 op=LOAD Dec 13 14:25:26.192000 audit[1889]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000099c80 items=0 ppid=1881 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:26.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231346333303966343236616364313565666339633462656136316262 Dec 13 14:25:26.192000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.192000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.192000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.192000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.192000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.192000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.192000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.192000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.192000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.192000 audit: BPF prog-id=63 op=LOAD Dec 13 14:25:26.192000 audit[1889]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000099cc8 items=0 ppid=1881 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:26.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231346333303966343236616364313565666339633462656136316262 Dec 13 14:25:26.192000 audit: BPF prog-id=63 op=UNLOAD Dec 13 14:25:26.192000 audit: BPF prog-id=62 op=UNLOAD Dec 13 14:25:26.193000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.193000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.193000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.193000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.193000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.193000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.193000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.193000 audit[1889]: AVC avc: denied { perfmon } for pid=1889 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.193000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.193000 audit[1889]: AVC avc: denied { bpf } for pid=1889 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.193000 audit: BPF prog-id=64 op=LOAD Dec 13 14:25:26.193000 audit[1889]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003900d8 items=0 ppid=1881 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:26.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231346333303966343236616364313565666339633462656136316262 Dec 13 14:25:26.201516 systemd[1]: Started cri-containerd-63fa41a21063609a09c3dc3207bc86d740475af88945183c38903029aa8421c2.scope. Dec 13 14:25:26.222096 env[1266]: time="2024-12-13T14:25:26.222061060Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:4f8e0d694c07e04969646aa3c152c34a,Namespace:kube-system,Attempt:0,} returns sandbox id \"b14c309f426acd15efc9c4bea61bb2a9d6ecf724ee2fc387a3ace748774fb70b\"" Dec 13 14:25:26.224888 env[1266]: time="2024-12-13T14:25:26.224869022Z" level=info msg="CreateContainer within sandbox \"b14c309f426acd15efc9c4bea61bb2a9d6ecf724ee2fc387a3ace748774fb70b\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 14:25:26.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.224000 audit: BPF prog-id=65 op=LOAD Dec 13 14:25:26.224000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.224000 audit[1922]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1911 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:26.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633666134316132313036333630396130396333646333323037626338 Dec 13 14:25:26.225000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.225000 audit[1922]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1911 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:26.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633666134316132313036333630396130396333646333323037626338 Dec 13 14:25:26.225000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.225000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.225000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.225000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.225000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.225000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.225000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.225000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.225000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.225000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.225000 audit: BPF prog-id=66 op=LOAD Dec 13 14:25:26.225000 audit[1922]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000b1200 items=0 ppid=1911 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:26.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633666134316132313036333630396130396333646333323037626338 Dec 13 14:25:26.225000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.225000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.225000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.225000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.225000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.225000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.225000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.225000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.225000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.225000 audit: BPF prog-id=67 op=LOAD Dec 13 14:25:26.225000 audit[1922]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000b1248 items=0 ppid=1911 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:26.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633666134316132313036333630396130396333646333323037626338 Dec 13 14:25:26.226000 audit: BPF prog-id=67 op=UNLOAD Dec 13 14:25:26.226000 audit: BPF prog-id=66 op=UNLOAD Dec 13 14:25:26.226000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.226000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.226000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.226000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.226000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.226000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.226000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.226000 audit[1922]: AVC avc: denied { perfmon } for pid=1922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.226000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.226000 audit[1922]: AVC avc: denied { bpf } for pid=1922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.226000 audit: BPF prog-id=68 op=LOAD Dec 13 14:25:26.226000 audit[1922]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000b1658 items=0 ppid=1911 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:26.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633666134316132313036333630396130396333646333323037626338 Dec 13 14:25:26.247218 env[1266]: time="2024-12-13T14:25:26.247190463Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:c4144e8f85b2123a6afada0c1705bbba,Namespace:kube-system,Attempt:0,} returns sandbox id \"63fa41a21063609a09c3dc3207bc86d740475af88945183c38903029aa8421c2\"" Dec 13 14:25:26.248426 env[1266]: time="2024-12-13T14:25:26.248407468Z" level=info msg="CreateContainer within sandbox \"63fa41a21063609a09c3dc3207bc86d740475af88945183c38903029aa8421c2\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 14:25:26.283092 kubelet[1843]: W1213 14:25:26.283064 1843 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://139.178.70.104:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:25:26.283184 kubelet[1843]: E1213 14:25:26.283101 1843 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.70.104:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:25:26.291642 env[1266]: time="2024-12-13T14:25:26.280852399Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:25:26.291642 env[1266]: time="2024-12-13T14:25:26.280881466Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:25:26.291642 env[1266]: time="2024-12-13T14:25:26.280891056Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:25:26.291642 env[1266]: time="2024-12-13T14:25:26.280978901Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e183780275dc9f80e4b3e433f0d33ee355762cf12383119e8832ea081b2112e4 pid=1963 runtime=io.containerd.runc.v2 Dec 13 14:25:26.304785 systemd[1]: Started cri-containerd-e183780275dc9f80e4b3e433f0d33ee355762cf12383119e8832ea081b2112e4.scope. Dec 13 14:25:26.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.313000 audit: BPF prog-id=69 op=LOAD Dec 13 14:25:26.313000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.313000 audit[1973]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1963 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:26.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531383337383032373564633966383065346233653433336630643333 Dec 13 14:25:26.313000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.313000 audit[1973]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1963 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:26.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531383337383032373564633966383065346233653433336630643333 Dec 13 14:25:26.314000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.314000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.314000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.314000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.314000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.314000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.314000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.314000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.314000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.314000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.314000 audit: BPF prog-id=70 op=LOAD Dec 13 14:25:26.314000 audit[1973]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000323a50 items=0 ppid=1963 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:26.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531383337383032373564633966383065346233653433336630643333 Dec 13 14:25:26.314000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.314000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.314000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.314000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.314000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.314000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.314000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.314000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.314000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.314000 audit: BPF prog-id=71 op=LOAD Dec 13 14:25:26.314000 audit[1973]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000323a98 items=0 ppid=1963 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:26.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531383337383032373564633966383065346233653433336630643333 Dec 13 14:25:26.315000 audit: BPF prog-id=71 op=UNLOAD Dec 13 14:25:26.315000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:25:26.315000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.315000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.315000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.315000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.315000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.315000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.315000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.315000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.315000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.315000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.315000 audit: BPF prog-id=72 op=LOAD Dec 13 14:25:26.315000 audit[1973]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000323ea8 items=0 ppid=1963 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:26.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531383337383032373564633966383065346233653433336630643333 Dec 13 14:25:26.335174 env[1266]: time="2024-12-13T14:25:26.335147040Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:a0525f50a72949ae7f052484c75cd1b8,Namespace:kube-system,Attempt:0,} returns sandbox id \"e183780275dc9f80e4b3e433f0d33ee355762cf12383119e8832ea081b2112e4\"" Dec 13 14:25:26.337019 env[1266]: time="2024-12-13T14:25:26.337002759Z" level=info msg="CreateContainer within sandbox \"e183780275dc9f80e4b3e433f0d33ee355762cf12383119e8832ea081b2112e4\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 14:25:26.353725 kubelet[1843]: E1213 14:25:26.353702 1843 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.104:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.104:6443: connect: connection refused" interval="1.6s" Dec 13 14:25:26.384628 env[1266]: time="2024-12-13T14:25:26.384600910Z" level=info msg="CreateContainer within sandbox \"b14c309f426acd15efc9c4bea61bb2a9d6ecf724ee2fc387a3ace748774fb70b\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"3914b3c7fa0469d62559ab37aaef2d799de162d2e98a773a593b3fb246d132be\"" Dec 13 14:25:26.385382 env[1266]: time="2024-12-13T14:25:26.385351592Z" level=info msg="StartContainer for \"3914b3c7fa0469d62559ab37aaef2d799de162d2e98a773a593b3fb246d132be\"" Dec 13 14:25:26.388816 env[1266]: time="2024-12-13T14:25:26.388776389Z" level=info msg="CreateContainer within sandbox \"63fa41a21063609a09c3dc3207bc86d740475af88945183c38903029aa8421c2\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"bb3663ffc028b9891988d91dc9808b2983539a4df68a67775329ee63a75157dc\"" Dec 13 14:25:26.389345 env[1266]: time="2024-12-13T14:25:26.389324071Z" level=info msg="StartContainer for \"bb3663ffc028b9891988d91dc9808b2983539a4df68a67775329ee63a75157dc\"" Dec 13 14:25:26.403834 systemd[1]: Started cri-containerd-bb3663ffc028b9891988d91dc9808b2983539a4df68a67775329ee63a75157dc.scope. Dec 13 14:25:26.416565 systemd[1]: Started cri-containerd-3914b3c7fa0469d62559ab37aaef2d799de162d2e98a773a593b3fb246d132be.scope. Dec 13 14:25:26.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.420000 audit: BPF prog-id=73 op=LOAD Dec 13 14:25:26.421000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.421000 audit[2016]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1911 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:26.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262333636336666633032386239383931393838643931646339383038 Dec 13 14:25:26.421000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.421000 audit[2016]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1911 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:26.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262333636336666633032386239383931393838643931646339383038 Dec 13 14:25:26.421000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.421000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.421000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.421000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.421000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.421000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.421000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.421000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.421000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.421000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.421000 audit: BPF prog-id=74 op=LOAD Dec 13 14:25:26.421000 audit[2016]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002198e0 items=0 ppid=1911 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:26.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262333636336666633032386239383931393838643931646339383038 Dec 13 14:25:26.423000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.423000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.423000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.423000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.423000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.423000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.423000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.423000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.423000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.423000 audit: BPF prog-id=75 op=LOAD Dec 13 14:25:26.423000 audit[2016]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000219928 items=0 ppid=1911 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:26.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262333636336666633032386239383931393838643931646339383038 Dec 13 14:25:26.424000 audit: BPF prog-id=75 op=UNLOAD Dec 13 14:25:26.424000 audit: BPF prog-id=74 op=UNLOAD Dec 13 14:25:26.424000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.424000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.424000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.424000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.424000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.424000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.424000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.424000 audit[2016]: AVC avc: denied { perfmon } for pid=2016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.424000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.424000 audit[2016]: AVC avc: denied { bpf } for pid=2016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.424000 audit: BPF prog-id=76 op=LOAD Dec 13 14:25:26.424000 audit[2016]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000219d38 items=0 ppid=1911 pid=2016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:26.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262333636336666633032386239383931393838643931646339383038 Dec 13 14:25:26.427343 kubelet[1843]: W1213 14:25:26.427288 1843 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://139.178.70.104:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:25:26.427343 kubelet[1843]: E1213 14:25:26.427330 1843 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.70.104:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:25:26.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.432000 audit: BPF prog-id=77 op=LOAD Dec 13 14:25:26.433000 audit[2015]: AVC avc: denied { bpf } for pid=2015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.433000 audit[2015]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1881 pid=2015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:26.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339313462336337666130343639643632353539616233376161656632 Dec 13 14:25:26.433000 audit[2015]: AVC avc: denied { perfmon } for pid=2015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.433000 audit[2015]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1881 pid=2015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:26.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339313462336337666130343639643632353539616233376161656632 Dec 13 14:25:26.433000 audit[2015]: AVC avc: denied { bpf } for pid=2015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.433000 audit[2015]: AVC avc: denied { bpf } for pid=2015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.433000 audit[2015]: AVC avc: denied { bpf } for pid=2015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.433000 audit[2015]: AVC avc: denied { perfmon } for pid=2015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.433000 audit[2015]: AVC avc: denied { perfmon } for pid=2015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.433000 audit[2015]: AVC avc: denied { perfmon } for pid=2015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.433000 audit[2015]: AVC avc: denied { perfmon } for pid=2015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.433000 audit[2015]: AVC avc: denied { perfmon } for pid=2015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.433000 audit[2015]: AVC avc: denied { bpf } for pid=2015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.433000 audit[2015]: AVC avc: denied { bpf } for pid=2015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.433000 audit: BPF prog-id=78 op=LOAD Dec 13 14:25:26.433000 audit[2015]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002891f0 items=0 ppid=1881 pid=2015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:26.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339313462336337666130343639643632353539616233376161656632 Dec 13 14:25:26.433000 audit[2015]: AVC avc: denied { bpf } for pid=2015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.433000 audit[2015]: AVC avc: denied { bpf } for pid=2015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.433000 audit[2015]: AVC avc: denied { perfmon } for pid=2015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.433000 audit[2015]: AVC avc: denied { perfmon } for pid=2015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.433000 audit[2015]: AVC avc: denied { perfmon } for pid=2015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.433000 audit[2015]: AVC avc: denied { perfmon } for pid=2015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.433000 audit[2015]: AVC avc: denied { perfmon } for pid=2015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.433000 audit[2015]: AVC avc: denied { bpf } for pid=2015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.433000 audit[2015]: AVC avc: denied { bpf } for pid=2015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.433000 audit: BPF prog-id=79 op=LOAD Dec 13 14:25:26.433000 audit[2015]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000289238 items=0 ppid=1881 pid=2015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:26.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339313462336337666130343639643632353539616233376161656632 Dec 13 14:25:26.433000 audit: BPF prog-id=79 op=UNLOAD Dec 13 14:25:26.433000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:25:26.433000 audit[2015]: AVC avc: denied { bpf } for pid=2015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.433000 audit[2015]: AVC avc: denied { bpf } for pid=2015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.433000 audit[2015]: AVC avc: denied { bpf } for pid=2015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.433000 audit[2015]: AVC avc: denied { perfmon } for pid=2015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.433000 audit[2015]: AVC avc: denied { perfmon } for pid=2015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.433000 audit[2015]: AVC avc: denied { perfmon } for pid=2015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.433000 audit[2015]: AVC avc: denied { perfmon } for pid=2015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.433000 audit[2015]: AVC avc: denied { perfmon } for pid=2015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.433000 audit[2015]: AVC avc: denied { bpf } for pid=2015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.433000 audit[2015]: AVC avc: denied { bpf } for pid=2015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.433000 audit: BPF prog-id=80 op=LOAD Dec 13 14:25:26.433000 audit[2015]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000289648 items=0 ppid=1881 pid=2015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:26.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339313462336337666130343639643632353539616233376161656632 Dec 13 14:25:26.442707 env[1266]: time="2024-12-13T14:25:26.442662765Z" level=info msg="CreateContainer within sandbox \"e183780275dc9f80e4b3e433f0d33ee355762cf12383119e8832ea081b2112e4\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"400c977e3beeb211c38e2bc27f4a3c542ef2c959034d5265f892ac69b8b1764d\"" Dec 13 14:25:26.443125 env[1266]: time="2024-12-13T14:25:26.443106627Z" level=info msg="StartContainer for \"400c977e3beeb211c38e2bc27f4a3c542ef2c959034d5265f892ac69b8b1764d\"" Dec 13 14:25:26.463861 systemd[1]: Started cri-containerd-400c977e3beeb211c38e2bc27f4a3c542ef2c959034d5265f892ac69b8b1764d.scope. Dec 13 14:25:26.466177 kubelet[1843]: I1213 14:25:26.466159 1843 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 14:25:26.466446 kubelet[1843]: E1213 14:25:26.466429 1843 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://139.178.70.104:6443/api/v1/nodes\": dial tcp 139.178.70.104:6443: connect: connection refused" node="localhost" Dec 13 14:25:26.470836 env[1266]: time="2024-12-13T14:25:26.470804784Z" level=info msg="StartContainer for \"bb3663ffc028b9891988d91dc9808b2983539a4df68a67775329ee63a75157dc\" returns successfully" Dec 13 14:25:26.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.491000 audit: BPF prog-id=81 op=LOAD Dec 13 14:25:26.492000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.492000 audit[2059]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1963 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:26.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430306339373765336265656232313163333865326263323766346133 Dec 13 14:25:26.492000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.492000 audit[2059]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1963 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:26.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430306339373765336265656232313163333865326263323766346133 Dec 13 14:25:26.492000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.492000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.492000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.492000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.492000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.492000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.492000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.492000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.492000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.492000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.492000 audit: BPF prog-id=82 op=LOAD Dec 13 14:25:26.492000 audit[2059]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001ffc60 items=0 ppid=1963 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:26.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430306339373765336265656232313163333865326263323766346133 Dec 13 14:25:26.492000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.492000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.492000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.492000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.492000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.492000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.492000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.492000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.492000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.492000 audit: BPF prog-id=83 op=LOAD Dec 13 14:25:26.492000 audit[2059]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001ffca8 items=0 ppid=1963 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:26.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430306339373765336265656232313163333865326263323766346133 Dec 13 14:25:26.493000 audit: BPF prog-id=83 op=UNLOAD Dec 13 14:25:26.493000 audit: BPF prog-id=82 op=UNLOAD Dec 13 14:25:26.493000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.493000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.493000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.493000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.493000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.493000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.493000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.493000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.493000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.493000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:26.493000 audit: BPF prog-id=84 op=LOAD Dec 13 14:25:26.493000 audit[2059]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e40b8 items=0 ppid=1963 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:26.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430306339373765336265656232313163333865326263323766346133 Dec 13 14:25:26.518768 env[1266]: time="2024-12-13T14:25:26.518717385Z" level=info msg="StartContainer for \"3914b3c7fa0469d62559ab37aaef2d799de162d2e98a773a593b3fb246d132be\" returns successfully" Dec 13 14:25:26.540893 env[1266]: time="2024-12-13T14:25:26.540874159Z" level=info msg="StartContainer for \"400c977e3beeb211c38e2bc27f4a3c542ef2c959034d5265f892ac69b8b1764d\" returns successfully" Dec 13 14:25:27.027697 kubelet[1843]: E1213 14:25:27.027672 1843 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://139.178.70.104:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:25:27.093229 systemd[1]: run-containerd-runc-k8s.io-b14c309f426acd15efc9c4bea61bb2a9d6ecf724ee2fc387a3ace748774fb70b-runc.d3n5hH.mount: Deactivated successfully. Dec 13 14:25:27.313000 audit[2044]: AVC avc: denied { watch } for pid=2044 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:27.313000 audit[2044]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0006d3560 a2=fc6 a3=0 items=0 ppid=1881 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 key=(null) Dec 13 14:25:27.313000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:25:27.313000 audit[2044]: AVC avc: denied { watch } for pid=2044 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:27.313000 audit[2044]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001022040 a2=fc6 a3=0 items=0 ppid=1881 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 key=(null) Dec 13 14:25:27.313000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:25:27.953984 kubelet[1843]: E1213 14:25:27.953953 1843 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.104:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.104:6443: connect: connection refused" interval="3.2s" Dec 13 14:25:28.068185 kubelet[1843]: I1213 14:25:28.068149 1843 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 14:25:28.068498 kubelet[1843]: E1213 14:25:28.068383 1843 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://139.178.70.104:6443/api/v1/nodes\": dial tcp 139.178.70.104:6443: connect: connection refused" node="localhost" Dec 13 14:25:28.101110 kubelet[1843]: W1213 14:25:28.101030 1843 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://139.178.70.104:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:25:28.101110 kubelet[1843]: E1213 14:25:28.101075 1843 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.70.104:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:25:28.268312 kubelet[1843]: W1213 14:25:28.268266 1843 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://139.178.70.104:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:25:28.268312 kubelet[1843]: E1213 14:25:28.268314 1843 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.70.104:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:25:29.515000 audit[2080]: AVC avc: denied { watch } for pid=2080 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:29.525322 kernel: kauditd_printk_skb: 562 callbacks suppressed Dec 13 14:25:29.525375 kernel: audit: type=1400 audit(1734099929.515:565): avc: denied { watch } for pid=2080 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:29.516000 audit[2080]: AVC avc: denied { watch } for pid=2080 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:29.531334 kernel: audit: type=1400 audit(1734099929.516:566): avc: denied { watch } for pid=2080 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:29.531365 kernel: audit: type=1300 audit(1734099929.516:566): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0050dc900 a2=fc6 a3=0 items=0 ppid=1963 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 key=(null) Dec 13 14:25:29.516000 audit[2080]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0050dc900 a2=fc6 a3=0 items=0 ppid=1963 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 key=(null) Dec 13 14:25:29.516000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:25:29.538433 kernel: audit: type=1327 audit(1734099929.516:566): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:25:29.538469 kernel: audit: type=1300 audit(1734099929.515:565): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c006b60000 a2=fc6 a3=0 items=0 ppid=1963 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 key=(null) Dec 13 14:25:29.515000 audit[2080]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c006b60000 a2=fc6 a3=0 items=0 ppid=1963 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 key=(null) Dec 13 14:25:29.515000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:25:29.545562 kernel: audit: type=1327 audit(1734099929.515:565): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:25:29.545602 kernel: audit: type=1400 audit(1734099929.519:567): avc: denied { watch } for pid=2080 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:29.519000 audit[2080]: AVC avc: denied { watch } for pid=2080 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:29.519000 audit[2080]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c006b5c080 a2=fc6 a3=0 items=0 ppid=1963 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 key=(null) Dec 13 14:25:29.552323 kernel: audit: type=1300 audit(1734099929.519:567): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c006b5c080 a2=fc6 a3=0 items=0 ppid=1963 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 key=(null) Dec 13 14:25:29.552374 kernel: audit: type=1327 audit(1734099929.519:567): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:25:29.519000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:25:29.519000 audit[2080]: AVC avc: denied { watch } for pid=2080 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:29.558748 kernel: audit: type=1400 audit(1734099929.519:568): avc: denied { watch } for pid=2080 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:29.519000 audit[2080]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c006b60270 a2=fc6 a3=0 items=0 ppid=1963 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 key=(null) Dec 13 14:25:29.519000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:25:29.644000 audit[2080]: AVC avc: denied { watch } for pid=2080 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:29.644000 audit[2080]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c006b5ce00 a2=fc6 a3=0 items=0 ppid=1963 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 key=(null) Dec 13 14:25:29.644000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:25:29.644000 audit[2080]: AVC avc: denied { watch } for pid=2080 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:29.644000 audit[2080]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5d a1=c005f50f30 a2=fc6 a3=0 items=0 ppid=1963 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 key=(null) Dec 13 14:25:29.644000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:25:30.073985 kubelet[1843]: E1213 14:25:30.073955 1843 csi_plugin.go:300] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "localhost" not found Dec 13 14:25:30.421575 kubelet[1843]: E1213 14:25:30.421485 1843 csi_plugin.go:300] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "localhost" not found Dec 13 14:25:30.864982 kubelet[1843]: E1213 14:25:30.864960 1843 csi_plugin.go:300] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "localhost" not found Dec 13 14:25:31.175043 kubelet[1843]: E1213 14:25:31.174949 1843 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Dec 13 14:25:31.269907 kubelet[1843]: I1213 14:25:31.269875 1843 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 14:25:31.315903 kubelet[1843]: I1213 14:25:31.315874 1843 kubelet_node_status.go:76] "Successfully registered node" node="localhost" Dec 13 14:25:31.321357 kubelet[1843]: E1213 14:25:31.321334 1843 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:25:31.422018 kubelet[1843]: E1213 14:25:31.421999 1843 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:25:31.523100 kubelet[1843]: E1213 14:25:31.523068 1843 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:25:31.623522 kubelet[1843]: E1213 14:25:31.623496 1843 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:25:31.723934 kubelet[1843]: E1213 14:25:31.723910 1843 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:25:31.824438 kubelet[1843]: E1213 14:25:31.824357 1843 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:25:31.925120 kubelet[1843]: E1213 14:25:31.925088 1843 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:25:32.025772 kubelet[1843]: E1213 14:25:32.025746 1843 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:25:32.126666 kubelet[1843]: E1213 14:25:32.126562 1843 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:25:32.227132 kubelet[1843]: E1213 14:25:32.227102 1843 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:25:32.327611 kubelet[1843]: E1213 14:25:32.327584 1843 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:25:32.428194 kubelet[1843]: E1213 14:25:32.428126 1843 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:25:32.528725 kubelet[1843]: E1213 14:25:32.528696 1843 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:25:32.629239 kubelet[1843]: E1213 14:25:32.629205 1843 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:25:32.729860 kubelet[1843]: E1213 14:25:32.729774 1843 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:25:32.830378 kubelet[1843]: E1213 14:25:32.830351 1843 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:25:32.865884 systemd[1]: Reloading. Dec 13 14:25:32.925087 /usr/lib/systemd/system-generators/torcx-generator[2135]: time="2024-12-13T14:25:32Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:25:32.925314 /usr/lib/systemd/system-generators/torcx-generator[2135]: time="2024-12-13T14:25:32Z" level=info msg="torcx already run" Dec 13 14:25:32.930967 kubelet[1843]: E1213 14:25:32.930947 1843 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:25:32.978676 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:25:32.978689 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:25:32.991129 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:25:33.031363 kubelet[1843]: E1213 14:25:33.031335 1843 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:25:33.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.037000 audit: BPF prog-id=85 op=LOAD Dec 13 14:25:33.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.037000 audit: BPF prog-id=86 op=LOAD Dec 13 14:25:33.037000 audit: BPF prog-id=46 op=UNLOAD Dec 13 14:25:33.037000 audit: BPF prog-id=47 op=UNLOAD Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit: BPF prog-id=87 op=LOAD Dec 13 14:25:33.038000 audit: BPF prog-id=48 op=UNLOAD Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit: BPF prog-id=88 op=LOAD Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit: BPF prog-id=89 op=LOAD Dec 13 14:25:33.038000 audit: BPF prog-id=49 op=UNLOAD Dec 13 14:25:33.038000 audit: BPF prog-id=50 op=UNLOAD Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.038000 audit: BPF prog-id=90 op=LOAD Dec 13 14:25:33.039000 audit: BPF prog-id=51 op=UNLOAD Dec 13 14:25:33.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.039000 audit: BPF prog-id=91 op=LOAD Dec 13 14:25:33.039000 audit: BPF prog-id=81 op=UNLOAD Dec 13 14:25:33.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.039000 audit: BPF prog-id=92 op=LOAD Dec 13 14:25:33.039000 audit: BPF prog-id=65 op=UNLOAD Dec 13 14:25:33.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.040000 audit: BPF prog-id=93 op=LOAD Dec 13 14:25:33.040000 audit: BPF prog-id=69 op=UNLOAD Dec 13 14:25:33.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.040000 audit: BPF prog-id=94 op=LOAD Dec 13 14:25:33.040000 audit: BPF prog-id=52 op=UNLOAD Dec 13 14:25:33.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.040000 audit: BPF prog-id=95 op=LOAD Dec 13 14:25:33.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.040000 audit: BPF prog-id=96 op=LOAD Dec 13 14:25:33.040000 audit: BPF prog-id=53 op=UNLOAD Dec 13 14:25:33.040000 audit: BPF prog-id=54 op=UNLOAD Dec 13 14:25:33.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.041000 audit: BPF prog-id=97 op=LOAD Dec 13 14:25:33.041000 audit: BPF prog-id=61 op=UNLOAD Dec 13 14:25:33.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.042000 audit: BPF prog-id=98 op=LOAD Dec 13 14:25:33.042000 audit: BPF prog-id=55 op=UNLOAD Dec 13 14:25:33.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.042000 audit: BPF prog-id=99 op=LOAD Dec 13 14:25:33.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.042000 audit: BPF prog-id=100 op=LOAD Dec 13 14:25:33.042000 audit: BPF prog-id=56 op=UNLOAD Dec 13 14:25:33.042000 audit: BPF prog-id=57 op=UNLOAD Dec 13 14:25:33.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.043000 audit: BPF prog-id=101 op=LOAD Dec 13 14:25:33.043000 audit: BPF prog-id=58 op=UNLOAD Dec 13 14:25:33.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.044000 audit: BPF prog-id=102 op=LOAD Dec 13 14:25:33.044000 audit: BPF prog-id=77 op=UNLOAD Dec 13 14:25:33.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.044000 audit: BPF prog-id=103 op=LOAD Dec 13 14:25:33.044000 audit: BPF prog-id=73 op=UNLOAD Dec 13 14:25:33.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.044000 audit: BPF prog-id=104 op=LOAD Dec 13 14:25:33.044000 audit: BPF prog-id=59 op=UNLOAD Dec 13 14:25:33.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:33.045000 audit: BPF prog-id=105 op=LOAD Dec 13 14:25:33.045000 audit: BPF prog-id=60 op=UNLOAD Dec 13 14:25:33.054110 systemd[1]: Stopping kubelet.service... Dec 13 14:25:33.075941 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:25:33.076264 systemd[1]: Stopped kubelet.service. Dec 13 14:25:33.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:33.078090 systemd[1]: Starting kubelet.service... Dec 13 14:25:35.984048 systemd[1]: Started kubelet.service. Dec 13 14:25:35.985711 kernel: kauditd_printk_skb: 253 callbacks suppressed Dec 13 14:25:35.990069 kernel: audit: type=1130 audit(1734099935.982:816): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:35.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:36.036753 kubelet[2200]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:25:36.036992 kubelet[2200]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:25:36.037033 kubelet[2200]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:25:36.037135 kubelet[2200]: I1213 14:25:36.037111 2200 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:25:36.056359 kubelet[2200]: I1213 14:25:36.056337 2200 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 14:25:36.056359 kubelet[2200]: I1213 14:25:36.056355 2200 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:25:36.056931 kubelet[2200]: I1213 14:25:36.056539 2200 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 14:25:36.057623 kubelet[2200]: I1213 14:25:36.057611 2200 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 14:25:36.084033 kubelet[2200]: I1213 14:25:36.084012 2200 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:25:36.090787 kubelet[2200]: I1213 14:25:36.090504 2200 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:25:36.090787 kubelet[2200]: I1213 14:25:36.090669 2200 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:25:36.090920 kubelet[2200]: I1213 14:25:36.090857 2200 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:25:36.093691 kubelet[2200]: I1213 14:25:36.093646 2200 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:25:36.093691 kubelet[2200]: I1213 14:25:36.093691 2200 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:25:36.093806 kubelet[2200]: I1213 14:25:36.093730 2200 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:25:36.100650 kubelet[2200]: I1213 14:25:36.100620 2200 kubelet.go:396] "Attempting to sync node with API server" Dec 13 14:25:36.101456 kubelet[2200]: I1213 14:25:36.100951 2200 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:25:36.101456 kubelet[2200]: I1213 14:25:36.101003 2200 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:25:36.101456 kubelet[2200]: I1213 14:25:36.101019 2200 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:25:36.107268 kubelet[2200]: I1213 14:25:36.107224 2200 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:25:36.108697 kubelet[2200]: I1213 14:25:36.108413 2200 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:25:36.108870 kubelet[2200]: I1213 14:25:36.108854 2200 server.go:1256] "Started kubelet" Dec 13 14:25:36.113000 audit[2200]: AVC avc: denied { mac_admin } for pid=2200 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.117837 kubelet[2200]: I1213 14:25:36.117822 2200 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:25:36.113000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:25:36.118532 kubelet[2200]: I1213 14:25:36.118522 2200 server.go:461] "Adding debug handlers to kubelet server" Dec 13 14:25:36.119400 kubelet[2200]: I1213 14:25:36.119390 2200 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:25:36.119492 kubelet[2200]: I1213 14:25:36.119483 2200 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:25:36.119561 kubelet[2200]: I1213 14:25:36.119553 2200 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:25:36.119740 kernel: audit: type=1400 audit(1734099936.113:817): avc: denied { mac_admin } for pid=2200 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.119795 kernel: audit: type=1401 audit(1734099936.113:817): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:25:36.119813 kernel: audit: type=1300 audit(1734099936.113:817): arch=c000003e syscall=188 success=no exit=-22 a0=c000b4f7d0 a1=c000b72978 a2=c000b4f7a0 a3=25 items=0 ppid=1 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.113000 audit[2200]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b4f7d0 a1=c000b72978 a2=c000b4f7a0 a3=25 items=0 ppid=1 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.113000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:25:36.124246 kubelet[2200]: I1213 14:25:36.124232 2200 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:25:36.124673 kubelet[2200]: I1213 14:25:36.124665 2200 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:25:36.127440 kernel: audit: type=1327 audit(1734099936.113:817): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:25:36.128323 kernel: audit: type=1400 audit(1734099936.117:818): avc: denied { mac_admin } for pid=2200 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.117000 audit[2200]: AVC avc: denied { mac_admin } for pid=2200 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.117000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:25:36.132681 kernel: audit: type=1401 audit(1734099936.117:818): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:25:36.132770 kernel: audit: type=1300 audit(1734099936.117:818): arch=c000003e syscall=188 success=no exit=-22 a0=c000b51a20 a1=c000b72990 a2=c000b4f860 a3=25 items=0 ppid=1 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.117000 audit[2200]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b51a20 a1=c000b72990 a2=c000b4f860 a3=25 items=0 ppid=1 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.117000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:25:36.140380 kernel: audit: type=1327 audit(1734099936.117:818): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:25:36.165679 kubelet[2200]: I1213 14:25:36.165662 2200 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:25:36.166664 kubelet[2200]: I1213 14:25:36.166654 2200 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 14:25:36.170030 kubelet[2200]: I1213 14:25:36.167861 2200 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:25:36.170671 kubelet[2200]: I1213 14:25:36.168128 2200 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 14:25:36.170737 kubelet[2200]: I1213 14:25:36.168331 2200 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:25:36.171528 kubelet[2200]: E1213 14:25:36.171520 2200 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:25:36.172052 kubelet[2200]: I1213 14:25:36.172038 2200 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:25:36.172106 kubelet[2200]: I1213 14:25:36.172099 2200 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:25:36.172717 kubelet[2200]: I1213 14:25:36.172583 2200 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:25:36.172717 kubelet[2200]: I1213 14:25:36.172599 2200 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:25:36.172717 kubelet[2200]: I1213 14:25:36.172609 2200 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 14:25:36.172717 kubelet[2200]: E1213 14:25:36.172634 2200 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:25:36.241633 kubelet[2200]: I1213 14:25:36.241439 2200 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:25:36.241633 kubelet[2200]: I1213 14:25:36.241455 2200 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:25:36.241633 kubelet[2200]: I1213 14:25:36.241466 2200 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:25:36.241633 kubelet[2200]: I1213 14:25:36.241587 2200 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 14:25:36.241633 kubelet[2200]: I1213 14:25:36.241601 2200 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 14:25:36.241633 kubelet[2200]: I1213 14:25:36.241609 2200 policy_none.go:49] "None policy: Start" Dec 13 14:25:36.242181 kubelet[2200]: I1213 14:25:36.242168 2200 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:25:36.242220 kubelet[2200]: I1213 14:25:36.242192 2200 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:25:36.242301 kubelet[2200]: I1213 14:25:36.242291 2200 state_mem.go:75] "Updated machine memory state" Dec 13 14:25:36.244566 kubelet[2200]: I1213 14:25:36.244551 2200 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:25:36.243000 audit[2200]: AVC avc: denied { mac_admin } for pid=2200 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.244733 kubelet[2200]: I1213 14:25:36.244722 2200 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:25:36.244936 kubelet[2200]: I1213 14:25:36.244920 2200 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:25:36.247637 kernel: audit: type=1400 audit(1734099936.243:819): avc: denied { mac_admin } for pid=2200 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:36.243000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:25:36.243000 audit[2200]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ea2a80 a1=c000de1710 a2=c000ea2a50 a3=25 items=0 ppid=1 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:36.243000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:25:36.267982 kubelet[2200]: I1213 14:25:36.267962 2200 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 14:25:36.273691 kubelet[2200]: I1213 14:25:36.273674 2200 topology_manager.go:215] "Topology Admit Handler" podUID="a0525f50a72949ae7f052484c75cd1b8" podNamespace="kube-system" podName="kube-apiserver-localhost" Dec 13 14:25:36.273755 kubelet[2200]: I1213 14:25:36.273721 2200 topology_manager.go:215] "Topology Admit Handler" podUID="4f8e0d694c07e04969646aa3c152c34a" podNamespace="kube-system" podName="kube-controller-manager-localhost" Dec 13 14:25:36.273755 kubelet[2200]: I1213 14:25:36.273745 2200 topology_manager.go:215] "Topology Admit Handler" podUID="c4144e8f85b2123a6afada0c1705bbba" podNamespace="kube-system" podName="kube-scheduler-localhost" Dec 13 14:25:36.290109 kubelet[2200]: I1213 14:25:36.290086 2200 kubelet_node_status.go:112] "Node was previously registered" node="localhost" Dec 13 14:25:36.290193 kubelet[2200]: I1213 14:25:36.290139 2200 kubelet_node_status.go:76] "Successfully registered node" node="localhost" Dec 13 14:25:36.372042 kubelet[2200]: I1213 14:25:36.371924 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:25:36.372042 kubelet[2200]: I1213 14:25:36.371976 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a0525f50a72949ae7f052484c75cd1b8-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"a0525f50a72949ae7f052484c75cd1b8\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:25:36.372042 kubelet[2200]: I1213 14:25:36.371997 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a0525f50a72949ae7f052484c75cd1b8-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"a0525f50a72949ae7f052484c75cd1b8\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:25:36.372042 kubelet[2200]: I1213 14:25:36.372014 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a0525f50a72949ae7f052484c75cd1b8-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"a0525f50a72949ae7f052484c75cd1b8\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:25:36.372042 kubelet[2200]: I1213 14:25:36.372032 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:25:36.372307 kubelet[2200]: I1213 14:25:36.372051 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:25:36.372307 kubelet[2200]: I1213 14:25:36.372069 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:25:36.372307 kubelet[2200]: I1213 14:25:36.372100 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:25:36.372307 kubelet[2200]: I1213 14:25:36.372130 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/c4144e8f85b2123a6afada0c1705bbba-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"c4144e8f85b2123a6afada0c1705bbba\") " pod="kube-system/kube-scheduler-localhost" Dec 13 14:25:37.055000 audit[2044]: AVC avc: denied { watch } for pid=2044 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=8277 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 14:25:37.055000 audit[2044]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000996800 a2=fc6 a3=0 items=0 ppid=1881 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 key=(null) Dec 13 14:25:37.055000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:25:37.105004 kubelet[2200]: I1213 14:25:37.104980 2200 apiserver.go:52] "Watching apiserver" Dec 13 14:25:37.170347 kubelet[2200]: I1213 14:25:37.170325 2200 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 14:25:37.230937 kubelet[2200]: E1213 14:25:37.230908 2200 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Dec 13 14:25:37.246655 kubelet[2200]: I1213 14:25:37.246632 2200 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.246587106 podStartE2EDuration="1.246587106s" podCreationTimestamp="2024-12-13 14:25:36 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:25:37.245620652 +0000 UTC m=+1.237960723" watchObservedRunningTime="2024-12-13 14:25:37.246587106 +0000 UTC m=+1.238927173" Dec 13 14:25:37.283539 kubelet[2200]: I1213 14:25:37.283506 2200 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.283469019 podStartE2EDuration="1.283469019s" podCreationTimestamp="2024-12-13 14:25:36 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:25:37.256417546 +0000 UTC m=+1.248757616" watchObservedRunningTime="2024-12-13 14:25:37.283469019 +0000 UTC m=+1.275809086" Dec 13 14:25:37.304952 kubelet[2200]: I1213 14:25:37.304922 2200 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.304893915 podStartE2EDuration="1.304893915s" podCreationTimestamp="2024-12-13 14:25:36 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:25:37.283797472 +0000 UTC m=+1.276137539" watchObservedRunningTime="2024-12-13 14:25:37.304893915 +0000 UTC m=+1.297233983" Dec 13 14:25:37.459000 audit[2044]: AVC avc: denied { watch } for pid=2044 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:37.459000 audit[2044]: AVC avc: denied { watch } for pid=2044 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:37.459000 audit[2044]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0012aa760 a2=fc6 a3=0 items=0 ppid=1881 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 key=(null) Dec 13 14:25:37.459000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:25:37.459000 audit[2044]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d9d200 a2=fc6 a3=0 items=0 ppid=1881 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 key=(null) Dec 13 14:25:37.459000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:25:37.460000 audit[2044]: AVC avc: denied { watch } for pid=2044 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:37.460000 audit[2044]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d9d260 a2=fc6 a3=0 items=0 ppid=1881 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 key=(null) Dec 13 14:25:37.460000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:25:37.460000 audit[2044]: AVC avc: denied { watch } for pid=2044 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:25:37.460000 audit[2044]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0012aa7a0 a2=fc6 a3=0 items=0 ppid=1881 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 key=(null) Dec 13 14:25:37.460000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:25:40.942281 sudo[1485]: pam_unix(sudo:session): session closed for user root Dec 13 14:25:40.940000 audit[1485]: USER_END pid=1485 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:25:40.940000 audit[1485]: CRED_DISP pid=1485 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:25:40.972520 sshd[1482]: pam_unix(sshd:session): session closed for user core Dec 13 14:25:40.971000 audit[1482]: USER_END pid=1482 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:25:40.971000 audit[1482]: CRED_DISP pid=1482 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:25:40.974641 systemd[1]: sshd@6-139.178.70.104:22-147.75.109.163:50856.service: Deactivated successfully. Dec 13 14:25:40.975207 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 14:25:40.975312 systemd[1]: session-9.scope: Consumed 2.934s CPU time. Dec 13 14:25:40.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.104:22-147.75.109.163:50856 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:25:40.975736 systemd-logind[1236]: Session 9 logged out. Waiting for processes to exit. Dec 13 14:25:40.976433 systemd-logind[1236]: Removed session 9. Dec 13 14:25:47.685051 kubelet[2200]: I1213 14:25:47.685029 2200 topology_manager.go:215] "Topology Admit Handler" podUID="ab33ee40-c43b-4228-a3af-873ee9c4ced6" podNamespace="kube-system" podName="kube-proxy-klzmz" Dec 13 14:25:47.688141 kubelet[2200]: I1213 14:25:47.688127 2200 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 14:25:47.689001 env[1266]: time="2024-12-13T14:25:47.688972550Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:25:47.689368 kubelet[2200]: I1213 14:25:47.689358 2200 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 14:25:47.691176 systemd[1]: Created slice kubepods-besteffort-podab33ee40_c43b_4228_a3af_873ee9c4ced6.slice. Dec 13 14:25:47.745341 kubelet[2200]: I1213 14:25:47.745318 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ab33ee40-c43b-4228-a3af-873ee9c4ced6-lib-modules\") pod \"kube-proxy-klzmz\" (UID: \"ab33ee40-c43b-4228-a3af-873ee9c4ced6\") " pod="kube-system/kube-proxy-klzmz" Dec 13 14:25:47.745554 kubelet[2200]: I1213 14:25:47.745535 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/ab33ee40-c43b-4228-a3af-873ee9c4ced6-kube-proxy\") pod \"kube-proxy-klzmz\" (UID: \"ab33ee40-c43b-4228-a3af-873ee9c4ced6\") " pod="kube-system/kube-proxy-klzmz" Dec 13 14:25:47.745664 kubelet[2200]: I1213 14:25:47.745655 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ab33ee40-c43b-4228-a3af-873ee9c4ced6-xtables-lock\") pod \"kube-proxy-klzmz\" (UID: \"ab33ee40-c43b-4228-a3af-873ee9c4ced6\") " pod="kube-system/kube-proxy-klzmz" Dec 13 14:25:47.745740 kubelet[2200]: I1213 14:25:47.745733 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-g4qpl\" (UniqueName: \"kubernetes.io/projected/ab33ee40-c43b-4228-a3af-873ee9c4ced6-kube-api-access-g4qpl\") pod \"kube-proxy-klzmz\" (UID: \"ab33ee40-c43b-4228-a3af-873ee9c4ced6\") " pod="kube-system/kube-proxy-klzmz" Dec 13 14:25:47.798492 kubelet[2200]: I1213 14:25:47.798465 2200 topology_manager.go:215] "Topology Admit Handler" podUID="37d5f0eb-cc20-426d-bf19-3e5d7e654b5b" podNamespace="tigera-operator" podName="tigera-operator-c7ccbd65-llb5h" Dec 13 14:25:47.802972 systemd[1]: Created slice kubepods-besteffort-pod37d5f0eb_cc20_426d_bf19_3e5d7e654b5b.slice. Dec 13 14:25:47.851235 kubelet[2200]: I1213 14:25:47.851216 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/37d5f0eb-cc20-426d-bf19-3e5d7e654b5b-var-lib-calico\") pod \"tigera-operator-c7ccbd65-llb5h\" (UID: \"37d5f0eb-cc20-426d-bf19-3e5d7e654b5b\") " pod="tigera-operator/tigera-operator-c7ccbd65-llb5h" Dec 13 14:25:47.851355 kubelet[2200]: I1213 14:25:47.851347 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tcnsj\" (UniqueName: \"kubernetes.io/projected/37d5f0eb-cc20-426d-bf19-3e5d7e654b5b-kube-api-access-tcnsj\") pod \"tigera-operator-c7ccbd65-llb5h\" (UID: \"37d5f0eb-cc20-426d-bf19-3e5d7e654b5b\") " pod="tigera-operator/tigera-operator-c7ccbd65-llb5h" Dec 13 14:25:47.999742 env[1266]: time="2024-12-13T14:25:47.999701648Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-klzmz,Uid:ab33ee40-c43b-4228-a3af-873ee9c4ced6,Namespace:kube-system,Attempt:0,}" Dec 13 14:25:48.008470 env[1266]: time="2024-12-13T14:25:48.008424355Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:25:48.008616 env[1266]: time="2024-12-13T14:25:48.008455344Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:25:48.008616 env[1266]: time="2024-12-13T14:25:48.008462683Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:25:48.008714 env[1266]: time="2024-12-13T14:25:48.008610907Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e2da394d24a7d641b83409bb731146a4088435c4e2e635962675e58822b43da7 pid=2281 runtime=io.containerd.runc.v2 Dec 13 14:25:48.019641 systemd[1]: Started cri-containerd-e2da394d24a7d641b83409bb731146a4088435c4e2e635962675e58822b43da7.scope. Dec 13 14:25:48.034537 kernel: kauditd_printk_skb: 23 callbacks suppressed Dec 13 14:25:48.034618 kernel: audit: type=1400 audit(1734099948.026:830): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.034644 kernel: audit: type=1400 audit(1734099948.026:831): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.039230 kernel: audit: type=1400 audit(1734099948.026:832): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.039278 kernel: audit: type=1400 audit(1734099948.026:833): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.045588 kernel: audit: type=1400 audit(1734099948.026:834): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.045671 kernel: audit: type=1400 audit(1734099948.026:835): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.049069 kernel: audit: type=1400 audit(1734099948.026:836): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.049171 kernel: audit: type=1400 audit(1734099948.026:837): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.053954 kernel: audit: type=1400 audit(1734099948.026:838): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.053988 kernel: audit: type=1400 audit(1734099948.032:839): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.032000 audit: BPF prog-id=106 op=LOAD Dec 13 14:25:48.033000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.033000 audit[2291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2281 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:48.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532646133393464323461376436343162383334303962623733313134 Dec 13 14:25:48.033000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.033000 audit[2291]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2281 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:48.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532646133393464323461376436343162383334303962623733313134 Dec 13 14:25:48.033000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.033000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.033000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.033000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.033000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.033000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.033000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.033000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.033000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.033000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.033000 audit: BPF prog-id=107 op=LOAD Dec 13 14:25:48.033000 audit[2291]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002b69d0 items=0 ppid=2281 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:48.033000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532646133393464323461376436343162383334303962623733313134 Dec 13 14:25:48.035000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.035000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.035000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.035000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.035000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.035000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.035000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.035000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.035000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.035000 audit: BPF prog-id=108 op=LOAD Dec 13 14:25:48.035000 audit[2291]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002b6a18 items=0 ppid=2281 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:48.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532646133393464323461376436343162383334303962623733313134 Dec 13 14:25:48.044000 audit: BPF prog-id=108 op=UNLOAD Dec 13 14:25:48.044000 audit: BPF prog-id=107 op=UNLOAD Dec 13 14:25:48.044000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.044000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.044000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.044000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.044000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.044000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.044000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.044000 audit[2291]: AVC avc: denied { perfmon } for pid=2291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.044000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.044000 audit[2291]: AVC avc: denied { bpf } for pid=2291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.044000 audit: BPF prog-id=109 op=LOAD Dec 13 14:25:48.044000 audit[2291]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0002b6e28 items=0 ppid=2281 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:48.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532646133393464323461376436343162383334303962623733313134 Dec 13 14:25:48.065197 env[1266]: time="2024-12-13T14:25:48.065168621Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-klzmz,Uid:ab33ee40-c43b-4228-a3af-873ee9c4ced6,Namespace:kube-system,Attempt:0,} returns sandbox id \"e2da394d24a7d641b83409bb731146a4088435c4e2e635962675e58822b43da7\"" Dec 13 14:25:48.066960 env[1266]: time="2024-12-13T14:25:48.066672163Z" level=info msg="CreateContainer within sandbox \"e2da394d24a7d641b83409bb731146a4088435c4e2e635962675e58822b43da7\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:25:48.092939 env[1266]: time="2024-12-13T14:25:48.092910320Z" level=info msg="CreateContainer within sandbox \"e2da394d24a7d641b83409bb731146a4088435c4e2e635962675e58822b43da7\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"1fb5bcbfd3a083ded85c9313f83300de98a043e680ed9277222e248e106b33e7\"" Dec 13 14:25:48.094940 env[1266]: time="2024-12-13T14:25:48.093224594Z" level=info msg="StartContainer for \"1fb5bcbfd3a083ded85c9313f83300de98a043e680ed9277222e248e106b33e7\"" Dec 13 14:25:48.105504 systemd[1]: Started cri-containerd-1fb5bcbfd3a083ded85c9313f83300de98a043e680ed9277222e248e106b33e7.scope. Dec 13 14:25:48.106488 env[1266]: time="2024-12-13T14:25:48.105853909Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-llb5h,Uid:37d5f0eb-cc20-426d-bf19-3e5d7e654b5b,Namespace:tigera-operator,Attempt:0,}" Dec 13 14:25:48.117000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.117000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fb8303d2998 items=0 ppid=2281 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:48.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166623562636266643361303833646564383563393331336638333330 Dec 13 14:25:48.117000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.117000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.117000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.117000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.117000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.117000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.117000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.117000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.117000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.117000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.117000 audit: BPF prog-id=110 op=LOAD Dec 13 14:25:48.117000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0001eff88 items=0 ppid=2281 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:48.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166623562636266643361303833646564383563393331336638333330 Dec 13 14:25:48.118000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.118000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.118000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.118000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.118000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.118000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.118000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.118000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.118000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.118000 audit: BPF prog-id=111 op=LOAD Dec 13 14:25:48.118000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0001effd8 items=0 ppid=2281 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:48.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166623562636266643361303833646564383563393331336638333330 Dec 13 14:25:48.118000 audit: BPF prog-id=111 op=UNLOAD Dec 13 14:25:48.118000 audit: BPF prog-id=110 op=UNLOAD Dec 13 14:25:48.118000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.118000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.118000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.118000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.118000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.118000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.118000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.118000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.118000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.118000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.118000 audit: BPF prog-id=112 op=LOAD Dec 13 14:25:48.118000 audit[2320]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003da068 items=0 ppid=2281 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:48.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166623562636266643361303833646564383563393331336638333330 Dec 13 14:25:48.122640 env[1266]: time="2024-12-13T14:25:48.121985876Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:25:48.122640 env[1266]: time="2024-12-13T14:25:48.122014562Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:25:48.122640 env[1266]: time="2024-12-13T14:25:48.122021401Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:25:48.122640 env[1266]: time="2024-12-13T14:25:48.122109626Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/58fb365549c94f5b404f4fcb50cbb8b85209c578fa80f82ff3d669f4b74db658 pid=2345 runtime=io.containerd.runc.v2 Dec 13 14:25:48.130697 systemd[1]: Started cri-containerd-58fb365549c94f5b404f4fcb50cbb8b85209c578fa80f82ff3d669f4b74db658.scope. Dec 13 14:25:48.132776 env[1266]: time="2024-12-13T14:25:48.132755970Z" level=info msg="StartContainer for \"1fb5bcbfd3a083ded85c9313f83300de98a043e680ed9277222e248e106b33e7\" returns successfully" Dec 13 14:25:48.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit: BPF prog-id=113 op=LOAD Dec 13 14:25:48.140000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[2355]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2345 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:48.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538666233363535343963393466356234303466346663623530636262 Dec 13 14:25:48.140000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[2355]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2345 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:48.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538666233363535343963393466356234303466346663623530636262 Dec 13 14:25:48.140000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit: BPF prog-id=114 op=LOAD Dec 13 14:25:48.140000 audit[2355]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000253bc0 items=0 ppid=2345 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:48.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538666233363535343963393466356234303466346663623530636262 Dec 13 14:25:48.140000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit: BPF prog-id=115 op=LOAD Dec 13 14:25:48.140000 audit[2355]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000253c08 items=0 ppid=2345 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:48.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538666233363535343963393466356234303466346663623530636262 Dec 13 14:25:48.140000 audit: BPF prog-id=115 op=UNLOAD Dec 13 14:25:48.140000 audit: BPF prog-id=114 op=UNLOAD Dec 13 14:25:48.140000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[2355]: AVC avc: denied { perfmon } for pid=2355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit[2355]: AVC avc: denied { bpf } for pid=2355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:48.140000 audit: BPF prog-id=116 op=LOAD Dec 13 14:25:48.140000 audit[2355]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003b8018 items=0 ppid=2345 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:48.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538666233363535343963393466356234303466346663623530636262 Dec 13 14:25:48.163455 env[1266]: time="2024-12-13T14:25:48.163415200Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-llb5h,Uid:37d5f0eb-cc20-426d-bf19-3e5d7e654b5b,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"58fb365549c94f5b404f4fcb50cbb8b85209c578fa80f82ff3d669f4b74db658\"" Dec 13 14:25:48.165843 env[1266]: time="2024-12-13T14:25:48.165819274Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 14:25:48.865766 systemd[1]: run-containerd-runc-k8s.io-e2da394d24a7d641b83409bb731146a4088435c4e2e635962675e58822b43da7-runc.Ruuais.mount: Deactivated successfully. Dec 13 14:25:48.982000 audit[2413]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2413 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:48.982000 audit[2413]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffde40c4450 a2=0 a3=7ffde40c443c items=0 ppid=2331 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:48.982000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:25:48.983000 audit[2414]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=2414 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:48.983000 audit[2414]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb24b4740 a2=0 a3=7fffb24b472c items=0 ppid=2331 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:48.983000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:25:48.984000 audit[2415]: NETFILTER_CFG table=filter:40 family=10 entries=1 op=nft_register_chain pid=2415 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:48.984000 audit[2415]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce7827130 a2=0 a3=7ffce782711c items=0 ppid=2331 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:48.984000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:25:48.984000 audit[2416]: NETFILTER_CFG table=mangle:41 family=2 entries=1 op=nft_register_chain pid=2416 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:48.984000 audit[2416]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc0f418760 a2=0 a3=7ffc0f41874c items=0 ppid=2331 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:48.984000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:25:48.985000 audit[2417]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2417 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:48.985000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc154ee650 a2=0 a3=7ffc154ee63c items=0 ppid=2331 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:48.985000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:25:48.986000 audit[2418]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2418 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:48.986000 audit[2418]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe24be37f0 a2=0 a3=7ffe24be37dc items=0 ppid=2331 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:48.986000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:25:49.238000 audit[2419]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2419 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:49.238000 audit[2419]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff0a00a9a0 a2=0 a3=7fff0a00a98c items=0 ppid=2331 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.238000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:25:49.242000 audit[2421]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2421 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:49.242000 audit[2421]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff7f29c310 a2=0 a3=7fff7f29c2fc items=0 ppid=2331 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.242000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:25:49.246000 audit[2424]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2424 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:49.246000 audit[2424]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe3b247fa0 a2=0 a3=7ffe3b247f8c items=0 ppid=2331 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.246000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:25:49.247000 audit[2425]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:49.247000 audit[2425]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe1701f330 a2=0 a3=7ffe1701f31c items=0 ppid=2331 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.247000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:25:49.249000 audit[2427]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2427 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:49.249000 audit[2427]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcfb4cd460 a2=0 a3=7ffcfb4cd44c items=0 ppid=2331 pid=2427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.249000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:25:49.250000 audit[2428]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2428 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:49.250000 audit[2428]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd9526c480 a2=0 a3=7ffd9526c46c items=0 ppid=2331 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.250000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:25:49.253000 audit[2430]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2430 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:49.253000 audit[2430]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc7bed6210 a2=0 a3=7ffc7bed61fc items=0 ppid=2331 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.253000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:25:49.256000 audit[2433]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2433 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:49.256000 audit[2433]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe709ccc40 a2=0 a3=7ffe709ccc2c items=0 ppid=2331 pid=2433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.256000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:25:49.257000 audit[2434]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2434 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:49.257000 audit[2434]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd65072c80 a2=0 a3=7ffd65072c6c items=0 ppid=2331 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.257000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:25:49.259000 audit[2436]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2436 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:49.259000 audit[2436]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffee079a240 a2=0 a3=7ffee079a22c items=0 ppid=2331 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.259000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:25:49.260000 audit[2437]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2437 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:49.260000 audit[2437]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffba2e6830 a2=0 a3=7fffba2e681c items=0 ppid=2331 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.260000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:25:49.262000 audit[2439]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2439 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:49.262000 audit[2439]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff6e0f5f90 a2=0 a3=7fff6e0f5f7c items=0 ppid=2331 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.262000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:25:49.265000 audit[2442]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2442 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:49.265000 audit[2442]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff705397f0 a2=0 a3=7fff705397dc items=0 ppid=2331 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.265000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:25:49.267000 audit[2445]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2445 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:49.267000 audit[2445]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc1d2fb3f0 a2=0 a3=7ffc1d2fb3dc items=0 ppid=2331 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.267000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:25:49.268000 audit[2446]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2446 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:49.268000 audit[2446]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff5f139790 a2=0 a3=7fff5f13977c items=0 ppid=2331 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.268000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:25:49.274000 audit[2448]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2448 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:49.274000 audit[2448]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffe42eee260 a2=0 a3=7ffe42eee24c items=0 ppid=2331 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.274000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:25:49.276000 audit[2451]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2451 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:49.276000 audit[2451]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc204ef590 a2=0 a3=7ffc204ef57c items=0 ppid=2331 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.276000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:25:49.277000 audit[2452]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2452 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:49.277000 audit[2452]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe6a3a2030 a2=0 a3=7ffe6a3a201c items=0 ppid=2331 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.277000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:25:49.278000 audit[2454]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2454 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:25:49.278000 audit[2454]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd3ab50410 a2=0 a3=7ffd3ab503fc items=0 ppid=2331 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.278000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:25:49.306000 audit[2460]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2460 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:49.306000 audit[2460]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fff7e552bc0 a2=0 a3=7fff7e552bac items=0 ppid=2331 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.306000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:49.314000 audit[2460]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2460 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:49.314000 audit[2460]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fff7e552bc0 a2=0 a3=7fff7e552bac items=0 ppid=2331 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.314000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:49.316000 audit[2465]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2465 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:49.316000 audit[2465]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe5c221c60 a2=0 a3=7ffe5c221c4c items=0 ppid=2331 pid=2465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.316000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:25:49.318000 audit[2467]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2467 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:49.318000 audit[2467]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffecc9ecdc0 a2=0 a3=7ffecc9ecdac items=0 ppid=2331 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.318000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:25:49.321000 audit[2470]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2470 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:49.321000 audit[2470]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffda30f07c0 a2=0 a3=7ffda30f07ac items=0 ppid=2331 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.321000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:25:49.322000 audit[2471]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2471 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:49.322000 audit[2471]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd25bfef0 a2=0 a3=7ffcd25bfedc items=0 ppid=2331 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.322000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:25:49.323000 audit[2473]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2473 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:49.323000 audit[2473]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc1f62b450 a2=0 a3=7ffc1f62b43c items=0 ppid=2331 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.323000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:25:49.324000 audit[2474]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2474 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:49.324000 audit[2474]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc974fc490 a2=0 a3=7ffc974fc47c items=0 ppid=2331 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.324000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:25:49.326000 audit[2476]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2476 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:49.326000 audit[2476]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc470af5f0 a2=0 a3=7ffc470af5dc items=0 ppid=2331 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.326000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:25:49.328000 audit[2479]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2479 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:49.328000 audit[2479]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffdfcf07ef0 a2=0 a3=7ffdfcf07edc items=0 ppid=2331 pid=2479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.328000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:25:49.329000 audit[2480]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2480 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:49.329000 audit[2480]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd03eeea90 a2=0 a3=7ffd03eeea7c items=0 ppid=2331 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.329000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:25:49.330000 audit[2482]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2482 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:49.330000 audit[2482]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffd2990c00 a2=0 a3=7fffd2990bec items=0 ppid=2331 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.330000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:25:49.331000 audit[2483]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2483 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:49.331000 audit[2483]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff6d3781e0 a2=0 a3=7fff6d3781cc items=0 ppid=2331 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.331000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:25:49.333000 audit[2485]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2485 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:49.333000 audit[2485]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd132b7b00 a2=0 a3=7ffd132b7aec items=0 ppid=2331 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.333000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:25:49.335000 audit[2488]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2488 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:49.335000 audit[2488]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffb5c145d0 a2=0 a3=7fffb5c145bc items=0 ppid=2331 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.335000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:25:49.337000 audit[2491]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2491 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:49.337000 audit[2491]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffce4858830 a2=0 a3=7ffce485881c items=0 ppid=2331 pid=2491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.337000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:25:49.338000 audit[2492]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2492 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:49.338000 audit[2492]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd618ba060 a2=0 a3=7ffd618ba04c items=0 ppid=2331 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.338000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:25:49.339000 audit[2494]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2494 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:49.339000 audit[2494]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdf4cf9e50 a2=0 a3=7ffdf4cf9e3c items=0 ppid=2331 pid=2494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.339000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:25:49.341000 audit[2497]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2497 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:49.341000 audit[2497]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffde477d020 a2=0 a3=7ffde477d00c items=0 ppid=2331 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.341000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:25:49.342000 audit[2498]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2498 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:49.342000 audit[2498]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe7930aaf0 a2=0 a3=7ffe7930aadc items=0 ppid=2331 pid=2498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.342000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:25:49.343000 audit[2500]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2500 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:49.343000 audit[2500]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe25eb6660 a2=0 a3=7ffe25eb664c items=0 ppid=2331 pid=2500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.343000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:25:49.344000 audit[2501]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2501 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:49.344000 audit[2501]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff23f0670 a2=0 a3=7ffff23f065c items=0 ppid=2331 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.344000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:25:49.346000 audit[2503]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2503 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:49.346000 audit[2503]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc6e5edd90 a2=0 a3=7ffc6e5edd7c items=0 ppid=2331 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.346000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:25:49.348000 audit[2506]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2506 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:25:49.348000 audit[2506]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc120f8300 a2=0 a3=7ffc120f82ec items=0 ppid=2331 pid=2506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.348000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:25:49.350000 audit[2508]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2508 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:25:49.350000 audit[2508]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffe7b432100 a2=0 a3=7ffe7b4320ec items=0 ppid=2331 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.350000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:49.350000 audit[2508]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2508 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:25:49.350000 audit[2508]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe7b432100 a2=0 a3=7ffe7b4320ec items=0 ppid=2331 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:49.350000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:51.176833 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1373370895.mount: Deactivated successfully. Dec 13 14:25:51.736920 env[1266]: time="2024-12-13T14:25:51.736737036Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:51.738621 env[1266]: time="2024-12-13T14:25:51.738592822Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:51.739564 env[1266]: time="2024-12-13T14:25:51.739529410Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:51.740759 env[1266]: time="2024-12-13T14:25:51.740734234Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:51.741285 env[1266]: time="2024-12-13T14:25:51.741266277Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 14:25:51.791838 env[1266]: time="2024-12-13T14:25:51.791813004Z" level=info msg="CreateContainer within sandbox \"58fb365549c94f5b404f4fcb50cbb8b85209c578fa80f82ff3d669f4b74db658\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 14:25:51.810760 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2822009645.mount: Deactivated successfully. Dec 13 14:25:51.819373 env[1266]: time="2024-12-13T14:25:51.819308325Z" level=info msg="CreateContainer within sandbox \"58fb365549c94f5b404f4fcb50cbb8b85209c578fa80f82ff3d669f4b74db658\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"2705bcd7c7040daebcd41493048784c42026c1c510e12a7254ca84a219d33707\"" Dec 13 14:25:51.820273 env[1266]: time="2024-12-13T14:25:51.820212743Z" level=info msg="StartContainer for \"2705bcd7c7040daebcd41493048784c42026c1c510e12a7254ca84a219d33707\"" Dec 13 14:25:51.833145 systemd[1]: Started cri-containerd-2705bcd7c7040daebcd41493048784c42026c1c510e12a7254ca84a219d33707.scope. Dec 13 14:25:51.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.847000 audit: BPF prog-id=117 op=LOAD Dec 13 14:25:51.848000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.848000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2345 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:51.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237303562636437633730343064616562636434313439333034383738 Dec 13 14:25:51.848000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.848000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2345 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:51.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237303562636437633730343064616562636434313439333034383738 Dec 13 14:25:51.848000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.848000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.848000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.848000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.848000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.848000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.848000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.848000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.848000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.848000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.848000 audit: BPF prog-id=118 op=LOAD Dec 13 14:25:51.848000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000353d10 items=0 ppid=2345 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:51.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237303562636437633730343064616562636434313439333034383738 Dec 13 14:25:51.848000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.848000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.848000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.848000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.848000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.848000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.848000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.848000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.848000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.848000 audit: BPF prog-id=119 op=LOAD Dec 13 14:25:51.848000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000353d58 items=0 ppid=2345 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:51.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237303562636437633730343064616562636434313439333034383738 Dec 13 14:25:51.848000 audit: BPF prog-id=119 op=UNLOAD Dec 13 14:25:51.848000 audit: BPF prog-id=118 op=UNLOAD Dec 13 14:25:51.848000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.848000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.848000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.848000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.848000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.848000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.848000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.848000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.848000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.848000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:51.848000 audit: BPF prog-id=120 op=LOAD Dec 13 14:25:51.848000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b2168 items=0 ppid=2345 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:51.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237303562636437633730343064616562636434313439333034383738 Dec 13 14:25:51.883431 env[1266]: time="2024-12-13T14:25:51.883398795Z" level=info msg="StartContainer for \"2705bcd7c7040daebcd41493048784c42026c1c510e12a7254ca84a219d33707\" returns successfully" Dec 13 14:25:52.143653 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3806640785.mount: Deactivated successfully. Dec 13 14:25:52.280381 kubelet[2200]: I1213 14:25:52.280138 2200 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-klzmz" podStartSLOduration=5.280107396 podStartE2EDuration="5.280107396s" podCreationTimestamp="2024-12-13 14:25:47 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:25:48.274883144 +0000 UTC m=+12.267223218" watchObservedRunningTime="2024-12-13 14:25:52.280107396 +0000 UTC m=+16.272447465" Dec 13 14:25:54.713914 kernel: kauditd_printk_skb: 357 callbacks suppressed Dec 13 14:25:54.714052 kernel: audit: type=1325 audit(1734099954.707:941): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2549 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:54.707000 audit[2549]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2549 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:54.718695 kernel: audit: type=1300 audit(1734099954.707:941): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc0b6f7f20 a2=0 a3=7ffc0b6f7f0c items=0 ppid=2331 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:54.707000 audit[2549]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc0b6f7f20 a2=0 a3=7ffc0b6f7f0c items=0 ppid=2331 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:54.707000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:54.723569 kernel: audit: type=1327 audit(1734099954.707:941): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:54.722000 audit[2549]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2549 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:54.726576 kernel: audit: type=1325 audit(1734099954.722:942): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2549 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:54.722000 audit[2549]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc0b6f7f20 a2=0 a3=0 items=0 ppid=2331 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:54.734938 kernel: audit: type=1300 audit(1734099954.722:942): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc0b6f7f20 a2=0 a3=0 items=0 ppid=2331 pid=2549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:54.735023 kernel: audit: type=1327 audit(1734099954.722:942): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:54.722000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:54.753000 audit[2551]: NETFILTER_CFG table=filter:91 family=2 entries=17 op=nft_register_rule pid=2551 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:54.753000 audit[2551]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7fff6fd91ac0 a2=0 a3=7fff6fd91aac items=0 ppid=2331 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:54.760802 kernel: audit: type=1325 audit(1734099954.753:943): table=filter:91 family=2 entries=17 op=nft_register_rule pid=2551 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:54.760911 kernel: audit: type=1300 audit(1734099954.753:943): arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7fff6fd91ac0 a2=0 a3=7fff6fd91aac items=0 ppid=2331 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:54.753000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:54.763028 kernel: audit: type=1327 audit(1734099954.753:943): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:54.762000 audit[2551]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2551 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:54.762000 audit[2551]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff6fd91ac0 a2=0 a3=0 items=0 ppid=2331 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:54.762000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:54.766626 kernel: audit: type=1325 audit(1734099954.762:944): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2551 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:54.986114 kubelet[2200]: I1213 14:25:54.986033 2200 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-c7ccbd65-llb5h" podStartSLOduration=4.408844186 podStartE2EDuration="7.986003715s" podCreationTimestamp="2024-12-13 14:25:47 +0000 UTC" firstStartedPulling="2024-12-13 14:25:48.164425006 +0000 UTC m=+12.156765072" lastFinishedPulling="2024-12-13 14:25:51.741584531 +0000 UTC m=+15.733924601" observedRunningTime="2024-12-13 14:25:52.280427755 +0000 UTC m=+16.272767826" watchObservedRunningTime="2024-12-13 14:25:54.986003715 +0000 UTC m=+18.978343784" Dec 13 14:25:54.986114 kubelet[2200]: I1213 14:25:54.986109 2200 topology_manager.go:215] "Topology Admit Handler" podUID="fa7cb15c-5b71-4524-b21b-8e43e526f8a7" podNamespace="calico-system" podName="calico-typha-6b86f6f76-dmn7s" Dec 13 14:25:54.990656 kubelet[2200]: W1213 14:25:54.990634 2200 reflector.go:539] object-"calico-system"/"typha-certs": failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:localhost" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'localhost' and this object Dec 13 14:25:54.990798 kubelet[2200]: E1213 14:25:54.990789 2200 reflector.go:147] object-"calico-system"/"typha-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:localhost" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'localhost' and this object Dec 13 14:25:54.999339 systemd[1]: Created slice kubepods-besteffort-podfa7cb15c_5b71_4524_b21b_8e43e526f8a7.slice. Dec 13 14:25:55.078109 kubelet[2200]: I1213 14:25:55.078084 2200 topology_manager.go:215] "Topology Admit Handler" podUID="cf2d168e-3047-4c3a-a21d-1ba1c5c304b3" podNamespace="calico-system" podName="calico-node-gz2sk" Dec 13 14:25:55.081645 systemd[1]: Created slice kubepods-besteffort-podcf2d168e_3047_4c3a_a21d_1ba1c5c304b3.slice. Dec 13 14:25:55.110310 kubelet[2200]: I1213 14:25:55.110291 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/fa7cb15c-5b71-4524-b21b-8e43e526f8a7-typha-certs\") pod \"calico-typha-6b86f6f76-dmn7s\" (UID: \"fa7cb15c-5b71-4524-b21b-8e43e526f8a7\") " pod="calico-system/calico-typha-6b86f6f76-dmn7s" Dec 13 14:25:55.110449 kubelet[2200]: I1213 14:25:55.110439 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/fa7cb15c-5b71-4524-b21b-8e43e526f8a7-tigera-ca-bundle\") pod \"calico-typha-6b86f6f76-dmn7s\" (UID: \"fa7cb15c-5b71-4524-b21b-8e43e526f8a7\") " pod="calico-system/calico-typha-6b86f6f76-dmn7s" Dec 13 14:25:55.110513 kubelet[2200]: I1213 14:25:55.110506 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p4hvr\" (UniqueName: \"kubernetes.io/projected/fa7cb15c-5b71-4524-b21b-8e43e526f8a7-kube-api-access-p4hvr\") pod \"calico-typha-6b86f6f76-dmn7s\" (UID: \"fa7cb15c-5b71-4524-b21b-8e43e526f8a7\") " pod="calico-system/calico-typha-6b86f6f76-dmn7s" Dec 13 14:25:55.211301 kubelet[2200]: I1213 14:25:55.211281 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/cf2d168e-3047-4c3a-a21d-1ba1c5c304b3-flexvol-driver-host\") pod \"calico-node-gz2sk\" (UID: \"cf2d168e-3047-4c3a-a21d-1ba1c5c304b3\") " pod="calico-system/calico-node-gz2sk" Dec 13 14:25:55.211444 kubelet[2200]: I1213 14:25:55.211434 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/cf2d168e-3047-4c3a-a21d-1ba1c5c304b3-lib-modules\") pod \"calico-node-gz2sk\" (UID: \"cf2d168e-3047-4c3a-a21d-1ba1c5c304b3\") " pod="calico-system/calico-node-gz2sk" Dec 13 14:25:55.211506 kubelet[2200]: I1213 14:25:55.211498 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/cf2d168e-3047-4c3a-a21d-1ba1c5c304b3-node-certs\") pod \"calico-node-gz2sk\" (UID: \"cf2d168e-3047-4c3a-a21d-1ba1c5c304b3\") " pod="calico-system/calico-node-gz2sk" Dec 13 14:25:55.211588 kubelet[2200]: I1213 14:25:55.211579 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/cf2d168e-3047-4c3a-a21d-1ba1c5c304b3-cni-net-dir\") pod \"calico-node-gz2sk\" (UID: \"cf2d168e-3047-4c3a-a21d-1ba1c5c304b3\") " pod="calico-system/calico-node-gz2sk" Dec 13 14:25:55.211670 kubelet[2200]: I1213 14:25:55.211660 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/cf2d168e-3047-4c3a-a21d-1ba1c5c304b3-cni-log-dir\") pod \"calico-node-gz2sk\" (UID: \"cf2d168e-3047-4c3a-a21d-1ba1c5c304b3\") " pod="calico-system/calico-node-gz2sk" Dec 13 14:25:55.211748 kubelet[2200]: I1213 14:25:55.211739 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/cf2d168e-3047-4c3a-a21d-1ba1c5c304b3-policysync\") pod \"calico-node-gz2sk\" (UID: \"cf2d168e-3047-4c3a-a21d-1ba1c5c304b3\") " pod="calico-system/calico-node-gz2sk" Dec 13 14:25:55.211825 kubelet[2200]: I1213 14:25:55.211815 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/cf2d168e-3047-4c3a-a21d-1ba1c5c304b3-var-lib-calico\") pod \"calico-node-gz2sk\" (UID: \"cf2d168e-3047-4c3a-a21d-1ba1c5c304b3\") " pod="calico-system/calico-node-gz2sk" Dec 13 14:25:55.211905 kubelet[2200]: I1213 14:25:55.211896 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/cf2d168e-3047-4c3a-a21d-1ba1c5c304b3-cni-bin-dir\") pod \"calico-node-gz2sk\" (UID: \"cf2d168e-3047-4c3a-a21d-1ba1c5c304b3\") " pod="calico-system/calico-node-gz2sk" Dec 13 14:25:55.212006 kubelet[2200]: I1213 14:25:55.211995 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/cf2d168e-3047-4c3a-a21d-1ba1c5c304b3-xtables-lock\") pod \"calico-node-gz2sk\" (UID: \"cf2d168e-3047-4c3a-a21d-1ba1c5c304b3\") " pod="calico-system/calico-node-gz2sk" Dec 13 14:25:55.212083 kubelet[2200]: I1213 14:25:55.212074 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/cf2d168e-3047-4c3a-a21d-1ba1c5c304b3-tigera-ca-bundle\") pod \"calico-node-gz2sk\" (UID: \"cf2d168e-3047-4c3a-a21d-1ba1c5c304b3\") " pod="calico-system/calico-node-gz2sk" Dec 13 14:25:55.212169 kubelet[2200]: I1213 14:25:55.212159 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/cf2d168e-3047-4c3a-a21d-1ba1c5c304b3-var-run-calico\") pod \"calico-node-gz2sk\" (UID: \"cf2d168e-3047-4c3a-a21d-1ba1c5c304b3\") " pod="calico-system/calico-node-gz2sk" Dec 13 14:25:55.212250 kubelet[2200]: I1213 14:25:55.212241 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-chqqm\" (UniqueName: \"kubernetes.io/projected/cf2d168e-3047-4c3a-a21d-1ba1c5c304b3-kube-api-access-chqqm\") pod \"calico-node-gz2sk\" (UID: \"cf2d168e-3047-4c3a-a21d-1ba1c5c304b3\") " pod="calico-system/calico-node-gz2sk" Dec 13 14:25:55.236798 kubelet[2200]: I1213 14:25:55.236722 2200 topology_manager.go:215] "Topology Admit Handler" podUID="c89227ed-30a3-4f3d-ba16-397f58d31fe4" podNamespace="calico-system" podName="csi-node-driver-xlj8g" Dec 13 14:25:55.237108 kubelet[2200]: E1213 14:25:55.237093 2200 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xlj8g" podUID="c89227ed-30a3-4f3d-ba16-397f58d31fe4" Dec 13 14:25:55.315249 kubelet[2200]: E1213 14:25:55.315225 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.315394 kubelet[2200]: W1213 14:25:55.315380 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.315482 kubelet[2200]: E1213 14:25:55.315470 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.315668 kubelet[2200]: E1213 14:25:55.315659 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.315741 kubelet[2200]: W1213 14:25:55.315729 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.315818 kubelet[2200]: E1213 14:25:55.315808 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.315989 kubelet[2200]: E1213 14:25:55.315981 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.319893 kubelet[2200]: W1213 14:25:55.319871 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.320073 kubelet[2200]: E1213 14:25:55.320060 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.321369 kubelet[2200]: E1213 14:25:55.320330 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.321369 kubelet[2200]: W1213 14:25:55.320341 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.321369 kubelet[2200]: E1213 14:25:55.320357 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.321369 kubelet[2200]: E1213 14:25:55.320466 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.321369 kubelet[2200]: W1213 14:25:55.320472 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.321369 kubelet[2200]: E1213 14:25:55.320483 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.321949 kubelet[2200]: E1213 14:25:55.321927 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.321949 kubelet[2200]: W1213 14:25:55.321945 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.322176 kubelet[2200]: E1213 14:25:55.322056 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.322176 kubelet[2200]: E1213 14:25:55.322153 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.322176 kubelet[2200]: W1213 14:25:55.322160 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.322299 kubelet[2200]: E1213 14:25:55.322269 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.322299 kubelet[2200]: W1213 14:25:55.322276 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.322395 kubelet[2200]: E1213 14:25:55.322383 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.322473 kubelet[2200]: E1213 14:25:55.322396 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.322530 kubelet[2200]: W1213 14:25:55.322519 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.322616 kubelet[2200]: E1213 14:25:55.322414 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.322659 kubelet[2200]: E1213 14:25:55.322647 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.323679 kubelet[2200]: E1213 14:25:55.323663 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.323861 kubelet[2200]: W1213 14:25:55.323847 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.323943 kubelet[2200]: E1213 14:25:55.323932 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.324113 kubelet[2200]: E1213 14:25:55.324100 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.324113 kubelet[2200]: W1213 14:25:55.324109 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.324192 kubelet[2200]: E1213 14:25:55.324124 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.324234 kubelet[2200]: E1213 14:25:55.324213 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.324234 kubelet[2200]: W1213 14:25:55.324223 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.324234 kubelet[2200]: E1213 14:25:55.324230 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.326599 kubelet[2200]: E1213 14:25:55.324333 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.326599 kubelet[2200]: W1213 14:25:55.324339 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.326599 kubelet[2200]: E1213 14:25:55.324350 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.326599 kubelet[2200]: E1213 14:25:55.324440 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.326599 kubelet[2200]: W1213 14:25:55.324444 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.326599 kubelet[2200]: E1213 14:25:55.324451 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.326599 kubelet[2200]: E1213 14:25:55.324520 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.326599 kubelet[2200]: W1213 14:25:55.324524 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.326599 kubelet[2200]: E1213 14:25:55.324530 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.326599 kubelet[2200]: E1213 14:25:55.324637 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.326892 kubelet[2200]: W1213 14:25:55.324642 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.326892 kubelet[2200]: E1213 14:25:55.324647 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.326892 kubelet[2200]: E1213 14:25:55.324717 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.326892 kubelet[2200]: W1213 14:25:55.324721 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.326892 kubelet[2200]: E1213 14:25:55.324727 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.326892 kubelet[2200]: E1213 14:25:55.324799 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.326892 kubelet[2200]: W1213 14:25:55.324803 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.326892 kubelet[2200]: E1213 14:25:55.324810 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.326892 kubelet[2200]: E1213 14:25:55.324875 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.326892 kubelet[2200]: W1213 14:25:55.324879 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.327087 kubelet[2200]: E1213 14:25:55.324884 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.327087 kubelet[2200]: E1213 14:25:55.324949 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.327087 kubelet[2200]: W1213 14:25:55.324953 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.327087 kubelet[2200]: E1213 14:25:55.324958 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.327087 kubelet[2200]: E1213 14:25:55.325025 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.327087 kubelet[2200]: W1213 14:25:55.325030 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.327087 kubelet[2200]: E1213 14:25:55.325035 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.327087 kubelet[2200]: E1213 14:25:55.325105 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.327087 kubelet[2200]: W1213 14:25:55.325109 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.327087 kubelet[2200]: E1213 14:25:55.325115 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.327281 kubelet[2200]: E1213 14:25:55.325181 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.327281 kubelet[2200]: W1213 14:25:55.325185 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.327281 kubelet[2200]: E1213 14:25:55.325191 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.327281 kubelet[2200]: E1213 14:25:55.325257 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.327281 kubelet[2200]: W1213 14:25:55.325260 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.327281 kubelet[2200]: E1213 14:25:55.325266 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.327281 kubelet[2200]: E1213 14:25:55.325329 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.327281 kubelet[2200]: W1213 14:25:55.325333 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.327281 kubelet[2200]: E1213 14:25:55.325339 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.327281 kubelet[2200]: E1213 14:25:55.325409 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.327460 kubelet[2200]: W1213 14:25:55.325413 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.327460 kubelet[2200]: E1213 14:25:55.325419 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.327460 kubelet[2200]: E1213 14:25:55.325484 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.327460 kubelet[2200]: W1213 14:25:55.325488 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.327460 kubelet[2200]: E1213 14:25:55.325494 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.327460 kubelet[2200]: E1213 14:25:55.325574 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.327460 kubelet[2200]: W1213 14:25:55.325578 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.327460 kubelet[2200]: E1213 14:25:55.325586 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.327460 kubelet[2200]: E1213 14:25:55.325687 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.327460 kubelet[2200]: W1213 14:25:55.325691 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.327667 kubelet[2200]: E1213 14:25:55.325697 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.333520 kubelet[2200]: E1213 14:25:55.333506 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.333635 kubelet[2200]: W1213 14:25:55.333625 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.333777 kubelet[2200]: E1213 14:25:55.333766 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.396828 env[1266]: time="2024-12-13T14:25:55.396774093Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-gz2sk,Uid:cf2d168e-3047-4c3a-a21d-1ba1c5c304b3,Namespace:calico-system,Attempt:0,}" Dec 13 14:25:55.414376 kubelet[2200]: E1213 14:25:55.414355 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.414491 kubelet[2200]: W1213 14:25:55.414480 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.414560 kubelet[2200]: E1213 14:25:55.414551 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.414626 kubelet[2200]: I1213 14:25:55.414619 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/c89227ed-30a3-4f3d-ba16-397f58d31fe4-registration-dir\") pod \"csi-node-driver-xlj8g\" (UID: \"c89227ed-30a3-4f3d-ba16-397f58d31fe4\") " pod="calico-system/csi-node-driver-xlj8g" Dec 13 14:25:55.414803 kubelet[2200]: E1213 14:25:55.414796 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.414861 kubelet[2200]: W1213 14:25:55.414852 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.414920 kubelet[2200]: E1213 14:25:55.414912 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.415071 kubelet[2200]: E1213 14:25:55.415064 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.415128 kubelet[2200]: W1213 14:25:55.415120 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.415179 kubelet[2200]: E1213 14:25:55.415172 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.415229 kubelet[2200]: I1213 14:25:55.415222 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/c89227ed-30a3-4f3d-ba16-397f58d31fe4-varrun\") pod \"csi-node-driver-xlj8g\" (UID: \"c89227ed-30a3-4f3d-ba16-397f58d31fe4\") " pod="calico-system/csi-node-driver-xlj8g" Dec 13 14:25:55.415403 kubelet[2200]: E1213 14:25:55.415394 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.415469 kubelet[2200]: W1213 14:25:55.415459 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.415541 kubelet[2200]: E1213 14:25:55.415531 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.415755 kubelet[2200]: E1213 14:25:55.415747 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.415816 kubelet[2200]: W1213 14:25:55.415808 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.415869 kubelet[2200]: E1213 14:25:55.415862 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.416058 kubelet[2200]: E1213 14:25:55.416051 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.416105 kubelet[2200]: W1213 14:25:55.416097 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.416161 kubelet[2200]: E1213 14:25:55.416154 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.416301 kubelet[2200]: E1213 14:25:55.416296 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.416351 kubelet[2200]: W1213 14:25:55.416343 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.416402 kubelet[2200]: E1213 14:25:55.416395 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.416572 kubelet[2200]: E1213 14:25:55.416565 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.416643 kubelet[2200]: W1213 14:25:55.416635 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.416693 kubelet[2200]: E1213 14:25:55.416685 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.416769 kubelet[2200]: I1213 14:25:55.416762 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/c89227ed-30a3-4f3d-ba16-397f58d31fe4-socket-dir\") pod \"csi-node-driver-xlj8g\" (UID: \"c89227ed-30a3-4f3d-ba16-397f58d31fe4\") " pod="calico-system/csi-node-driver-xlj8g" Dec 13 14:25:55.416983 kubelet[2200]: E1213 14:25:55.416964 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.417034 kubelet[2200]: W1213 14:25:55.417026 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.417087 kubelet[2200]: E1213 14:25:55.417079 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.417260 kubelet[2200]: E1213 14:25:55.417254 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.417319 kubelet[2200]: W1213 14:25:55.417311 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.417370 kubelet[2200]: E1213 14:25:55.417363 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.417464 kubelet[2200]: I1213 14:25:55.417457 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w64d6\" (UniqueName: \"kubernetes.io/projected/c89227ed-30a3-4f3d-ba16-397f58d31fe4-kube-api-access-w64d6\") pod \"csi-node-driver-xlj8g\" (UID: \"c89227ed-30a3-4f3d-ba16-397f58d31fe4\") " pod="calico-system/csi-node-driver-xlj8g" Dec 13 14:25:55.417535 kubelet[2200]: E1213 14:25:55.417522 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.417596 kubelet[2200]: W1213 14:25:55.417587 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.418488 kubelet[2200]: E1213 14:25:55.417624 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.418488 kubelet[2200]: E1213 14:25:55.417735 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.418488 kubelet[2200]: W1213 14:25:55.417742 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.418488 kubelet[2200]: E1213 14:25:55.417750 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.418488 kubelet[2200]: I1213 14:25:55.417762 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/c89227ed-30a3-4f3d-ba16-397f58d31fe4-kubelet-dir\") pod \"csi-node-driver-xlj8g\" (UID: \"c89227ed-30a3-4f3d-ba16-397f58d31fe4\") " pod="calico-system/csi-node-driver-xlj8g" Dec 13 14:25:55.418488 kubelet[2200]: E1213 14:25:55.417880 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.418488 kubelet[2200]: W1213 14:25:55.417885 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.418488 kubelet[2200]: E1213 14:25:55.417893 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.418488 kubelet[2200]: E1213 14:25:55.417995 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.418812 kubelet[2200]: W1213 14:25:55.418000 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.418812 kubelet[2200]: E1213 14:25:55.418006 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.418812 kubelet[2200]: E1213 14:25:55.418107 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.418812 kubelet[2200]: W1213 14:25:55.418112 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.418812 kubelet[2200]: E1213 14:25:55.418118 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.418812 kubelet[2200]: E1213 14:25:55.418205 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.418812 kubelet[2200]: W1213 14:25:55.418209 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.418812 kubelet[2200]: E1213 14:25:55.418215 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.428389 env[1266]: time="2024-12-13T14:25:55.428320034Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:25:55.428541 env[1266]: time="2024-12-13T14:25:55.428518611Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:25:55.428703 env[1266]: time="2024-12-13T14:25:55.428687209Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:25:55.431235 env[1266]: time="2024-12-13T14:25:55.428864913Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6818790c4381b5a9c8d820fc8909ad68d08b74d0420f56442251c27174d0bacb pid=2609 runtime=io.containerd.runc.v2 Dec 13 14:25:55.443309 systemd[1]: Started cri-containerd-6818790c4381b5a9c8d820fc8909ad68d08b74d0420f56442251c27174d0bacb.scope. Dec 13 14:25:55.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.455000 audit: BPF prog-id=121 op=LOAD Dec 13 14:25:55.456000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.456000 audit[2619]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2609 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:55.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638313837393063343338316235613963386438323066633839303961 Dec 13 14:25:55.456000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.456000 audit[2619]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2609 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:55.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638313837393063343338316235613963386438323066633839303961 Dec 13 14:25:55.456000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.456000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.456000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.456000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.456000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.456000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.456000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.456000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.456000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.456000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.456000 audit: BPF prog-id=122 op=LOAD Dec 13 14:25:55.456000 audit[2619]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002188d0 items=0 ppid=2609 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:55.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638313837393063343338316235613963386438323066633839303961 Dec 13 14:25:55.456000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.456000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.456000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.456000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.456000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.456000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.456000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.456000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.456000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.456000 audit: BPF prog-id=123 op=LOAD Dec 13 14:25:55.456000 audit[2619]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000218918 items=0 ppid=2609 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:55.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638313837393063343338316235613963386438323066633839303961 Dec 13 14:25:55.456000 audit: BPF prog-id=123 op=UNLOAD Dec 13 14:25:55.456000 audit: BPF prog-id=122 op=UNLOAD Dec 13 14:25:55.456000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.456000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.456000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.456000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.456000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.456000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.456000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.456000 audit[2619]: AVC avc: denied { perfmon } for pid=2619 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.456000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.456000 audit[2619]: AVC avc: denied { bpf } for pid=2619 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:55.456000 audit: BPF prog-id=124 op=LOAD Dec 13 14:25:55.456000 audit[2619]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000218d28 items=0 ppid=2609 pid=2619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:55.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638313837393063343338316235613963386438323066633839303961 Dec 13 14:25:55.475088 env[1266]: time="2024-12-13T14:25:55.475051654Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-gz2sk,Uid:cf2d168e-3047-4c3a-a21d-1ba1c5c304b3,Namespace:calico-system,Attempt:0,} returns sandbox id \"6818790c4381b5a9c8d820fc8909ad68d08b74d0420f56442251c27174d0bacb\"" Dec 13 14:25:55.477513 env[1266]: time="2024-12-13T14:25:55.477476502Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:25:55.518292 kubelet[2200]: E1213 14:25:55.518198 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.518292 kubelet[2200]: W1213 14:25:55.518214 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.518292 kubelet[2200]: E1213 14:25:55.518228 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.518630 kubelet[2200]: E1213 14:25:55.518496 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.518630 kubelet[2200]: W1213 14:25:55.518505 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.518630 kubelet[2200]: E1213 14:25:55.518516 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.518865 kubelet[2200]: E1213 14:25:55.518755 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.518865 kubelet[2200]: W1213 14:25:55.518761 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.518865 kubelet[2200]: E1213 14:25:55.518769 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.519073 kubelet[2200]: E1213 14:25:55.518985 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.519073 kubelet[2200]: W1213 14:25:55.518994 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.519073 kubelet[2200]: E1213 14:25:55.519004 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.519273 kubelet[2200]: E1213 14:25:55.519186 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.519273 kubelet[2200]: W1213 14:25:55.519192 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.519273 kubelet[2200]: E1213 14:25:55.519199 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.519487 kubelet[2200]: E1213 14:25:55.519391 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.519487 kubelet[2200]: W1213 14:25:55.519398 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.519487 kubelet[2200]: E1213 14:25:55.519405 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.519743 kubelet[2200]: E1213 14:25:55.519668 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.519743 kubelet[2200]: W1213 14:25:55.519675 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.519743 kubelet[2200]: E1213 14:25:55.519688 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.519931 kubelet[2200]: E1213 14:25:55.519866 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.519931 kubelet[2200]: W1213 14:25:55.519871 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.519931 kubelet[2200]: E1213 14:25:55.519879 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.520148 kubelet[2200]: E1213 14:25:55.520066 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.520148 kubelet[2200]: W1213 14:25:55.520072 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.520148 kubelet[2200]: E1213 14:25:55.520080 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.520391 kubelet[2200]: E1213 14:25:55.520288 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.520391 kubelet[2200]: W1213 14:25:55.520294 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.520391 kubelet[2200]: E1213 14:25:55.520354 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.520539 kubelet[2200]: E1213 14:25:55.520490 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.520539 kubelet[2200]: W1213 14:25:55.520495 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.521212 kubelet[2200]: E1213 14:25:55.520633 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.521212 kubelet[2200]: E1213 14:25:55.520669 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.521212 kubelet[2200]: W1213 14:25:55.520673 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.521212 kubelet[2200]: E1213 14:25:55.520731 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.521212 kubelet[2200]: E1213 14:25:55.520770 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.521212 kubelet[2200]: W1213 14:25:55.520775 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.521212 kubelet[2200]: E1213 14:25:55.520807 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.521212 kubelet[2200]: E1213 14:25:55.520909 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.521212 kubelet[2200]: W1213 14:25:55.520913 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.521212 kubelet[2200]: E1213 14:25:55.520976 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.521466 kubelet[2200]: E1213 14:25:55.521040 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.521466 kubelet[2200]: W1213 14:25:55.521046 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.521466 kubelet[2200]: E1213 14:25:55.521058 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.521722 kubelet[2200]: E1213 14:25:55.521611 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.521722 kubelet[2200]: W1213 14:25:55.521621 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.521722 kubelet[2200]: E1213 14:25:55.521633 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.522244 kubelet[2200]: E1213 14:25:55.521868 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.522244 kubelet[2200]: W1213 14:25:55.521874 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.522244 kubelet[2200]: E1213 14:25:55.521889 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.522244 kubelet[2200]: E1213 14:25:55.522036 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.522244 kubelet[2200]: W1213 14:25:55.522042 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.522244 kubelet[2200]: E1213 14:25:55.522052 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.522244 kubelet[2200]: E1213 14:25:55.522154 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.522244 kubelet[2200]: W1213 14:25:55.522158 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.522244 kubelet[2200]: E1213 14:25:55.522165 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.522591 kubelet[2200]: E1213 14:25:55.522503 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.522591 kubelet[2200]: W1213 14:25:55.522509 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.522591 kubelet[2200]: E1213 14:25:55.522517 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.522782 kubelet[2200]: E1213 14:25:55.522709 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.522782 kubelet[2200]: W1213 14:25:55.522715 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.522782 kubelet[2200]: E1213 14:25:55.522722 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.522905 kubelet[2200]: E1213 14:25:55.522897 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.522963 kubelet[2200]: W1213 14:25:55.522956 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.523024 kubelet[2200]: E1213 14:25:55.523016 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.523198 kubelet[2200]: E1213 14:25:55.523189 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.523269 kubelet[2200]: W1213 14:25:55.523253 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.523336 kubelet[2200]: E1213 14:25:55.523328 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.523499 kubelet[2200]: E1213 14:25:55.523492 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.523638 kubelet[2200]: W1213 14:25:55.523630 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.523685 kubelet[2200]: E1213 14:25:55.523678 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.523863 kubelet[2200]: E1213 14:25:55.523855 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.523930 kubelet[2200]: W1213 14:25:55.523920 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.523988 kubelet[2200]: E1213 14:25:55.523979 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.528852 kubelet[2200]: E1213 14:25:55.528819 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.529012 kubelet[2200]: W1213 14:25:55.528999 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.529110 kubelet[2200]: E1213 14:25:55.529101 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.530413 kubelet[2200]: E1213 14:25:55.530403 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.530482 kubelet[2200]: W1213 14:25:55.530473 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.530537 kubelet[2200]: E1213 14:25:55.530530 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.620314 kubelet[2200]: E1213 14:25:55.620294 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.620460 kubelet[2200]: W1213 14:25:55.620447 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.620532 kubelet[2200]: E1213 14:25:55.620522 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.721137 kubelet[2200]: E1213 14:25:55.721120 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.721253 kubelet[2200]: W1213 14:25:55.721243 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.721311 kubelet[2200]: E1213 14:25:55.721303 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.771000 audit[2673]: NETFILTER_CFG table=filter:93 family=2 entries=18 op=nft_register_rule pid=2673 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:55.771000 audit[2673]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffdc313bb30 a2=0 a3=7ffdc313bb1c items=0 ppid=2331 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:55.771000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:55.776000 audit[2673]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2673 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:25:55.776000 audit[2673]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdc313bb30 a2=0 a3=0 items=0 ppid=2331 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:55.776000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:25:55.821741 kubelet[2200]: E1213 14:25:55.821716 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.821741 kubelet[2200]: W1213 14:25:55.821728 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.821741 kubelet[2200]: E1213 14:25:55.821740 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:55.923035 kubelet[2200]: E1213 14:25:55.923013 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:55.923035 kubelet[2200]: W1213 14:25:55.923028 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:55.923035 kubelet[2200]: E1213 14:25:55.923041 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:56.023985 kubelet[2200]: E1213 14:25:56.023917 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:56.023985 kubelet[2200]: W1213 14:25:56.023932 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:56.023985 kubelet[2200]: E1213 14:25:56.023945 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:56.125020 kubelet[2200]: E1213 14:25:56.124996 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:56.125020 kubelet[2200]: W1213 14:25:56.125016 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:56.125142 kubelet[2200]: E1213 14:25:56.125036 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:56.213230 kubelet[2200]: E1213 14:25:56.213199 2200 secret.go:194] Couldn't get secret calico-system/typha-certs: failed to sync secret cache: timed out waiting for the condition Dec 13 14:25:56.213363 kubelet[2200]: E1213 14:25:56.213279 2200 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/fa7cb15c-5b71-4524-b21b-8e43e526f8a7-typha-certs podName:fa7cb15c-5b71-4524-b21b-8e43e526f8a7 nodeName:}" failed. No retries permitted until 2024-12-13 14:25:56.713256728 +0000 UTC m=+20.705596795 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "typha-certs" (UniqueName: "kubernetes.io/secret/fa7cb15c-5b71-4524-b21b-8e43e526f8a7-typha-certs") pod "calico-typha-6b86f6f76-dmn7s" (UID: "fa7cb15c-5b71-4524-b21b-8e43e526f8a7") : failed to sync secret cache: timed out waiting for the condition Dec 13 14:25:56.225994 kubelet[2200]: E1213 14:25:56.225972 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:56.225994 kubelet[2200]: W1213 14:25:56.225986 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:56.226109 kubelet[2200]: E1213 14:25:56.226001 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:56.327022 kubelet[2200]: E1213 14:25:56.326965 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:56.327198 kubelet[2200]: W1213 14:25:56.327174 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:56.327346 kubelet[2200]: E1213 14:25:56.327336 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:56.428494 kubelet[2200]: E1213 14:25:56.428476 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:56.428628 kubelet[2200]: W1213 14:25:56.428618 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:56.428683 kubelet[2200]: E1213 14:25:56.428675 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:56.529693 kubelet[2200]: E1213 14:25:56.529674 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:56.529813 kubelet[2200]: W1213 14:25:56.529802 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:56.529896 kubelet[2200]: E1213 14:25:56.529887 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:56.630405 kubelet[2200]: E1213 14:25:56.630344 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:56.630608 kubelet[2200]: W1213 14:25:56.630595 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:56.630677 kubelet[2200]: E1213 14:25:56.630668 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:56.731821 kubelet[2200]: E1213 14:25:56.731804 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:56.731944 kubelet[2200]: W1213 14:25:56.731930 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:56.731998 kubelet[2200]: E1213 14:25:56.731990 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:56.732210 kubelet[2200]: E1213 14:25:56.732203 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:56.732261 kubelet[2200]: W1213 14:25:56.732252 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:56.732309 kubelet[2200]: E1213 14:25:56.732301 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:56.732454 kubelet[2200]: E1213 14:25:56.732448 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:56.732498 kubelet[2200]: W1213 14:25:56.732490 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:56.732562 kubelet[2200]: E1213 14:25:56.732540 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:56.732705 kubelet[2200]: E1213 14:25:56.732698 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:56.732755 kubelet[2200]: W1213 14:25:56.732745 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:56.732801 kubelet[2200]: E1213 14:25:56.732795 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:56.732950 kubelet[2200]: E1213 14:25:56.732943 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:56.732997 kubelet[2200]: W1213 14:25:56.732989 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:56.733053 kubelet[2200]: E1213 14:25:56.733046 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:56.737995 kubelet[2200]: E1213 14:25:56.737986 2200 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:25:56.738050 kubelet[2200]: W1213 14:25:56.738041 2200 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:25:56.738105 kubelet[2200]: E1213 14:25:56.738098 2200 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:25:56.802002 env[1266]: time="2024-12-13T14:25:56.801962557Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6b86f6f76-dmn7s,Uid:fa7cb15c-5b71-4524-b21b-8e43e526f8a7,Namespace:calico-system,Attempt:0,}" Dec 13 14:25:56.824369 env[1266]: time="2024-12-13T14:25:56.824324895Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:25:56.824469 env[1266]: time="2024-12-13T14:25:56.824351363Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:25:56.824469 env[1266]: time="2024-12-13T14:25:56.824358947Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:25:56.824469 env[1266]: time="2024-12-13T14:25:56.824450417Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/18941cf785cc0cf81592b8ecfd0aa6222003e504027bbbf98e536f454109aa65 pid=2696 runtime=io.containerd.runc.v2 Dec 13 14:25:56.852714 systemd[1]: Started cri-containerd-18941cf785cc0cf81592b8ecfd0aa6222003e504027bbbf98e536f454109aa65.scope. Dec 13 14:25:56.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.933000 audit: BPF prog-id=125 op=LOAD Dec 13 14:25:56.934000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.934000 audit[2704]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2696 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:56.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138393431636637383563633063663831353932623865636664306161 Dec 13 14:25:56.934000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.934000 audit[2704]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2696 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:56.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138393431636637383563633063663831353932623865636664306161 Dec 13 14:25:56.934000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.934000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.934000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.934000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.934000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.934000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.934000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.934000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.934000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.934000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.934000 audit: BPF prog-id=126 op=LOAD Dec 13 14:25:56.934000 audit[2704]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001e5de0 items=0 ppid=2696 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:56.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138393431636637383563633063663831353932623865636664306161 Dec 13 14:25:56.934000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.934000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.934000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.934000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.934000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.934000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.934000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.934000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.934000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.934000 audit: BPF prog-id=127 op=LOAD Dec 13 14:25:56.934000 audit[2704]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001e5e28 items=0 ppid=2696 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:56.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138393431636637383563633063663831353932623865636664306161 Dec 13 14:25:56.934000 audit: BPF prog-id=127 op=UNLOAD Dec 13 14:25:56.934000 audit: BPF prog-id=126 op=UNLOAD Dec 13 14:25:56.934000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.934000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.934000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.934000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.934000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.934000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.934000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.934000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.934000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.934000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:56.934000 audit: BPF prog-id=128 op=LOAD Dec 13 14:25:56.934000 audit[2704]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00034a238 items=0 ppid=2696 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:56.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138393431636637383563633063663831353932623865636664306161 Dec 13 14:25:56.957639 env[1266]: time="2024-12-13T14:25:56.957534446Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6b86f6f76-dmn7s,Uid:fa7cb15c-5b71-4524-b21b-8e43e526f8a7,Namespace:calico-system,Attempt:0,} returns sandbox id \"18941cf785cc0cf81592b8ecfd0aa6222003e504027bbbf98e536f454109aa65\"" Dec 13 14:25:57.122262 env[1266]: time="2024-12-13T14:25:57.122228445Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:57.122902 env[1266]: time="2024-12-13T14:25:57.122885227Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:57.123691 env[1266]: time="2024-12-13T14:25:57.123676026Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:57.124419 env[1266]: time="2024-12-13T14:25:57.124404144Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:57.124785 env[1266]: time="2024-12-13T14:25:57.124767924Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 14:25:57.125372 env[1266]: time="2024-12-13T14:25:57.125221800Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 14:25:57.126625 env[1266]: time="2024-12-13T14:25:57.126603363Z" level=info msg="CreateContainer within sandbox \"6818790c4381b5a9c8d820fc8909ad68d08b74d0420f56442251c27174d0bacb\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:25:57.149274 env[1266]: time="2024-12-13T14:25:57.149249785Z" level=info msg="CreateContainer within sandbox \"6818790c4381b5a9c8d820fc8909ad68d08b74d0420f56442251c27174d0bacb\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"d06b25398615b6baeca0337cd9d0bc7e4edc1ad13451649779d56a60111b3931\"" Dec 13 14:25:57.149854 env[1266]: time="2024-12-13T14:25:57.149837781Z" level=info msg="StartContainer for \"d06b25398615b6baeca0337cd9d0bc7e4edc1ad13451649779d56a60111b3931\"" Dec 13 14:25:57.160744 systemd[1]: Started cri-containerd-d06b25398615b6baeca0337cd9d0bc7e4edc1ad13451649779d56a60111b3931.scope. Dec 13 14:25:57.172979 kubelet[2200]: E1213 14:25:57.172960 2200 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xlj8g" podUID="c89227ed-30a3-4f3d-ba16-397f58d31fe4" Dec 13 14:25:57.172000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:57.172000 audit[2736]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f3ab82e8a18 items=0 ppid=2609 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:57.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430366232353339383631356236626165636130333337636439643062 Dec 13 14:25:57.173000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:57.173000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:57.173000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:57.173000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:57.173000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:57.173000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:57.173000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:57.173000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:57.173000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:57.173000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:57.173000 audit: BPF prog-id=129 op=LOAD Dec 13 14:25:57.173000 audit[2736]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000d9ba8 items=0 ppid=2609 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:57.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430366232353339383631356236626165636130333337636439643062 Dec 13 14:25:57.173000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:57.173000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:57.173000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:57.173000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:57.173000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:57.173000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:57.173000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:57.173000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:57.173000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:57.173000 audit: BPF prog-id=130 op=LOAD Dec 13 14:25:57.173000 audit[2736]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000d9bf8 items=0 ppid=2609 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:57.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430366232353339383631356236626165636130333337636439643062 Dec 13 14:25:57.173000 audit: BPF prog-id=130 op=UNLOAD Dec 13 14:25:57.173000 audit: BPF prog-id=129 op=UNLOAD Dec 13 14:25:57.174000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:57.174000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:57.174000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:57.174000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:57.174000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:57.174000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:57.174000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:57.174000 audit[2736]: AVC avc: denied { perfmon } for pid=2736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:57.174000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:57.174000 audit[2736]: AVC avc: denied { bpf } for pid=2736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:57.174000 audit: BPF prog-id=131 op=LOAD Dec 13 14:25:57.174000 audit[2736]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000d9c88 items=0 ppid=2609 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:57.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430366232353339383631356236626165636130333337636439643062 Dec 13 14:25:57.185606 env[1266]: time="2024-12-13T14:25:57.185551890Z" level=info msg="StartContainer for \"d06b25398615b6baeca0337cd9d0bc7e4edc1ad13451649779d56a60111b3931\" returns successfully" Dec 13 14:25:57.193763 systemd[1]: cri-containerd-d06b25398615b6baeca0337cd9d0bc7e4edc1ad13451649779d56a60111b3931.scope: Deactivated successfully. Dec 13 14:25:57.196000 audit: BPF prog-id=131 op=UNLOAD Dec 13 14:25:57.290060 env[1266]: time="2024-12-13T14:25:57.290017578Z" level=info msg="shim disconnected" id=d06b25398615b6baeca0337cd9d0bc7e4edc1ad13451649779d56a60111b3931 Dec 13 14:25:57.290060 env[1266]: time="2024-12-13T14:25:57.290055845Z" level=warning msg="cleaning up after shim disconnected" id=d06b25398615b6baeca0337cd9d0bc7e4edc1ad13451649779d56a60111b3931 namespace=k8s.io Dec 13 14:25:57.290060 env[1266]: time="2024-12-13T14:25:57.290066935Z" level=info msg="cleaning up dead shim" Dec 13 14:25:57.297574 env[1266]: time="2024-12-13T14:25:57.297534829Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:25:57Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2775 runtime=io.containerd.runc.v2\n" Dec 13 14:25:59.172797 kubelet[2200]: E1213 14:25:59.172775 2200 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xlj8g" podUID="c89227ed-30a3-4f3d-ba16-397f58d31fe4" Dec 13 14:25:59.525909 env[1266]: time="2024-12-13T14:25:59.525869779Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:59.565169 env[1266]: time="2024-12-13T14:25:59.565136421Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:59.588753 env[1266]: time="2024-12-13T14:25:59.588721936Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:59.601931 env[1266]: time="2024-12-13T14:25:59.601894315Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:25:59.602471 env[1266]: time="2024-12-13T14:25:59.602445097Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 14:25:59.604567 env[1266]: time="2024-12-13T14:25:59.603780825Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:25:59.613863 env[1266]: time="2024-12-13T14:25:59.613839514Z" level=info msg="CreateContainer within sandbox \"18941cf785cc0cf81592b8ecfd0aa6222003e504027bbbf98e536f454109aa65\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 14:25:59.915956 env[1266]: time="2024-12-13T14:25:59.915883448Z" level=info msg="CreateContainer within sandbox \"18941cf785cc0cf81592b8ecfd0aa6222003e504027bbbf98e536f454109aa65\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"6aab9bb5b190d458fbab3f4156ff70a501aef78f059244e1482874d100fe6186\"" Dec 13 14:25:59.916598 env[1266]: time="2024-12-13T14:25:59.916560402Z" level=info msg="StartContainer for \"6aab9bb5b190d458fbab3f4156ff70a501aef78f059244e1482874d100fe6186\"" Dec 13 14:25:59.928849 systemd[1]: Started cri-containerd-6aab9bb5b190d458fbab3f4156ff70a501aef78f059244e1482874d100fe6186.scope. Dec 13 14:25:59.947390 kernel: kauditd_printk_skb: 166 callbacks suppressed Dec 13 14:25:59.947534 kernel: audit: type=1400 audit(1734099959.940:990): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.947576 kernel: audit: type=1400 audit(1734099959.940:991): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.953295 kernel: audit: type=1400 audit(1734099959.944:992): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.953348 kernel: audit: type=1400 audit(1734099959.944:993): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.958560 kernel: audit: type=1400 audit(1734099959.944:994): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.964335 kernel: audit: type=1400 audit(1734099959.944:995): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.974453 kernel: audit: type=1400 audit(1734099959.944:996): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.974496 kernel: audit: type=1400 audit(1734099959.944:997): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.974513 kernel: audit: type=1400 audit(1734099959.944:998): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.974531 kernel: audit: type=1400 audit(1734099959.946:999): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.946000 audit: BPF prog-id=132 op=LOAD Dec 13 14:25:59.946000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.946000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2696 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:59.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661616239626235623139306434353866626162336634313536666637 Dec 13 14:25:59.946000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.946000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2696 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:59.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661616239626235623139306434353866626162336634313536666637 Dec 13 14:25:59.946000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.946000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.946000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.946000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.946000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.946000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.946000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.946000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.946000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.946000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.946000 audit: BPF prog-id=133 op=LOAD Dec 13 14:25:59.946000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002fbdc0 items=0 ppid=2696 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:59.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661616239626235623139306434353866626162336634313536666637 Dec 13 14:25:59.946000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.946000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.946000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.946000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.946000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.946000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.946000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.946000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.946000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.946000 audit: BPF prog-id=134 op=LOAD Dec 13 14:25:59.946000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002fbe08 items=0 ppid=2696 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:59.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661616239626235623139306434353866626162336634313536666637 Dec 13 14:25:59.946000 audit: BPF prog-id=134 op=UNLOAD Dec 13 14:25:59.946000 audit: BPF prog-id=133 op=UNLOAD Dec 13 14:25:59.946000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.946000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.946000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.946000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.946000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.946000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.946000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.946000 audit[2800]: AVC avc: denied { perfmon } for pid=2800 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.946000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.946000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:25:59.946000 audit: BPF prog-id=135 op=LOAD Dec 13 14:25:59.946000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e6218 items=0 ppid=2696 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:25:59.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661616239626235623139306434353866626162336634313536666637 Dec 13 14:25:59.995102 env[1266]: time="2024-12-13T14:25:59.995068542Z" level=info msg="StartContainer for \"6aab9bb5b190d458fbab3f4156ff70a501aef78f059244e1482874d100fe6186\" returns successfully" Dec 13 14:26:00.607684 systemd[1]: run-containerd-runc-k8s.io-6aab9bb5b190d458fbab3f4156ff70a501aef78f059244e1482874d100fe6186-runc.ewfQgf.mount: Deactivated successfully. Dec 13 14:26:01.172798 kubelet[2200]: E1213 14:26:01.172774 2200 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xlj8g" podUID="c89227ed-30a3-4f3d-ba16-397f58d31fe4" Dec 13 14:26:01.269049 kubelet[2200]: I1213 14:26:01.269012 2200 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:26:03.173592 kubelet[2200]: E1213 14:26:03.173571 2200 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xlj8g" podUID="c89227ed-30a3-4f3d-ba16-397f58d31fe4" Dec 13 14:26:03.416477 env[1266]: time="2024-12-13T14:26:03.416448794Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:03.417585 env[1266]: time="2024-12-13T14:26:03.417571449Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:03.418567 env[1266]: time="2024-12-13T14:26:03.418551146Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:03.419463 env[1266]: time="2024-12-13T14:26:03.419450333Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:03.419798 env[1266]: time="2024-12-13T14:26:03.419784095Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 14:26:03.426061 env[1266]: time="2024-12-13T14:26:03.425843470Z" level=info msg="CreateContainer within sandbox \"6818790c4381b5a9c8d820fc8909ad68d08b74d0420f56442251c27174d0bacb\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:26:03.495866 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1233039882.mount: Deactivated successfully. Dec 13 14:26:03.505365 env[1266]: time="2024-12-13T14:26:03.505338190Z" level=info msg="CreateContainer within sandbox \"6818790c4381b5a9c8d820fc8909ad68d08b74d0420f56442251c27174d0bacb\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"7fd8b5d352af9d0794c3f7bfcae8dfcfd7d725d94235dec0d8ba5c044f4d36ac\"" Dec 13 14:26:03.505815 env[1266]: time="2024-12-13T14:26:03.505803892Z" level=info msg="StartContainer for \"7fd8b5d352af9d0794c3f7bfcae8dfcfd7d725d94235dec0d8ba5c044f4d36ac\"" Dec 13 14:26:03.523699 systemd[1]: Started cri-containerd-7fd8b5d352af9d0794c3f7bfcae8dfcfd7d725d94235dec0d8ba5c044f4d36ac.scope. Dec 13 14:26:03.531000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:03.531000 audit[2838]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f224d60fa48 items=0 ppid=2609 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:03.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766643862356433353261663964303739346333663762666361653864 Dec 13 14:26:03.531000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:03.531000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:03.531000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:03.531000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:03.531000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:03.531000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:03.531000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:03.531000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:03.531000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:03.531000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:03.531000 audit: BPF prog-id=136 op=LOAD Dec 13 14:26:03.531000 audit[2838]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002f0b08 items=0 ppid=2609 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:03.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766643862356433353261663964303739346333663762666361653864 Dec 13 14:26:03.531000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:03.531000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:03.531000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:03.531000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:03.531000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:03.531000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:03.531000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:03.531000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:03.531000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:03.531000 audit: BPF prog-id=137 op=LOAD Dec 13 14:26:03.531000 audit[2838]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002f0b58 items=0 ppid=2609 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:03.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766643862356433353261663964303739346333663762666361653864 Dec 13 14:26:03.531000 audit: BPF prog-id=137 op=UNLOAD Dec 13 14:26:03.531000 audit: BPF prog-id=136 op=UNLOAD Dec 13 14:26:03.531000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:03.531000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:03.531000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:03.531000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:03.531000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:03.531000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:03.531000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:03.531000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:03.531000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:03.531000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:03.531000 audit: BPF prog-id=138 op=LOAD Dec 13 14:26:03.531000 audit[2838]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002f0be8 items=0 ppid=2609 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:03.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766643862356433353261663964303739346333663762666361653864 Dec 13 14:26:03.543625 env[1266]: time="2024-12-13T14:26:03.543601309Z" level=info msg="StartContainer for \"7fd8b5d352af9d0794c3f7bfcae8dfcfd7d725d94235dec0d8ba5c044f4d36ac\" returns successfully" Dec 13 14:26:04.312066 kubelet[2200]: I1213 14:26:04.312042 2200 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-6b86f6f76-dmn7s" podStartSLOduration=7.664458665 podStartE2EDuration="10.309229199s" podCreationTimestamp="2024-12-13 14:25:54 +0000 UTC" firstStartedPulling="2024-12-13 14:25:56.958339404 +0000 UTC m=+20.950679470" lastFinishedPulling="2024-12-13 14:25:59.603109932 +0000 UTC m=+23.595450004" observedRunningTime="2024-12-13 14:26:00.306005111 +0000 UTC m=+24.298345189" watchObservedRunningTime="2024-12-13 14:26:04.309229199 +0000 UTC m=+28.301569270" Dec 13 14:26:05.173396 kubelet[2200]: E1213 14:26:05.173373 2200 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xlj8g" podUID="c89227ed-30a3-4f3d-ba16-397f58d31fe4" Dec 13 14:26:05.324133 env[1266]: time="2024-12-13T14:26:05.324064989Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:26:05.326340 systemd[1]: cri-containerd-7fd8b5d352af9d0794c3f7bfcae8dfcfd7d725d94235dec0d8ba5c044f4d36ac.scope: Deactivated successfully. Dec 13 14:26:05.331517 kernel: kauditd_printk_skb: 90 callbacks suppressed Dec 13 14:26:05.331584 kernel: audit: type=1334 audit(1734099965.328:1014): prog-id=138 op=UNLOAD Dec 13 14:26:05.328000 audit: BPF prog-id=138 op=UNLOAD Dec 13 14:26:05.341907 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7fd8b5d352af9d0794c3f7bfcae8dfcfd7d725d94235dec0d8ba5c044f4d36ac-rootfs.mount: Deactivated successfully. Dec 13 14:26:05.461926 kubelet[2200]: I1213 14:26:05.461629 2200 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 14:26:05.513641 env[1266]: time="2024-12-13T14:26:05.513591572Z" level=info msg="shim disconnected" id=7fd8b5d352af9d0794c3f7bfcae8dfcfd7d725d94235dec0d8ba5c044f4d36ac Dec 13 14:26:05.513641 env[1266]: time="2024-12-13T14:26:05.513629657Z" level=warning msg="cleaning up after shim disconnected" id=7fd8b5d352af9d0794c3f7bfcae8dfcfd7d725d94235dec0d8ba5c044f4d36ac namespace=k8s.io Dec 13 14:26:05.513641 env[1266]: time="2024-12-13T14:26:05.513639102Z" level=info msg="cleaning up dead shim" Dec 13 14:26:05.523766 env[1266]: time="2024-12-13T14:26:05.523724412Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:26:05Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2878 runtime=io.containerd.runc.v2\n" Dec 13 14:26:05.558088 kubelet[2200]: I1213 14:26:05.558064 2200 topology_manager.go:215] "Topology Admit Handler" podUID="28c95b79-f6d0-4c1a-9283-a65395471a14" podNamespace="kube-system" podName="coredns-76f75df574-mdtnh" Dec 13 14:26:05.563328 kubelet[2200]: I1213 14:26:05.563309 2200 topology_manager.go:215] "Topology Admit Handler" podUID="8213859f-6e9b-422f-8e3b-bd8bf68e0801" podNamespace="calico-apiserver" podName="calico-apiserver-7f96648886-kg7v7" Dec 13 14:26:05.563419 kubelet[2200]: I1213 14:26:05.563391 2200 topology_manager.go:215] "Topology Admit Handler" podUID="d719f53b-80fd-46d3-90c7-f51fe9e36be1" podNamespace="calico-system" podName="calico-kube-controllers-d4bb8cc5-fkhpg" Dec 13 14:26:05.563490 kubelet[2200]: I1213 14:26:05.563450 2200 topology_manager.go:215] "Topology Admit Handler" podUID="da687174-0225-4e56-9019-2e2c03247268" podNamespace="kube-system" podName="coredns-76f75df574-cctsn" Dec 13 14:26:05.563519 kubelet[2200]: I1213 14:26:05.563509 2200 topology_manager.go:215] "Topology Admit Handler" podUID="08ed695d-459c-416f-9e4f-957f40c790c1" podNamespace="calico-apiserver" podName="calico-apiserver-7f96648886-5cszg" Dec 13 14:26:05.579995 systemd[1]: Created slice kubepods-burstable-podda687174_0225_4e56_9019_2e2c03247268.slice. Dec 13 14:26:05.587947 systemd[1]: Created slice kubepods-besteffort-pod8213859f_6e9b_422f_8e3b_bd8bf68e0801.slice. Dec 13 14:26:05.591877 systemd[1]: Created slice kubepods-burstable-pod28c95b79_f6d0_4c1a_9283_a65395471a14.slice. Dec 13 14:26:05.595026 systemd[1]: Created slice kubepods-besteffort-pod08ed695d_459c_416f_9e4f_957f40c790c1.slice. Dec 13 14:26:05.599623 systemd[1]: Created slice kubepods-besteffort-podd719f53b_80fd_46d3_90c7_f51fe9e36be1.slice. Dec 13 14:26:05.679195 kubelet[2200]: I1213 14:26:05.679155 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/da687174-0225-4e56-9019-2e2c03247268-config-volume\") pod \"coredns-76f75df574-cctsn\" (UID: \"da687174-0225-4e56-9019-2e2c03247268\") " pod="kube-system/coredns-76f75df574-cctsn" Dec 13 14:26:05.679195 kubelet[2200]: I1213 14:26:05.679198 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xmkgq\" (UniqueName: \"kubernetes.io/projected/d719f53b-80fd-46d3-90c7-f51fe9e36be1-kube-api-access-xmkgq\") pod \"calico-kube-controllers-d4bb8cc5-fkhpg\" (UID: \"d719f53b-80fd-46d3-90c7-f51fe9e36be1\") " pod="calico-system/calico-kube-controllers-d4bb8cc5-fkhpg" Dec 13 14:26:05.679345 kubelet[2200]: I1213 14:26:05.679234 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f9765\" (UniqueName: \"kubernetes.io/projected/28c95b79-f6d0-4c1a-9283-a65395471a14-kube-api-access-f9765\") pod \"coredns-76f75df574-mdtnh\" (UID: \"28c95b79-f6d0-4c1a-9283-a65395471a14\") " pod="kube-system/coredns-76f75df574-mdtnh" Dec 13 14:26:05.679345 kubelet[2200]: I1213 14:26:05.679256 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/08ed695d-459c-416f-9e4f-957f40c790c1-calico-apiserver-certs\") pod \"calico-apiserver-7f96648886-5cszg\" (UID: \"08ed695d-459c-416f-9e4f-957f40c790c1\") " pod="calico-apiserver/calico-apiserver-7f96648886-5cszg" Dec 13 14:26:05.679345 kubelet[2200]: I1213 14:26:05.679276 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/8213859f-6e9b-422f-8e3b-bd8bf68e0801-calico-apiserver-certs\") pod \"calico-apiserver-7f96648886-kg7v7\" (UID: \"8213859f-6e9b-422f-8e3b-bd8bf68e0801\") " pod="calico-apiserver/calico-apiserver-7f96648886-kg7v7" Dec 13 14:26:05.679345 kubelet[2200]: I1213 14:26:05.679309 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d719f53b-80fd-46d3-90c7-f51fe9e36be1-tigera-ca-bundle\") pod \"calico-kube-controllers-d4bb8cc5-fkhpg\" (UID: \"d719f53b-80fd-46d3-90c7-f51fe9e36be1\") " pod="calico-system/calico-kube-controllers-d4bb8cc5-fkhpg" Dec 13 14:26:05.679345 kubelet[2200]: I1213 14:26:05.679327 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dz7xm\" (UniqueName: \"kubernetes.io/projected/da687174-0225-4e56-9019-2e2c03247268-kube-api-access-dz7xm\") pod \"coredns-76f75df574-cctsn\" (UID: \"da687174-0225-4e56-9019-2e2c03247268\") " pod="kube-system/coredns-76f75df574-cctsn" Dec 13 14:26:05.679484 kubelet[2200]: I1213 14:26:05.679342 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bx4d7\" (UniqueName: \"kubernetes.io/projected/08ed695d-459c-416f-9e4f-957f40c790c1-kube-api-access-bx4d7\") pod \"calico-apiserver-7f96648886-5cszg\" (UID: \"08ed695d-459c-416f-9e4f-957f40c790c1\") " pod="calico-apiserver/calico-apiserver-7f96648886-5cszg" Dec 13 14:26:05.679484 kubelet[2200]: I1213 14:26:05.679359 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rjgvs\" (UniqueName: \"kubernetes.io/projected/8213859f-6e9b-422f-8e3b-bd8bf68e0801-kube-api-access-rjgvs\") pod \"calico-apiserver-7f96648886-kg7v7\" (UID: \"8213859f-6e9b-422f-8e3b-bd8bf68e0801\") " pod="calico-apiserver/calico-apiserver-7f96648886-kg7v7" Dec 13 14:26:05.679484 kubelet[2200]: I1213 14:26:05.679393 2200 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/28c95b79-f6d0-4c1a-9283-a65395471a14-config-volume\") pod \"coredns-76f75df574-mdtnh\" (UID: \"28c95b79-f6d0-4c1a-9283-a65395471a14\") " pod="kube-system/coredns-76f75df574-mdtnh" Dec 13 14:26:05.887466 env[1266]: time="2024-12-13T14:26:05.887431219Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-cctsn,Uid:da687174-0225-4e56-9019-2e2c03247268,Namespace:kube-system,Attempt:0,}" Dec 13 14:26:05.891579 env[1266]: time="2024-12-13T14:26:05.891299656Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7f96648886-kg7v7,Uid:8213859f-6e9b-422f-8e3b-bd8bf68e0801,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:26:05.896742 env[1266]: time="2024-12-13T14:26:05.896703248Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-mdtnh,Uid:28c95b79-f6d0-4c1a-9283-a65395471a14,Namespace:kube-system,Attempt:0,}" Dec 13 14:26:05.896922 env[1266]: time="2024-12-13T14:26:05.896902024Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7f96648886-5cszg,Uid:08ed695d-459c-416f-9e4f-957f40c790c1,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:26:05.901709 env[1266]: time="2024-12-13T14:26:05.901687456Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-d4bb8cc5-fkhpg,Uid:d719f53b-80fd-46d3-90c7-f51fe9e36be1,Namespace:calico-system,Attempt:0,}" Dec 13 14:26:06.125795 env[1266]: time="2024-12-13T14:26:06.125730181Z" level=error msg="Failed to destroy network for sandbox \"45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:26:06.126015 env[1266]: time="2024-12-13T14:26:06.125995816Z" level=error msg="encountered an error cleaning up failed sandbox \"45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:26:06.126057 env[1266]: time="2024-12-13T14:26:06.126026828Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-d4bb8cc5-fkhpg,Uid:d719f53b-80fd-46d3-90c7-f51fe9e36be1,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:26:06.126569 env[1266]: time="2024-12-13T14:26:06.126537484Z" level=error msg="Failed to destroy network for sandbox \"efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:26:06.127178 env[1266]: time="2024-12-13T14:26:06.126741569Z" level=error msg="encountered an error cleaning up failed sandbox \"efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:26:06.127178 env[1266]: time="2024-12-13T14:26:06.126817077Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7f96648886-5cszg,Uid:08ed695d-459c-416f-9e4f-957f40c790c1,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:26:06.128282 env[1266]: time="2024-12-13T14:26:06.128263514Z" level=error msg="Failed to destroy network for sandbox \"3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:26:06.129109 env[1266]: time="2024-12-13T14:26:06.128511883Z" level=error msg="encountered an error cleaning up failed sandbox \"3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:26:06.129196 env[1266]: time="2024-12-13T14:26:06.129165967Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-mdtnh,Uid:28c95b79-f6d0-4c1a-9283-a65395471a14,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:26:06.132330 kubelet[2200]: E1213 14:26:06.132076 2200 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:26:06.132330 kubelet[2200]: E1213 14:26:06.132139 2200 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7f96648886-5cszg" Dec 13 14:26:06.132330 kubelet[2200]: E1213 14:26:06.132142 2200 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:26:06.132330 kubelet[2200]: E1213 14:26:06.132154 2200 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7f96648886-5cszg" Dec 13 14:26:06.132444 kubelet[2200]: E1213 14:26:06.132162 2200 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-mdtnh" Dec 13 14:26:06.132444 kubelet[2200]: E1213 14:26:06.132173 2200 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-mdtnh" Dec 13 14:26:06.132444 kubelet[2200]: E1213 14:26:06.132188 2200 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7f96648886-5cszg_calico-apiserver(08ed695d-459c-416f-9e4f-957f40c790c1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7f96648886-5cszg_calico-apiserver(08ed695d-459c-416f-9e4f-957f40c790c1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7f96648886-5cszg" podUID="08ed695d-459c-416f-9e4f-957f40c790c1" Dec 13 14:26:06.132533 kubelet[2200]: E1213 14:26:06.132205 2200 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-mdtnh_kube-system(28c95b79-f6d0-4c1a-9283-a65395471a14)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-mdtnh_kube-system(28c95b79-f6d0-4c1a-9283-a65395471a14)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-mdtnh" podUID="28c95b79-f6d0-4c1a-9283-a65395471a14" Dec 13 14:26:06.132533 kubelet[2200]: E1213 14:26:06.132075 2200 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:26:06.132533 kubelet[2200]: E1213 14:26:06.132224 2200 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-d4bb8cc5-fkhpg" Dec 13 14:26:06.132629 kubelet[2200]: E1213 14:26:06.132234 2200 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-d4bb8cc5-fkhpg" Dec 13 14:26:06.132629 kubelet[2200]: E1213 14:26:06.132314 2200 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-d4bb8cc5-fkhpg_calico-system(d719f53b-80fd-46d3-90c7-f51fe9e36be1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-d4bb8cc5-fkhpg_calico-system(d719f53b-80fd-46d3-90c7-f51fe9e36be1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-d4bb8cc5-fkhpg" podUID="d719f53b-80fd-46d3-90c7-f51fe9e36be1" Dec 13 14:26:06.139648 env[1266]: time="2024-12-13T14:26:06.139018281Z" level=error msg="Failed to destroy network for sandbox \"bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:26:06.139648 env[1266]: time="2024-12-13T14:26:06.139318481Z" level=error msg="encountered an error cleaning up failed sandbox \"bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:26:06.139648 env[1266]: time="2024-12-13T14:26:06.139347262Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7f96648886-kg7v7,Uid:8213859f-6e9b-422f-8e3b-bd8bf68e0801,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:26:06.140008 kubelet[2200]: E1213 14:26:06.139982 2200 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:26:06.140054 kubelet[2200]: E1213 14:26:06.140013 2200 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7f96648886-kg7v7" Dec 13 14:26:06.140054 kubelet[2200]: E1213 14:26:06.140026 2200 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7f96648886-kg7v7" Dec 13 14:26:06.140110 kubelet[2200]: E1213 14:26:06.140058 2200 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7f96648886-kg7v7_calico-apiserver(8213859f-6e9b-422f-8e3b-bd8bf68e0801)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7f96648886-kg7v7_calico-apiserver(8213859f-6e9b-422f-8e3b-bd8bf68e0801)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7f96648886-kg7v7" podUID="8213859f-6e9b-422f-8e3b-bd8bf68e0801" Dec 13 14:26:06.144374 env[1266]: time="2024-12-13T14:26:06.144348972Z" level=error msg="Failed to destroy network for sandbox \"f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:26:06.144667 env[1266]: time="2024-12-13T14:26:06.144648905Z" level=error msg="encountered an error cleaning up failed sandbox \"f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:26:06.144745 env[1266]: time="2024-12-13T14:26:06.144728100Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-cctsn,Uid:da687174-0225-4e56-9019-2e2c03247268,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:26:06.145682 kubelet[2200]: E1213 14:26:06.144905 2200 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:26:06.145682 kubelet[2200]: E1213 14:26:06.144940 2200 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-cctsn" Dec 13 14:26:06.145682 kubelet[2200]: E1213 14:26:06.144953 2200 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-cctsn" Dec 13 14:26:06.145833 kubelet[2200]: E1213 14:26:06.144980 2200 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-cctsn_kube-system(da687174-0225-4e56-9019-2e2c03247268)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-cctsn_kube-system(da687174-0225-4e56-9019-2e2c03247268)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-cctsn" podUID="da687174-0225-4e56-9019-2e2c03247268" Dec 13 14:26:06.275505 kubelet[2200]: I1213 14:26:06.275488 2200 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" Dec 13 14:26:06.286821 kubelet[2200]: I1213 14:26:06.286798 2200 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" Dec 13 14:26:06.300958 env[1266]: time="2024-12-13T14:26:06.298954732Z" level=info msg="StopPodSandbox for \"efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7\"" Dec 13 14:26:06.300958 env[1266]: time="2024-12-13T14:26:06.299024153Z" level=info msg="StopPodSandbox for \"3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559\"" Dec 13 14:26:06.300958 env[1266]: time="2024-12-13T14:26:06.299982303Z" level=info msg="StopPodSandbox for \"bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496\"" Dec 13 14:26:06.301209 kubelet[2200]: I1213 14:26:06.299580 2200 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" Dec 13 14:26:06.302223 kubelet[2200]: I1213 14:26:06.302209 2200 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" Dec 13 14:26:06.303077 env[1266]: time="2024-12-13T14:26:06.302554124Z" level=info msg="StopPodSandbox for \"45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767\"" Dec 13 14:26:06.303163 kubelet[2200]: I1213 14:26:06.303139 2200 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" Dec 13 14:26:06.304379 env[1266]: time="2024-12-13T14:26:06.304359756Z" level=info msg="StopPodSandbox for \"f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94\"" Dec 13 14:26:06.307269 env[1266]: time="2024-12-13T14:26:06.306721347Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:26:06.349499 env[1266]: time="2024-12-13T14:26:06.349442322Z" level=error msg="StopPodSandbox for \"efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7\" failed" error="failed to destroy network for sandbox \"efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:26:06.350776 kubelet[2200]: E1213 14:26:06.350703 2200 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" Dec 13 14:26:06.353984 kubelet[2200]: E1213 14:26:06.353897 2200 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7"} Dec 13 14:26:06.353984 kubelet[2200]: E1213 14:26:06.353943 2200 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"08ed695d-459c-416f-9e4f-957f40c790c1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:26:06.353984 kubelet[2200]: E1213 14:26:06.353967 2200 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"08ed695d-459c-416f-9e4f-957f40c790c1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7f96648886-5cszg" podUID="08ed695d-459c-416f-9e4f-957f40c790c1" Dec 13 14:26:06.370276 env[1266]: time="2024-12-13T14:26:06.370241093Z" level=error msg="StopPodSandbox for \"f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94\" failed" error="failed to destroy network for sandbox \"f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:26:06.370498 env[1266]: time="2024-12-13T14:26:06.370434878Z" level=error msg="StopPodSandbox for \"bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496\" failed" error="failed to destroy network for sandbox \"bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:26:06.371034 kubelet[2200]: E1213 14:26:06.370671 2200 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" Dec 13 14:26:06.371034 kubelet[2200]: E1213 14:26:06.370705 2200 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496"} Dec 13 14:26:06.371034 kubelet[2200]: E1213 14:26:06.370671 2200 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" Dec 13 14:26:06.371034 kubelet[2200]: E1213 14:26:06.370728 2200 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8213859f-6e9b-422f-8e3b-bd8bf68e0801\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:26:06.371034 kubelet[2200]: E1213 14:26:06.370741 2200 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94"} Dec 13 14:26:06.371192 kubelet[2200]: E1213 14:26:06.370748 2200 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8213859f-6e9b-422f-8e3b-bd8bf68e0801\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7f96648886-kg7v7" podUID="8213859f-6e9b-422f-8e3b-bd8bf68e0801" Dec 13 14:26:06.371192 kubelet[2200]: E1213 14:26:06.370774 2200 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"da687174-0225-4e56-9019-2e2c03247268\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:26:06.371192 kubelet[2200]: E1213 14:26:06.370801 2200 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"da687174-0225-4e56-9019-2e2c03247268\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-cctsn" podUID="da687174-0225-4e56-9019-2e2c03247268" Dec 13 14:26:06.372159 env[1266]: time="2024-12-13T14:26:06.372135536Z" level=error msg="StopPodSandbox for \"3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559\" failed" error="failed to destroy network for sandbox \"3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:26:06.372232 kubelet[2200]: E1213 14:26:06.372222 2200 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" Dec 13 14:26:06.372269 kubelet[2200]: E1213 14:26:06.372237 2200 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559"} Dec 13 14:26:06.372269 kubelet[2200]: E1213 14:26:06.372257 2200 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"28c95b79-f6d0-4c1a-9283-a65395471a14\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:26:06.372341 kubelet[2200]: E1213 14:26:06.372273 2200 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"28c95b79-f6d0-4c1a-9283-a65395471a14\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-mdtnh" podUID="28c95b79-f6d0-4c1a-9283-a65395471a14" Dec 13 14:26:06.378001 env[1266]: time="2024-12-13T14:26:06.377973677Z" level=error msg="StopPodSandbox for \"45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767\" failed" error="failed to destroy network for sandbox \"45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:26:06.378214 kubelet[2200]: E1213 14:26:06.378196 2200 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" Dec 13 14:26:06.378257 kubelet[2200]: E1213 14:26:06.378220 2200 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767"} Dec 13 14:26:06.378257 kubelet[2200]: E1213 14:26:06.378239 2200 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d719f53b-80fd-46d3-90c7-f51fe9e36be1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:26:06.378257 kubelet[2200]: E1213 14:26:06.378255 2200 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d719f53b-80fd-46d3-90c7-f51fe9e36be1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-d4bb8cc5-fkhpg" podUID="d719f53b-80fd-46d3-90c7-f51fe9e36be1" Dec 13 14:26:07.176775 systemd[1]: Created slice kubepods-besteffort-podc89227ed_30a3_4f3d_ba16_397f58d31fe4.slice. Dec 13 14:26:07.178241 env[1266]: time="2024-12-13T14:26:07.178214560Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xlj8g,Uid:c89227ed-30a3-4f3d-ba16-397f58d31fe4,Namespace:calico-system,Attempt:0,}" Dec 13 14:26:07.216187 env[1266]: time="2024-12-13T14:26:07.216140625Z" level=error msg="Failed to destroy network for sandbox \"1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:26:07.217514 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa-shm.mount: Deactivated successfully. Dec 13 14:26:07.218443 env[1266]: time="2024-12-13T14:26:07.218418012Z" level=error msg="encountered an error cleaning up failed sandbox \"1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:26:07.218480 env[1266]: time="2024-12-13T14:26:07.218455796Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xlj8g,Uid:c89227ed-30a3-4f3d-ba16-397f58d31fe4,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:26:07.218628 kubelet[2200]: E1213 14:26:07.218608 2200 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:26:07.218790 kubelet[2200]: E1213 14:26:07.218641 2200 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xlj8g" Dec 13 14:26:07.218790 kubelet[2200]: E1213 14:26:07.218658 2200 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xlj8g" Dec 13 14:26:07.218790 kubelet[2200]: E1213 14:26:07.218694 2200 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-xlj8g_calico-system(c89227ed-30a3-4f3d-ba16-397f58d31fe4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-xlj8g_calico-system(c89227ed-30a3-4f3d-ba16-397f58d31fe4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xlj8g" podUID="c89227ed-30a3-4f3d-ba16-397f58d31fe4" Dec 13 14:26:07.308206 kubelet[2200]: I1213 14:26:07.308187 2200 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" Dec 13 14:26:07.309206 env[1266]: time="2024-12-13T14:26:07.308577580Z" level=info msg="StopPodSandbox for \"1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa\"" Dec 13 14:26:07.324674 env[1266]: time="2024-12-13T14:26:07.324633076Z" level=error msg="StopPodSandbox for \"1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa\" failed" error="failed to destroy network for sandbox \"1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:26:07.324790 kubelet[2200]: E1213 14:26:07.324776 2200 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" Dec 13 14:26:07.324834 kubelet[2200]: E1213 14:26:07.324804 2200 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa"} Dec 13 14:26:07.324834 kubelet[2200]: E1213 14:26:07.324827 2200 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c89227ed-30a3-4f3d-ba16-397f58d31fe4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:26:07.324906 kubelet[2200]: E1213 14:26:07.324846 2200 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c89227ed-30a3-4f3d-ba16-397f58d31fe4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xlj8g" podUID="c89227ed-30a3-4f3d-ba16-397f58d31fe4" Dec 13 14:26:07.813681 kubelet[2200]: I1213 14:26:07.813532 2200 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:26:08.458000 audit[3204]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=3204 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:08.458000 audit[3204]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff5b078420 a2=0 a3=7fff5b07840c items=0 ppid=2331 pid=3204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:08.467505 kernel: audit: type=1325 audit(1734099968.458:1015): table=filter:95 family=2 entries=17 op=nft_register_rule pid=3204 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:08.467555 kernel: audit: type=1300 audit(1734099968.458:1015): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff5b078420 a2=0 a3=7fff5b07840c items=0 ppid=2331 pid=3204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:08.467576 kernel: audit: type=1327 audit(1734099968.458:1015): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:08.458000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:08.466000 audit[3204]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3204 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:08.471234 kernel: audit: type=1325 audit(1734099968.466:1016): table=nat:96 family=2 entries=19 op=nft_register_chain pid=3204 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:08.471266 kernel: audit: type=1300 audit(1734099968.466:1016): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fff5b078420 a2=0 a3=7fff5b07840c items=0 ppid=2331 pid=3204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:08.466000 audit[3204]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fff5b078420 a2=0 a3=7fff5b07840c items=0 ppid=2331 pid=3204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:08.466000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:08.476855 kernel: audit: type=1327 audit(1734099968.466:1016): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:11.453146 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3453080820.mount: Deactivated successfully. Dec 13 14:26:11.490997 env[1266]: time="2024-12-13T14:26:11.490964038Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:11.491865 env[1266]: time="2024-12-13T14:26:11.491850965Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:11.492672 env[1266]: time="2024-12-13T14:26:11.492659080Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:11.493292 env[1266]: time="2024-12-13T14:26:11.493279967Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:11.493668 env[1266]: time="2024-12-13T14:26:11.493652085Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 14:26:11.507786 env[1266]: time="2024-12-13T14:26:11.507765729Z" level=info msg="CreateContainer within sandbox \"6818790c4381b5a9c8d820fc8909ad68d08b74d0420f56442251c27174d0bacb\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:26:11.516173 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3215861329.mount: Deactivated successfully. Dec 13 14:26:11.519607 env[1266]: time="2024-12-13T14:26:11.519583823Z" level=info msg="CreateContainer within sandbox \"6818790c4381b5a9c8d820fc8909ad68d08b74d0420f56442251c27174d0bacb\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"6c01a9320319e7b98dde5f53166fb8dc4d01b548439e4ce50f231679beed80ab\"" Dec 13 14:26:11.519990 env[1266]: time="2024-12-13T14:26:11.519977040Z" level=info msg="StartContainer for \"6c01a9320319e7b98dde5f53166fb8dc4d01b548439e4ce50f231679beed80ab\"" Dec 13 14:26:11.530358 systemd[1]: Started cri-containerd-6c01a9320319e7b98dde5f53166fb8dc4d01b548439e4ce50f231679beed80ab.scope. Dec 13 14:26:11.552243 kernel: audit: type=1400 audit(1734099971.544:1017): avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.552315 kernel: audit: type=1300 audit(1734099971.544:1017): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f1b4926d7c8 items=0 ppid=2609 pid=3215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:11.544000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.560880 kernel: audit: type=1327 audit(1734099971.544:1017): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663303161393332303331396537623938646465356635333136366662 Dec 13 14:26:11.560931 kernel: audit: type=1400 audit(1734099971.546:1018): avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.560948 kernel: audit: type=1400 audit(1734099971.546:1018): avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.563441 kernel: audit: type=1400 audit(1734099971.546:1018): avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.544000 audit[3215]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f1b4926d7c8 items=0 ppid=2609 pid=3215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:11.571852 kernel: audit: type=1400 audit(1734099971.546:1018): avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.571883 kernel: audit: type=1400 audit(1734099971.546:1018): avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.571926 kernel: audit: type=1400 audit(1734099971.546:1018): avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663303161393332303331396537623938646465356635333136366662 Dec 13 14:26:11.546000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.546000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.546000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.546000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.546000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.546000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.546000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.575026 kernel: audit: type=1400 audit(1734099971.546:1018): avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.546000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.546000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.546000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.546000 audit: BPF prog-id=139 op=LOAD Dec 13 14:26:11.546000 audit[3215]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000335ee8 items=0 ppid=2609 pid=3215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:11.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663303161393332303331396537623938646465356635333136366662 Dec 13 14:26:11.550000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.550000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.550000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.550000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.550000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.550000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.550000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.550000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.550000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.550000 audit: BPF prog-id=140 op=LOAD Dec 13 14:26:11.550000 audit[3215]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000335f38 items=0 ppid=2609 pid=3215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:11.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663303161393332303331396537623938646465356635333136366662 Dec 13 14:26:11.550000 audit: BPF prog-id=140 op=UNLOAD Dec 13 14:26:11.550000 audit: BPF prog-id=139 op=UNLOAD Dec 13 14:26:11.550000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.550000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.550000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.550000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.550000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.550000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.550000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.550000 audit[3215]: AVC avc: denied { perfmon } for pid=3215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.550000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.550000 audit[3215]: AVC avc: denied { bpf } for pid=3215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:11.550000 audit: BPF prog-id=141 op=LOAD Dec 13 14:26:11.550000 audit[3215]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000335fc8 items=0 ppid=2609 pid=3215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:11.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663303161393332303331396537623938646465356635333136366662 Dec 13 14:26:11.578825 env[1266]: time="2024-12-13T14:26:11.577299661Z" level=info msg="StartContainer for \"6c01a9320319e7b98dde5f53166fb8dc4d01b548439e4ce50f231679beed80ab\" returns successfully" Dec 13 14:26:12.485266 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:26:12.485390 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:26:13.811000 audit[3314]: AVC avc: denied { write } for pid=3314 comm="tee" name="fd" dev="proc" ino=35411 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:26:13.811000 audit[3314]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc69d0ca30 a2=241 a3=1b6 items=1 ppid=3288 pid=3314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:13.811000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:26:13.811000 audit: PATH item=0 name="/dev/fd/63" inode=36099 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:13.811000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:26:13.812000 audit[3309]: AVC avc: denied { write } for pid=3309 comm="tee" name="fd" dev="proc" ino=36105 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:26:13.812000 audit[3309]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd0babaa2f a2=241 a3=1b6 items=1 ppid=3289 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:13.812000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:26:13.812000 audit: PATH item=0 name="/dev/fd/63" inode=36097 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:13.812000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:26:13.819000 audit[3318]: AVC avc: denied { write } for pid=3318 comm="tee" name="fd" dev="proc" ino=35420 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:26:13.819000 audit[3318]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff17264a1f a2=241 a3=1b6 items=1 ppid=3281 pid=3318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:13.819000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:26:13.819000 audit: PATH item=0 name="/dev/fd/63" inode=36102 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:13.819000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:26:13.819000 audit[3319]: AVC avc: denied { write } for pid=3319 comm="tee" name="fd" dev="proc" ino=36116 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:26:13.819000 audit[3319]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff78a2ba1e a2=241 a3=1b6 items=1 ppid=3287 pid=3319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:13.819000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:26:13.819000 audit: PATH item=0 name="/dev/fd/63" inode=35408 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:13.819000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:26:13.823000 audit[3326]: AVC avc: denied { write } for pid=3326 comm="tee" name="fd" dev="proc" ino=36126 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:26:13.823000 audit[3326]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff4e557a2e a2=241 a3=1b6 items=1 ppid=3286 pid=3326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:13.823000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:26:13.823000 audit: PATH item=0 name="/dev/fd/63" inode=36109 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:13.823000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:26:13.830000 audit[3336]: AVC avc: denied { write } for pid=3336 comm="tee" name="fd" dev="proc" ino=36140 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:26:13.830000 audit[3336]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd3b345a2e a2=241 a3=1b6 items=1 ppid=3280 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:13.830000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:26:13.830000 audit: PATH item=0 name="/dev/fd/63" inode=35422 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:13.830000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:26:13.847000 audit[3341]: AVC avc: denied { write } for pid=3341 comm="tee" name="fd" dev="proc" ino=36146 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:26:13.847000 audit[3341]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff0a1e5a2e a2=241 a3=1b6 items=1 ppid=3285 pid=3341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:13.847000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:26:13.847000 audit: PATH item=0 name="/dev/fd/63" inode=35423 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:26:13.847000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:26:13.948000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:13.948000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:13.948000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:13.948000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:13.948000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:13.948000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:13.948000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:13.948000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:13.948000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:13.948000 audit: BPF prog-id=142 op=LOAD Dec 13 14:26:13.948000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeb20ec1f0 a2=98 a3=3 items=0 ppid=3282 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:13.948000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:13.949000 audit: BPF prog-id=142 op=UNLOAD Dec 13 14:26:13.958000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:13.958000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:13.958000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:13.958000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:13.958000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:13.958000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:13.958000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:13.958000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:13.958000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:13.958000 audit: BPF prog-id=143 op=LOAD Dec 13 14:26:13.958000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeb20ebfd0 a2=74 a3=540051 items=0 ppid=3282 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:13.958000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:13.958000 audit: BPF prog-id=143 op=UNLOAD Dec 13 14:26:13.958000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:13.958000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:13.958000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:13.958000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:13.958000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:13.958000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:13.958000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:13.958000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:13.958000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:13.958000 audit: BPF prog-id=144 op=LOAD Dec 13 14:26:13.958000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeb20ec000 a2=94 a3=2 items=0 ppid=3282 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:13.958000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:13.958000 audit: BPF prog-id=144 op=UNLOAD Dec 13 14:26:14.046000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.046000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.046000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.046000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.046000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.046000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.046000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.046000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.046000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.046000 audit: BPF prog-id=145 op=LOAD Dec 13 14:26:14.046000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeb20ebec0 a2=40 a3=1 items=0 ppid=3282 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.046000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:14.046000 audit: BPF prog-id=145 op=UNLOAD Dec 13 14:26:14.046000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.046000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffeb20ebf90 a2=50 a3=7ffeb20ec070 items=0 ppid=3282 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.046000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:14.053000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.053000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb20ebed0 a2=28 a3=0 items=0 ppid=3282 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.053000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:14.053000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.053000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb20ebf00 a2=28 a3=0 items=0 ppid=3282 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.053000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:14.053000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.053000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb20ebe10 a2=28 a3=0 items=0 ppid=3282 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.053000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:14.053000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.053000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb20ebf20 a2=28 a3=0 items=0 ppid=3282 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.053000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:14.053000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.053000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb20ebf00 a2=28 a3=0 items=0 ppid=3282 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.053000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:14.053000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.053000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb20ebef0 a2=28 a3=0 items=0 ppid=3282 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.053000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:14.053000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.053000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb20ebf20 a2=28 a3=0 items=0 ppid=3282 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.053000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:14.053000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.053000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb20ebf00 a2=28 a3=0 items=0 ppid=3282 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.053000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:14.053000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.053000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb20ebf20 a2=28 a3=0 items=0 ppid=3282 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.053000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:14.053000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.053000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb20ebef0 a2=28 a3=0 items=0 ppid=3282 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.053000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:14.053000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.053000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb20ebf60 a2=28 a3=0 items=0 ppid=3282 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.053000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:14.053000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.053000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffeb20ebd10 a2=50 a3=1 items=0 ppid=3282 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.053000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:14.053000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.053000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.053000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.053000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.053000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.053000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.053000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.053000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.053000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.053000 audit: BPF prog-id=146 op=LOAD Dec 13 14:26:14.053000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffeb20ebd10 a2=94 a3=5 items=0 ppid=3282 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.053000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:14.053000 audit: BPF prog-id=146 op=UNLOAD Dec 13 14:26:14.053000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.053000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffeb20ebdc0 a2=50 a3=1 items=0 ppid=3282 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.053000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:14.054000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffeb20ebee0 a2=4 a3=38 items=0 ppid=3282 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.054000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:14.054000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3373]: AVC avc: denied { confidentiality } for pid=3373 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:26:14.054000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeb20ebf30 a2=94 a3=6 items=0 ppid=3282 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.054000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:14.054000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3373]: AVC avc: denied { confidentiality } for pid=3373 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:26:14.054000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeb20eb6e0 a2=94 a3=83 items=0 ppid=3282 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.054000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:14.054000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3373]: AVC avc: denied { perfmon } for pid=3373 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3373]: AVC avc: denied { bpf } for pid=3373 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.054000 audit[3373]: AVC avc: denied { confidentiality } for pid=3373 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:26:14.054000 audit[3373]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeb20eb6e0 a2=94 a3=83 items=0 ppid=3282 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.054000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:26:14.063000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.063000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.063000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.063000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.063000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.063000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.063000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.063000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.063000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.063000 audit: BPF prog-id=147 op=LOAD Dec 13 14:26:14.063000 audit[3394]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe0a8b1cd0 a2=98 a3=1999999999999999 items=0 ppid=3282 pid=3394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.063000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:26:14.063000 audit: BPF prog-id=147 op=UNLOAD Dec 13 14:26:14.063000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.063000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.063000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.063000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.063000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.063000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.063000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.063000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.063000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.063000 audit: BPF prog-id=148 op=LOAD Dec 13 14:26:14.063000 audit[3394]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe0a8b1bb0 a2=74 a3=ffff items=0 ppid=3282 pid=3394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.063000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:26:14.063000 audit: BPF prog-id=148 op=UNLOAD Dec 13 14:26:14.063000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.063000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.063000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.063000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.063000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.063000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.063000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.063000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.063000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.063000 audit: BPF prog-id=149 op=LOAD Dec 13 14:26:14.063000 audit[3394]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe0a8b1bf0 a2=40 a3=7ffe0a8b1dd0 items=0 ppid=3282 pid=3394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.063000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:26:14.063000 audit: BPF prog-id=149 op=UNLOAD Dec 13 14:26:14.132729 systemd-networkd[1061]: vxlan.calico: Link UP Dec 13 14:26:14.132734 systemd-networkd[1061]: vxlan.calico: Gained carrier Dec 13 14:26:14.154000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.154000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.154000 audit[3425]: AVC avc: denied { perfmon } for pid=3425 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.154000 audit[3425]: AVC avc: denied { perfmon } for pid=3425 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.154000 audit[3425]: AVC avc: denied { perfmon } for pid=3425 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.154000 audit[3425]: AVC avc: denied { perfmon } for pid=3425 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.154000 audit[3425]: AVC avc: denied { perfmon } for pid=3425 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.154000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.154000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.154000 audit: BPF prog-id=150 op=LOAD Dec 13 14:26:14.154000 audit[3425]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd29b36c0 a2=98 a3=ffffffff items=0 ppid=3282 pid=3425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.154000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:14.154000 audit: BPF prog-id=150 op=UNLOAD Dec 13 14:26:14.156000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.156000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.156000 audit[3425]: AVC avc: denied { perfmon } for pid=3425 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.156000 audit[3425]: AVC avc: denied { perfmon } for pid=3425 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.156000 audit[3425]: AVC avc: denied { perfmon } for pid=3425 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.156000 audit[3425]: AVC avc: denied { perfmon } for pid=3425 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.156000 audit[3425]: AVC avc: denied { perfmon } for pid=3425 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.156000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.156000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.156000 audit: BPF prog-id=151 op=LOAD Dec 13 14:26:14.156000 audit[3425]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd29b34d0 a2=74 a3=540051 items=0 ppid=3282 pid=3425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.156000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:14.157000 audit: BPF prog-id=151 op=UNLOAD Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { perfmon } for pid=3425 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { perfmon } for pid=3425 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { perfmon } for pid=3425 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { perfmon } for pid=3425 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { perfmon } for pid=3425 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit: BPF prog-id=152 op=LOAD Dec 13 14:26:14.157000 audit[3425]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd29b3500 a2=94 a3=2 items=0 ppid=3282 pid=3425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.157000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:14.157000 audit: BPF prog-id=152 op=UNLOAD Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffd29b33d0 a2=28 a3=0 items=0 ppid=3282 pid=3425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.157000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd29b3400 a2=28 a3=0 items=0 ppid=3282 pid=3425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.157000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd29b3310 a2=28 a3=0 items=0 ppid=3282 pid=3425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.157000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffd29b3420 a2=28 a3=0 items=0 ppid=3282 pid=3425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.157000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffd29b3400 a2=28 a3=0 items=0 ppid=3282 pid=3425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.157000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffd29b33f0 a2=28 a3=0 items=0 ppid=3282 pid=3425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.157000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffd29b3420 a2=28 a3=0 items=0 ppid=3282 pid=3425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.157000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd29b3400 a2=28 a3=0 items=0 ppid=3282 pid=3425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.157000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd29b3420 a2=28 a3=0 items=0 ppid=3282 pid=3425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.157000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd29b33f0 a2=28 a3=0 items=0 ppid=3282 pid=3425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.157000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffd29b3460 a2=28 a3=0 items=0 ppid=3282 pid=3425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.157000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { perfmon } for pid=3425 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { perfmon } for pid=3425 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { perfmon } for pid=3425 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { perfmon } for pid=3425 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { perfmon } for pid=3425 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit: BPF prog-id=153 op=LOAD Dec 13 14:26:14.157000 audit[3425]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffd29b32d0 a2=40 a3=0 items=0 ppid=3282 pid=3425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.157000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:14.157000 audit: BPF prog-id=153 op=UNLOAD Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fffd29b32c0 a2=50 a3=2800 items=0 ppid=3282 pid=3425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.157000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fffd29b32c0 a2=50 a3=2800 items=0 ppid=3282 pid=3425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.157000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { perfmon } for pid=3425 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { perfmon } for pid=3425 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { perfmon } for pid=3425 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { perfmon } for pid=3425 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { perfmon } for pid=3425 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit: BPF prog-id=154 op=LOAD Dec 13 14:26:14.157000 audit[3425]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffd29b2ae0 a2=94 a3=2 items=0 ppid=3282 pid=3425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.157000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:14.157000 audit: BPF prog-id=154 op=UNLOAD Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { perfmon } for pid=3425 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { perfmon } for pid=3425 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { perfmon } for pid=3425 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { perfmon } for pid=3425 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { perfmon } for pid=3425 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit[3425]: AVC avc: denied { bpf } for pid=3425 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.157000 audit: BPF prog-id=155 op=LOAD Dec 13 14:26:14.157000 audit[3425]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffd29b2be0 a2=94 a3=2d items=0 ppid=3282 pid=3425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.157000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:26:14.161000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.161000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.161000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.161000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.161000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.161000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.161000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.161000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.161000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.161000 audit: BPF prog-id=156 op=LOAD Dec 13 14:26:14.161000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe7e45d640 a2=98 a3=0 items=0 ppid=3282 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.161000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:14.161000 audit: BPF prog-id=156 op=UNLOAD Dec 13 14:26:14.161000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.161000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.161000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.161000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.161000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.161000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.161000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.161000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.161000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.161000 audit: BPF prog-id=157 op=LOAD Dec 13 14:26:14.161000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe7e45d420 a2=74 a3=540051 items=0 ppid=3282 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.161000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:14.161000 audit: BPF prog-id=157 op=UNLOAD Dec 13 14:26:14.161000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.161000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.161000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.161000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.161000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.161000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.161000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.161000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.161000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.161000 audit: BPF prog-id=158 op=LOAD Dec 13 14:26:14.161000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe7e45d450 a2=94 a3=2 items=0 ppid=3282 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.161000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:14.161000 audit: BPF prog-id=158 op=UNLOAD Dec 13 14:26:14.272000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.272000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.272000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.272000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.272000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.272000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.272000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.272000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.272000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.272000 audit: BPF prog-id=159 op=LOAD Dec 13 14:26:14.272000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe7e45d310 a2=40 a3=1 items=0 ppid=3282 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.272000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:14.272000 audit: BPF prog-id=159 op=UNLOAD Dec 13 14:26:14.272000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.272000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe7e45d3e0 a2=50 a3=7ffe7e45d4c0 items=0 ppid=3282 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.272000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe7e45d320 a2=28 a3=0 items=0 ppid=3282 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.279000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe7e45d350 a2=28 a3=0 items=0 ppid=3282 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.279000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe7e45d260 a2=28 a3=0 items=0 ppid=3282 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.279000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe7e45d370 a2=28 a3=0 items=0 ppid=3282 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.279000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe7e45d350 a2=28 a3=0 items=0 ppid=3282 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.279000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe7e45d340 a2=28 a3=0 items=0 ppid=3282 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.279000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe7e45d370 a2=28 a3=0 items=0 ppid=3282 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.279000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe7e45d350 a2=28 a3=0 items=0 ppid=3282 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.279000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe7e45d370 a2=28 a3=0 items=0 ppid=3282 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.279000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe7e45d340 a2=28 a3=0 items=0 ppid=3282 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.279000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe7e45d3b0 a2=28 a3=0 items=0 ppid=3282 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.279000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe7e45d160 a2=50 a3=1 items=0 ppid=3282 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.279000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit: BPF prog-id=160 op=LOAD Dec 13 14:26:14.279000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe7e45d160 a2=94 a3=5 items=0 ppid=3282 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.279000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:14.279000 audit: BPF prog-id=160 op=UNLOAD Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe7e45d210 a2=50 a3=1 items=0 ppid=3282 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.279000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe7e45d330 a2=4 a3=38 items=0 ppid=3282 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.279000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { confidentiality } for pid=3427 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:26:14.279000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe7e45d380 a2=94 a3=6 items=0 ppid=3282 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.279000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { confidentiality } for pid=3427 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:26:14.279000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe7e45cb30 a2=94 a3=83 items=0 ppid=3282 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.279000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { perfmon } for pid=3427 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.279000 audit[3427]: AVC avc: denied { confidentiality } for pid=3427 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:26:14.279000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe7e45cb30 a2=94 a3=83 items=0 ppid=3282 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.279000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:14.280000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.280000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe7e45e570 a2=10 a3=f1f00800 items=0 ppid=3282 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.280000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:14.280000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.280000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe7e45e410 a2=10 a3=3 items=0 ppid=3282 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.280000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:14.280000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.280000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe7e45e3b0 a2=10 a3=3 items=0 ppid=3282 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.280000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:14.280000 audit[3427]: AVC avc: denied { bpf } for pid=3427 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:14.280000 audit[3427]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe7e45e3b0 a2=10 a3=7 items=0 ppid=3282 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.280000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:26:14.287000 audit: BPF prog-id=155 op=UNLOAD Dec 13 14:26:14.329000 audit[3463]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3463 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:26:14.329000 audit[3463]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd316e6460 a2=0 a3=7ffd316e644c items=0 ppid=3282 pid=3463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.329000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:26:14.338000 audit[3462]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=3462 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:26:14.340000 audit[3461]: NETFILTER_CFG table=filter:99 family=2 entries=39 op=nft_register_chain pid=3461 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:26:14.340000 audit[3461]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffea4efd3e0 a2=0 a3=7ffea4efd3cc items=0 ppid=3282 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.340000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:26:14.338000 audit[3462]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffe8ad123d0 a2=0 a3=7ffe8ad123bc items=0 ppid=3282 pid=3462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.338000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:26:14.343000 audit[3460]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=3460 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:26:14.343000 audit[3460]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc66e93fa0 a2=0 a3=7ffc66e93f8c items=0 ppid=3282 pid=3460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:14.343000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:26:15.613707 systemd-networkd[1061]: vxlan.calico: Gained IPv6LL Dec 13 14:26:18.174701 env[1266]: time="2024-12-13T14:26:18.174519771Z" level=info msg="StopPodSandbox for \"3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559\"" Dec 13 14:26:18.242896 kubelet[2200]: I1213 14:26:18.242863 2200 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-gz2sk" podStartSLOduration=7.219283581 podStartE2EDuration="23.237054385s" podCreationTimestamp="2024-12-13 14:25:55 +0000 UTC" firstStartedPulling="2024-12-13 14:25:55.476063541 +0000 UTC m=+19.468403607" lastFinishedPulling="2024-12-13 14:26:11.493834345 +0000 UTC m=+35.486174411" observedRunningTime="2024-12-13 14:26:12.416609354 +0000 UTC m=+36.408949437" watchObservedRunningTime="2024-12-13 14:26:18.237054385 +0000 UTC m=+42.229394452" Dec 13 14:26:18.480691 env[1266]: 2024-12-13 14:26:18.236 [INFO][3492] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" Dec 13 14:26:18.480691 env[1266]: 2024-12-13 14:26:18.237 [INFO][3492] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" iface="eth0" netns="/var/run/netns/cni-0dedd841-0821-b29e-986f-31c0201f6a8b" Dec 13 14:26:18.480691 env[1266]: 2024-12-13 14:26:18.242 [INFO][3492] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" iface="eth0" netns="/var/run/netns/cni-0dedd841-0821-b29e-986f-31c0201f6a8b" Dec 13 14:26:18.480691 env[1266]: 2024-12-13 14:26:18.243 [INFO][3492] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" iface="eth0" netns="/var/run/netns/cni-0dedd841-0821-b29e-986f-31c0201f6a8b" Dec 13 14:26:18.480691 env[1266]: 2024-12-13 14:26:18.243 [INFO][3492] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" Dec 13 14:26:18.480691 env[1266]: 2024-12-13 14:26:18.243 [INFO][3492] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" Dec 13 14:26:18.480691 env[1266]: 2024-12-13 14:26:18.457 [INFO][3498] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" HandleID="k8s-pod-network.3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" Workload="localhost-k8s-coredns--76f75df574--mdtnh-eth0" Dec 13 14:26:18.480691 env[1266]: 2024-12-13 14:26:18.461 [INFO][3498] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:26:18.480691 env[1266]: 2024-12-13 14:26:18.462 [INFO][3498] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:26:18.480691 env[1266]: 2024-12-13 14:26:18.476 [WARNING][3498] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" HandleID="k8s-pod-network.3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" Workload="localhost-k8s-coredns--76f75df574--mdtnh-eth0" Dec 13 14:26:18.480691 env[1266]: 2024-12-13 14:26:18.476 [INFO][3498] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" HandleID="k8s-pod-network.3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" Workload="localhost-k8s-coredns--76f75df574--mdtnh-eth0" Dec 13 14:26:18.480691 env[1266]: 2024-12-13 14:26:18.478 [INFO][3498] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:26:18.480691 env[1266]: 2024-12-13 14:26:18.479 [INFO][3492] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" Dec 13 14:26:18.482518 systemd[1]: run-netns-cni\x2d0dedd841\x2d0821\x2db29e\x2d986f\x2d31c0201f6a8b.mount: Deactivated successfully. Dec 13 14:26:18.483322 env[1266]: time="2024-12-13T14:26:18.483294414Z" level=info msg="TearDown network for sandbox \"3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559\" successfully" Dec 13 14:26:18.483383 env[1266]: time="2024-12-13T14:26:18.483371081Z" level=info msg="StopPodSandbox for \"3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559\" returns successfully" Dec 13 14:26:18.483835 env[1266]: time="2024-12-13T14:26:18.483821669Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-mdtnh,Uid:28c95b79-f6d0-4c1a-9283-a65395471a14,Namespace:kube-system,Attempt:1,}" Dec 13 14:26:18.575122 systemd-networkd[1061]: caliebedc0a3020: Link UP Dec 13 14:26:18.577678 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:26:18.578134 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliebedc0a3020: link becomes ready Dec 13 14:26:18.577269 systemd-networkd[1061]: caliebedc0a3020: Gained carrier Dec 13 14:26:18.586634 env[1266]: 2024-12-13 14:26:18.520 [INFO][3504] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--76f75df574--mdtnh-eth0 coredns-76f75df574- kube-system 28c95b79-f6d0-4c1a-9283-a65395471a14 735 0 2024-12-13 14:25:47 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-76f75df574-mdtnh eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] caliebedc0a3020 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="b7aa5ab13a02e996d32e1cafaee1c8bf27135d57327d76cea37baa37dbf2f9c1" Namespace="kube-system" Pod="coredns-76f75df574-mdtnh" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--mdtnh-" Dec 13 14:26:18.586634 env[1266]: 2024-12-13 14:26:18.520 [INFO][3504] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b7aa5ab13a02e996d32e1cafaee1c8bf27135d57327d76cea37baa37dbf2f9c1" Namespace="kube-system" Pod="coredns-76f75df574-mdtnh" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--mdtnh-eth0" Dec 13 14:26:18.586634 env[1266]: 2024-12-13 14:26:18.545 [INFO][3517] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b7aa5ab13a02e996d32e1cafaee1c8bf27135d57327d76cea37baa37dbf2f9c1" HandleID="k8s-pod-network.b7aa5ab13a02e996d32e1cafaee1c8bf27135d57327d76cea37baa37dbf2f9c1" Workload="localhost-k8s-coredns--76f75df574--mdtnh-eth0" Dec 13 14:26:18.586634 env[1266]: 2024-12-13 14:26:18.552 [INFO][3517] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b7aa5ab13a02e996d32e1cafaee1c8bf27135d57327d76cea37baa37dbf2f9c1" HandleID="k8s-pod-network.b7aa5ab13a02e996d32e1cafaee1c8bf27135d57327d76cea37baa37dbf2f9c1" Workload="localhost-k8s-coredns--76f75df574--mdtnh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003050f0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-76f75df574-mdtnh", "timestamp":"2024-12-13 14:26:18.545157668 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:26:18.586634 env[1266]: 2024-12-13 14:26:18.552 [INFO][3517] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:26:18.586634 env[1266]: 2024-12-13 14:26:18.552 [INFO][3517] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:26:18.586634 env[1266]: 2024-12-13 14:26:18.552 [INFO][3517] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:26:18.586634 env[1266]: 2024-12-13 14:26:18.553 [INFO][3517] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b7aa5ab13a02e996d32e1cafaee1c8bf27135d57327d76cea37baa37dbf2f9c1" host="localhost" Dec 13 14:26:18.586634 env[1266]: 2024-12-13 14:26:18.560 [INFO][3517] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:26:18.586634 env[1266]: 2024-12-13 14:26:18.562 [INFO][3517] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:26:18.586634 env[1266]: 2024-12-13 14:26:18.563 [INFO][3517] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:26:18.586634 env[1266]: 2024-12-13 14:26:18.564 [INFO][3517] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:26:18.586634 env[1266]: 2024-12-13 14:26:18.564 [INFO][3517] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.b7aa5ab13a02e996d32e1cafaee1c8bf27135d57327d76cea37baa37dbf2f9c1" host="localhost" Dec 13 14:26:18.586634 env[1266]: 2024-12-13 14:26:18.564 [INFO][3517] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b7aa5ab13a02e996d32e1cafaee1c8bf27135d57327d76cea37baa37dbf2f9c1 Dec 13 14:26:18.586634 env[1266]: 2024-12-13 14:26:18.567 [INFO][3517] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.b7aa5ab13a02e996d32e1cafaee1c8bf27135d57327d76cea37baa37dbf2f9c1" host="localhost" Dec 13 14:26:18.586634 env[1266]: 2024-12-13 14:26:18.570 [INFO][3517] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.b7aa5ab13a02e996d32e1cafaee1c8bf27135d57327d76cea37baa37dbf2f9c1" host="localhost" Dec 13 14:26:18.586634 env[1266]: 2024-12-13 14:26:18.570 [INFO][3517] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.b7aa5ab13a02e996d32e1cafaee1c8bf27135d57327d76cea37baa37dbf2f9c1" host="localhost" Dec 13 14:26:18.586634 env[1266]: 2024-12-13 14:26:18.570 [INFO][3517] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:26:18.586634 env[1266]: 2024-12-13 14:26:18.570 [INFO][3517] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="b7aa5ab13a02e996d32e1cafaee1c8bf27135d57327d76cea37baa37dbf2f9c1" HandleID="k8s-pod-network.b7aa5ab13a02e996d32e1cafaee1c8bf27135d57327d76cea37baa37dbf2f9c1" Workload="localhost-k8s-coredns--76f75df574--mdtnh-eth0" Dec 13 14:26:18.587110 env[1266]: 2024-12-13 14:26:18.572 [INFO][3504] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b7aa5ab13a02e996d32e1cafaee1c8bf27135d57327d76cea37baa37dbf2f9c1" Namespace="kube-system" Pod="coredns-76f75df574-mdtnh" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--mdtnh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--mdtnh-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"28c95b79-f6d0-4c1a-9283-a65395471a14", ResourceVersion:"735", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-76f75df574-mdtnh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliebedc0a3020", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:26:18.587110 env[1266]: 2024-12-13 14:26:18.572 [INFO][3504] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="b7aa5ab13a02e996d32e1cafaee1c8bf27135d57327d76cea37baa37dbf2f9c1" Namespace="kube-system" Pod="coredns-76f75df574-mdtnh" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--mdtnh-eth0" Dec 13 14:26:18.587110 env[1266]: 2024-12-13 14:26:18.573 [INFO][3504] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliebedc0a3020 ContainerID="b7aa5ab13a02e996d32e1cafaee1c8bf27135d57327d76cea37baa37dbf2f9c1" Namespace="kube-system" Pod="coredns-76f75df574-mdtnh" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--mdtnh-eth0" Dec 13 14:26:18.587110 env[1266]: 2024-12-13 14:26:18.577 [INFO][3504] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b7aa5ab13a02e996d32e1cafaee1c8bf27135d57327d76cea37baa37dbf2f9c1" Namespace="kube-system" Pod="coredns-76f75df574-mdtnh" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--mdtnh-eth0" Dec 13 14:26:18.587110 env[1266]: 2024-12-13 14:26:18.577 [INFO][3504] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b7aa5ab13a02e996d32e1cafaee1c8bf27135d57327d76cea37baa37dbf2f9c1" Namespace="kube-system" Pod="coredns-76f75df574-mdtnh" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--mdtnh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--mdtnh-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"28c95b79-f6d0-4c1a-9283-a65395471a14", ResourceVersion:"735", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b7aa5ab13a02e996d32e1cafaee1c8bf27135d57327d76cea37baa37dbf2f9c1", Pod:"coredns-76f75df574-mdtnh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliebedc0a3020", MAC:"d2:ba:d2:79:93:66", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:26:18.587110 env[1266]: 2024-12-13 14:26:18.582 [INFO][3504] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b7aa5ab13a02e996d32e1cafaee1c8bf27135d57327d76cea37baa37dbf2f9c1" Namespace="kube-system" Pod="coredns-76f75df574-mdtnh" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--mdtnh-eth0" Dec 13 14:26:18.601422 env[1266]: time="2024-12-13T14:26:18.601376615Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:26:18.601422 env[1266]: time="2024-12-13T14:26:18.601401227Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:26:18.601586 env[1266]: time="2024-12-13T14:26:18.601408162Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:26:18.601586 env[1266]: time="2024-12-13T14:26:18.601531912Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b7aa5ab13a02e996d32e1cafaee1c8bf27135d57327d76cea37baa37dbf2f9c1 pid=3547 runtime=io.containerd.runc.v2 Dec 13 14:26:18.600000 audit[3546]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=3546 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:26:18.605070 kernel: kauditd_printk_skb: 548 callbacks suppressed Dec 13 14:26:18.605111 kernel: audit: type=1325 audit(1734099978.600:1125): table=filter:101 family=2 entries=34 op=nft_register_chain pid=3546 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:26:18.600000 audit[3546]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffd8da7b370 a2=0 a3=7ffd8da7b35c items=0 ppid=3282 pid=3546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.612128 kernel: audit: type=1300 audit(1734099978.600:1125): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffd8da7b370 a2=0 a3=7ffd8da7b35c items=0 ppid=3282 pid=3546 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.600000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:26:18.615591 kernel: audit: type=1327 audit(1734099978.600:1125): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:26:18.620843 systemd[1]: Started cri-containerd-b7aa5ab13a02e996d32e1cafaee1c8bf27135d57327d76cea37baa37dbf2f9c1.scope. Dec 13 14:26:18.633988 kernel: audit: type=1400 audit(1734099978.627:1126): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.634056 kernel: audit: type=1400 audit(1734099978.627:1127): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.634076 kernel: audit: type=1400 audit(1734099978.627:1128): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.638740 kernel: audit: type=1400 audit(1734099978.627:1129): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.638774 kernel: audit: type=1400 audit(1734099978.627:1130): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.643570 kernel: audit: type=1400 audit(1734099978.627:1131): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.643613 kernel: audit: type=1400 audit(1734099978.627:1132): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.632000 audit: BPF prog-id=161 op=LOAD Dec 13 14:26:18.634000 audit[3557]: AVC avc: denied { bpf } for pid=3557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.634000 audit[3557]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3547 pid=3557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237616135616231336130326539393664333265316361666165653163 Dec 13 14:26:18.634000 audit[3557]: AVC avc: denied { perfmon } for pid=3557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.634000 audit[3557]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3547 pid=3557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237616135616231336130326539393664333265316361666165653163 Dec 13 14:26:18.634000 audit[3557]: AVC avc: denied { bpf } for pid=3557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.634000 audit[3557]: AVC avc: denied { bpf } for pid=3557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.634000 audit[3557]: AVC avc: denied { bpf } for pid=3557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.634000 audit[3557]: AVC avc: denied { perfmon } for pid=3557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.634000 audit[3557]: AVC avc: denied { perfmon } for pid=3557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.634000 audit[3557]: AVC avc: denied { perfmon } for pid=3557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.634000 audit[3557]: AVC avc: denied { perfmon } for pid=3557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.634000 audit[3557]: AVC avc: denied { perfmon } for pid=3557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.634000 audit[3557]: AVC avc: denied { bpf } for pid=3557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.634000 audit[3557]: AVC avc: denied { bpf } for pid=3557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.634000 audit: BPF prog-id=162 op=LOAD Dec 13 14:26:18.634000 audit[3557]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c82e0 items=0 ppid=3547 pid=3557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237616135616231336130326539393664333265316361666165653163 Dec 13 14:26:18.639000 audit[3557]: AVC avc: denied { bpf } for pid=3557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.639000 audit[3557]: AVC avc: denied { bpf } for pid=3557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.639000 audit[3557]: AVC avc: denied { perfmon } for pid=3557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.639000 audit[3557]: AVC avc: denied { perfmon } for pid=3557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.639000 audit[3557]: AVC avc: denied { perfmon } for pid=3557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.639000 audit[3557]: AVC avc: denied { perfmon } for pid=3557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.639000 audit[3557]: AVC avc: denied { perfmon } for pid=3557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.639000 audit[3557]: AVC avc: denied { bpf } for pid=3557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.639000 audit[3557]: AVC avc: denied { bpf } for pid=3557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.639000 audit: BPF prog-id=163 op=LOAD Dec 13 14:26:18.639000 audit[3557]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c8328 items=0 ppid=3547 pid=3557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237616135616231336130326539393664333265316361666165653163 Dec 13 14:26:18.644000 audit: BPF prog-id=163 op=UNLOAD Dec 13 14:26:18.645000 audit: BPF prog-id=162 op=UNLOAD Dec 13 14:26:18.645000 audit[3557]: AVC avc: denied { bpf } for pid=3557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.645000 audit[3557]: AVC avc: denied { bpf } for pid=3557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.645000 audit[3557]: AVC avc: denied { bpf } for pid=3557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.645000 audit[3557]: AVC avc: denied { perfmon } for pid=3557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.645000 audit[3557]: AVC avc: denied { perfmon } for pid=3557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.645000 audit[3557]: AVC avc: denied { perfmon } for pid=3557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.645000 audit[3557]: AVC avc: denied { perfmon } for pid=3557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.645000 audit[3557]: AVC avc: denied { perfmon } for pid=3557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.645000 audit[3557]: AVC avc: denied { bpf } for pid=3557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.645000 audit[3557]: AVC avc: denied { bpf } for pid=3557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.645000 audit: BPF prog-id=164 op=LOAD Dec 13 14:26:18.645000 audit[3557]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c8738 items=0 ppid=3547 pid=3557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237616135616231336130326539393664333265316361666165653163 Dec 13 14:26:18.648408 systemd-resolved[1191]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:26:18.670329 env[1266]: time="2024-12-13T14:26:18.670299560Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-mdtnh,Uid:28c95b79-f6d0-4c1a-9283-a65395471a14,Namespace:kube-system,Attempt:1,} returns sandbox id \"b7aa5ab13a02e996d32e1cafaee1c8bf27135d57327d76cea37baa37dbf2f9c1\"" Dec 13 14:26:18.673439 env[1266]: time="2024-12-13T14:26:18.673419629Z" level=info msg="CreateContainer within sandbox \"b7aa5ab13a02e996d32e1cafaee1c8bf27135d57327d76cea37baa37dbf2f9c1\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:26:18.686333 env[1266]: time="2024-12-13T14:26:18.686309926Z" level=info msg="CreateContainer within sandbox \"b7aa5ab13a02e996d32e1cafaee1c8bf27135d57327d76cea37baa37dbf2f9c1\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"c23b925d250922b302bbf977ba82bfaf4dd5b12e4117756c1ff2d991dbf1ef7f\"" Dec 13 14:26:18.686853 env[1266]: time="2024-12-13T14:26:18.686839413Z" level=info msg="StartContainer for \"c23b925d250922b302bbf977ba82bfaf4dd5b12e4117756c1ff2d991dbf1ef7f\"" Dec 13 14:26:18.697223 systemd[1]: Started cri-containerd-c23b925d250922b302bbf977ba82bfaf4dd5b12e4117756c1ff2d991dbf1ef7f.scope. Dec 13 14:26:18.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.719000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.719000 audit: BPF prog-id=165 op=LOAD Dec 13 14:26:18.720000 audit[3588]: AVC avc: denied { bpf } for pid=3588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.720000 audit[3588]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3547 pid=3588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.720000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332336239323564323530393232623330326262663937376261383262 Dec 13 14:26:18.720000 audit[3588]: AVC avc: denied { perfmon } for pid=3588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.720000 audit[3588]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3547 pid=3588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.720000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332336239323564323530393232623330326262663937376261383262 Dec 13 14:26:18.720000 audit[3588]: AVC avc: denied { bpf } for pid=3588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.720000 audit[3588]: AVC avc: denied { bpf } for pid=3588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.720000 audit[3588]: AVC avc: denied { bpf } for pid=3588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.720000 audit[3588]: AVC avc: denied { perfmon } for pid=3588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.720000 audit[3588]: AVC avc: denied { perfmon } for pid=3588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.720000 audit[3588]: AVC avc: denied { perfmon } for pid=3588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.720000 audit[3588]: AVC avc: denied { perfmon } for pid=3588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.720000 audit[3588]: AVC avc: denied { perfmon } for pid=3588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.720000 audit[3588]: AVC avc: denied { bpf } for pid=3588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.720000 audit[3588]: AVC avc: denied { bpf } for pid=3588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.720000 audit: BPF prog-id=166 op=LOAD Dec 13 14:26:18.720000 audit[3588]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003b8b30 items=0 ppid=3547 pid=3588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.720000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332336239323564323530393232623330326262663937376261383262 Dec 13 14:26:18.721000 audit[3588]: AVC avc: denied { bpf } for pid=3588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.721000 audit[3588]: AVC avc: denied { bpf } for pid=3588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.721000 audit[3588]: AVC avc: denied { perfmon } for pid=3588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.721000 audit[3588]: AVC avc: denied { perfmon } for pid=3588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.721000 audit[3588]: AVC avc: denied { perfmon } for pid=3588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.721000 audit[3588]: AVC avc: denied { perfmon } for pid=3588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.721000 audit[3588]: AVC avc: denied { perfmon } for pid=3588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.721000 audit[3588]: AVC avc: denied { bpf } for pid=3588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.721000 audit[3588]: AVC avc: denied { bpf } for pid=3588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.721000 audit: BPF prog-id=167 op=LOAD Dec 13 14:26:18.721000 audit[3588]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003b8b78 items=0 ppid=3547 pid=3588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332336239323564323530393232623330326262663937376261383262 Dec 13 14:26:18.721000 audit: BPF prog-id=167 op=UNLOAD Dec 13 14:26:18.721000 audit: BPF prog-id=166 op=UNLOAD Dec 13 14:26:18.721000 audit[3588]: AVC avc: denied { bpf } for pid=3588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.721000 audit[3588]: AVC avc: denied { bpf } for pid=3588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.721000 audit[3588]: AVC avc: denied { bpf } for pid=3588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.721000 audit[3588]: AVC avc: denied { perfmon } for pid=3588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.721000 audit[3588]: AVC avc: denied { perfmon } for pid=3588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.721000 audit[3588]: AVC avc: denied { perfmon } for pid=3588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.721000 audit[3588]: AVC avc: denied { perfmon } for pid=3588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.721000 audit[3588]: AVC avc: denied { perfmon } for pid=3588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.721000 audit[3588]: AVC avc: denied { bpf } for pid=3588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.721000 audit[3588]: AVC avc: denied { bpf } for pid=3588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:18.721000 audit: BPF prog-id=168 op=LOAD Dec 13 14:26:18.721000 audit[3588]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003b8f88 items=0 ppid=3547 pid=3588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:18.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332336239323564323530393232623330326262663937376261383262 Dec 13 14:26:18.740245 env[1266]: time="2024-12-13T14:26:18.736441902Z" level=info msg="StartContainer for \"c23b925d250922b302bbf977ba82bfaf4dd5b12e4117756c1ff2d991dbf1ef7f\" returns successfully" Dec 13 14:26:19.173886 env[1266]: time="2024-12-13T14:26:19.173793812Z" level=info msg="StopPodSandbox for \"45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767\"" Dec 13 14:26:19.232720 env[1266]: 2024-12-13 14:26:19.209 [INFO][3634] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" Dec 13 14:26:19.232720 env[1266]: 2024-12-13 14:26:19.210 [INFO][3634] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" iface="eth0" netns="/var/run/netns/cni-9a3787af-f40e-a2ba-e0ca-9df644711a09" Dec 13 14:26:19.232720 env[1266]: 2024-12-13 14:26:19.210 [INFO][3634] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" iface="eth0" netns="/var/run/netns/cni-9a3787af-f40e-a2ba-e0ca-9df644711a09" Dec 13 14:26:19.232720 env[1266]: 2024-12-13 14:26:19.210 [INFO][3634] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" iface="eth0" netns="/var/run/netns/cni-9a3787af-f40e-a2ba-e0ca-9df644711a09" Dec 13 14:26:19.232720 env[1266]: 2024-12-13 14:26:19.210 [INFO][3634] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" Dec 13 14:26:19.232720 env[1266]: 2024-12-13 14:26:19.210 [INFO][3634] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" Dec 13 14:26:19.232720 env[1266]: 2024-12-13 14:26:19.222 [INFO][3640] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" HandleID="k8s-pod-network.45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" Workload="localhost-k8s-calico--kube--controllers--d4bb8cc5--fkhpg-eth0" Dec 13 14:26:19.232720 env[1266]: 2024-12-13 14:26:19.222 [INFO][3640] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:26:19.232720 env[1266]: 2024-12-13 14:26:19.222 [INFO][3640] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:26:19.232720 env[1266]: 2024-12-13 14:26:19.229 [WARNING][3640] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" HandleID="k8s-pod-network.45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" Workload="localhost-k8s-calico--kube--controllers--d4bb8cc5--fkhpg-eth0" Dec 13 14:26:19.232720 env[1266]: 2024-12-13 14:26:19.229 [INFO][3640] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" HandleID="k8s-pod-network.45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" Workload="localhost-k8s-calico--kube--controllers--d4bb8cc5--fkhpg-eth0" Dec 13 14:26:19.232720 env[1266]: 2024-12-13 14:26:19.230 [INFO][3640] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:26:19.232720 env[1266]: 2024-12-13 14:26:19.231 [INFO][3634] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" Dec 13 14:26:19.233701 env[1266]: time="2024-12-13T14:26:19.232843863Z" level=info msg="TearDown network for sandbox \"45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767\" successfully" Dec 13 14:26:19.233701 env[1266]: time="2024-12-13T14:26:19.232875846Z" level=info msg="StopPodSandbox for \"45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767\" returns successfully" Dec 13 14:26:19.233701 env[1266]: time="2024-12-13T14:26:19.233594289Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-d4bb8cc5-fkhpg,Uid:d719f53b-80fd-46d3-90c7-f51fe9e36be1,Namespace:calico-system,Attempt:1,}" Dec 13 14:26:19.294874 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calica78d6b3324: link becomes ready Dec 13 14:26:19.293891 systemd-networkd[1061]: calica78d6b3324: Link UP Dec 13 14:26:19.294671 systemd-networkd[1061]: calica78d6b3324: Gained carrier Dec 13 14:26:19.305368 env[1266]: 2024-12-13 14:26:19.255 [INFO][3647] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--d4bb8cc5--fkhpg-eth0 calico-kube-controllers-d4bb8cc5- calico-system d719f53b-80fd-46d3-90c7-f51fe9e36be1 745 0 2024-12-13 14:25:55 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:d4bb8cc5 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-d4bb8cc5-fkhpg eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calica78d6b3324 [] []}} ContainerID="590c21849d3457913d3999dde0f3ee956e0a5250804551affd717525fc7eb958" Namespace="calico-system" Pod="calico-kube-controllers-d4bb8cc5-fkhpg" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--d4bb8cc5--fkhpg-" Dec 13 14:26:19.305368 env[1266]: 2024-12-13 14:26:19.255 [INFO][3647] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="590c21849d3457913d3999dde0f3ee956e0a5250804551affd717525fc7eb958" Namespace="calico-system" Pod="calico-kube-controllers-d4bb8cc5-fkhpg" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--d4bb8cc5--fkhpg-eth0" Dec 13 14:26:19.305368 env[1266]: 2024-12-13 14:26:19.272 [INFO][3660] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="590c21849d3457913d3999dde0f3ee956e0a5250804551affd717525fc7eb958" HandleID="k8s-pod-network.590c21849d3457913d3999dde0f3ee956e0a5250804551affd717525fc7eb958" Workload="localhost-k8s-calico--kube--controllers--d4bb8cc5--fkhpg-eth0" Dec 13 14:26:19.305368 env[1266]: 2024-12-13 14:26:19.277 [INFO][3660] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="590c21849d3457913d3999dde0f3ee956e0a5250804551affd717525fc7eb958" HandleID="k8s-pod-network.590c21849d3457913d3999dde0f3ee956e0a5250804551affd717525fc7eb958" Workload="localhost-k8s-calico--kube--controllers--d4bb8cc5--fkhpg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318e90), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-d4bb8cc5-fkhpg", "timestamp":"2024-12-13 14:26:19.272179068 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:26:19.305368 env[1266]: 2024-12-13 14:26:19.277 [INFO][3660] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:26:19.305368 env[1266]: 2024-12-13 14:26:19.277 [INFO][3660] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:26:19.305368 env[1266]: 2024-12-13 14:26:19.277 [INFO][3660] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:26:19.305368 env[1266]: 2024-12-13 14:26:19.278 [INFO][3660] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.590c21849d3457913d3999dde0f3ee956e0a5250804551affd717525fc7eb958" host="localhost" Dec 13 14:26:19.305368 env[1266]: 2024-12-13 14:26:19.280 [INFO][3660] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:26:19.305368 env[1266]: 2024-12-13 14:26:19.282 [INFO][3660] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:26:19.305368 env[1266]: 2024-12-13 14:26:19.282 [INFO][3660] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:26:19.305368 env[1266]: 2024-12-13 14:26:19.283 [INFO][3660] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:26:19.305368 env[1266]: 2024-12-13 14:26:19.283 [INFO][3660] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.590c21849d3457913d3999dde0f3ee956e0a5250804551affd717525fc7eb958" host="localhost" Dec 13 14:26:19.305368 env[1266]: 2024-12-13 14:26:19.284 [INFO][3660] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.590c21849d3457913d3999dde0f3ee956e0a5250804551affd717525fc7eb958 Dec 13 14:26:19.305368 env[1266]: 2024-12-13 14:26:19.286 [INFO][3660] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.590c21849d3457913d3999dde0f3ee956e0a5250804551affd717525fc7eb958" host="localhost" Dec 13 14:26:19.305368 env[1266]: 2024-12-13 14:26:19.289 [INFO][3660] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.590c21849d3457913d3999dde0f3ee956e0a5250804551affd717525fc7eb958" host="localhost" Dec 13 14:26:19.305368 env[1266]: 2024-12-13 14:26:19.289 [INFO][3660] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.590c21849d3457913d3999dde0f3ee956e0a5250804551affd717525fc7eb958" host="localhost" Dec 13 14:26:19.305368 env[1266]: 2024-12-13 14:26:19.289 [INFO][3660] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:26:19.305368 env[1266]: 2024-12-13 14:26:19.289 [INFO][3660] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="590c21849d3457913d3999dde0f3ee956e0a5250804551affd717525fc7eb958" HandleID="k8s-pod-network.590c21849d3457913d3999dde0f3ee956e0a5250804551affd717525fc7eb958" Workload="localhost-k8s-calico--kube--controllers--d4bb8cc5--fkhpg-eth0" Dec 13 14:26:19.305872 env[1266]: 2024-12-13 14:26:19.291 [INFO][3647] cni-plugin/k8s.go 386: Populated endpoint ContainerID="590c21849d3457913d3999dde0f3ee956e0a5250804551affd717525fc7eb958" Namespace="calico-system" Pod="calico-kube-controllers-d4bb8cc5-fkhpg" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--d4bb8cc5--fkhpg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--d4bb8cc5--fkhpg-eth0", GenerateName:"calico-kube-controllers-d4bb8cc5-", Namespace:"calico-system", SelfLink:"", UID:"d719f53b-80fd-46d3-90c7-f51fe9e36be1", ResourceVersion:"745", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"d4bb8cc5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-d4bb8cc5-fkhpg", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calica78d6b3324", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:26:19.305872 env[1266]: 2024-12-13 14:26:19.291 [INFO][3647] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="590c21849d3457913d3999dde0f3ee956e0a5250804551affd717525fc7eb958" Namespace="calico-system" Pod="calico-kube-controllers-d4bb8cc5-fkhpg" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--d4bb8cc5--fkhpg-eth0" Dec 13 14:26:19.305872 env[1266]: 2024-12-13 14:26:19.291 [INFO][3647] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calica78d6b3324 ContainerID="590c21849d3457913d3999dde0f3ee956e0a5250804551affd717525fc7eb958" Namespace="calico-system" Pod="calico-kube-controllers-d4bb8cc5-fkhpg" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--d4bb8cc5--fkhpg-eth0" Dec 13 14:26:19.305872 env[1266]: 2024-12-13 14:26:19.295 [INFO][3647] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="590c21849d3457913d3999dde0f3ee956e0a5250804551affd717525fc7eb958" Namespace="calico-system" Pod="calico-kube-controllers-d4bb8cc5-fkhpg" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--d4bb8cc5--fkhpg-eth0" Dec 13 14:26:19.305872 env[1266]: 2024-12-13 14:26:19.295 [INFO][3647] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="590c21849d3457913d3999dde0f3ee956e0a5250804551affd717525fc7eb958" Namespace="calico-system" Pod="calico-kube-controllers-d4bb8cc5-fkhpg" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--d4bb8cc5--fkhpg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--d4bb8cc5--fkhpg-eth0", GenerateName:"calico-kube-controllers-d4bb8cc5-", Namespace:"calico-system", SelfLink:"", UID:"d719f53b-80fd-46d3-90c7-f51fe9e36be1", ResourceVersion:"745", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"d4bb8cc5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"590c21849d3457913d3999dde0f3ee956e0a5250804551affd717525fc7eb958", Pod:"calico-kube-controllers-d4bb8cc5-fkhpg", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calica78d6b3324", MAC:"da:fc:c1:31:78:e3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:26:19.305872 env[1266]: 2024-12-13 14:26:19.304 [INFO][3647] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="590c21849d3457913d3999dde0f3ee956e0a5250804551affd717525fc7eb958" Namespace="calico-system" Pod="calico-kube-controllers-d4bb8cc5-fkhpg" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--d4bb8cc5--fkhpg-eth0" Dec 13 14:26:19.312355 env[1266]: time="2024-12-13T14:26:19.312316674Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:26:19.312485 env[1266]: time="2024-12-13T14:26:19.312351313Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:26:19.312485 env[1266]: time="2024-12-13T14:26:19.312361579Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:26:19.312583 env[1266]: time="2024-12-13T14:26:19.312492669Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/590c21849d3457913d3999dde0f3ee956e0a5250804551affd717525fc7eb958 pid=3686 runtime=io.containerd.runc.v2 Dec 13 14:26:19.322000 audit[3695]: NETFILTER_CFG table=filter:102 family=2 entries=38 op=nft_register_chain pid=3695 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:26:19.322000 audit[3695]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7fffcd647ab0 a2=0 a3=7fffcd647a9c items=0 ppid=3282 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:19.322000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:26:19.338489 systemd[1]: Started cri-containerd-590c21849d3457913d3999dde0f3ee956e0a5250804551affd717525fc7eb958.scope. Dec 13 14:26:19.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.346000 audit: BPF prog-id=169 op=LOAD Dec 13 14:26:19.346000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.346000 audit[3696]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3686 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:19.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539306332313834396433343537393133643339393964646530663365 Dec 13 14:26:19.346000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.346000 audit[3696]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3686 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:19.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539306332313834396433343537393133643339393964646530663365 Dec 13 14:26:19.346000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.346000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.346000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.346000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.346000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.346000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.346000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.346000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.346000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.346000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.346000 audit: BPF prog-id=170 op=LOAD Dec 13 14:26:19.346000 audit[3696]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000024b40 items=0 ppid=3686 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:19.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539306332313834396433343537393133643339393964646530663365 Dec 13 14:26:19.346000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.346000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.346000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.346000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.346000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.346000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.346000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.346000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.346000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.346000 audit: BPF prog-id=171 op=LOAD Dec 13 14:26:19.346000 audit[3696]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000024b88 items=0 ppid=3686 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:19.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539306332313834396433343537393133643339393964646530663365 Dec 13 14:26:19.346000 audit: BPF prog-id=171 op=UNLOAD Dec 13 14:26:19.346000 audit: BPF prog-id=170 op=UNLOAD Dec 13 14:26:19.346000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.346000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.346000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.346000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.346000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.346000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.346000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.346000 audit[3696]: AVC avc: denied { perfmon } for pid=3696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.346000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.346000 audit[3696]: AVC avc: denied { bpf } for pid=3696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:19.346000 audit: BPF prog-id=172 op=LOAD Dec 13 14:26:19.346000 audit[3696]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000024f98 items=0 ppid=3686 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:19.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539306332313834396433343537393133643339393964646530663365 Dec 13 14:26:19.348821 systemd-resolved[1191]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:26:19.377671 env[1266]: time="2024-12-13T14:26:19.377645063Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-d4bb8cc5-fkhpg,Uid:d719f53b-80fd-46d3-90c7-f51fe9e36be1,Namespace:calico-system,Attempt:1,} returns sandbox id \"590c21849d3457913d3999dde0f3ee956e0a5250804551affd717525fc7eb958\"" Dec 13 14:26:19.383352 env[1266]: time="2024-12-13T14:26:19.383329584Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 14:26:19.396952 kubelet[2200]: I1213 14:26:19.396931 2200 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-mdtnh" podStartSLOduration=32.396900426 podStartE2EDuration="32.396900426s" podCreationTimestamp="2024-12-13 14:25:47 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:26:19.396579364 +0000 UTC m=+43.388919433" watchObservedRunningTime="2024-12-13 14:26:19.396900426 +0000 UTC m=+43.389240495" Dec 13 14:26:19.423000 audit[3727]: NETFILTER_CFG table=filter:103 family=2 entries=13 op=nft_register_rule pid=3727 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:19.423000 audit[3727]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffde24ce640 a2=0 a3=7ffde24ce62c items=0 ppid=2331 pid=3727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:19.423000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:19.428000 audit[3727]: NETFILTER_CFG table=nat:104 family=2 entries=35 op=nft_register_chain pid=3727 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:19.428000 audit[3727]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffde24ce640 a2=0 a3=7ffde24ce62c items=0 ppid=2331 pid=3727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:19.428000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:19.483997 systemd[1]: run-containerd-runc-k8s.io-b7aa5ab13a02e996d32e1cafaee1c8bf27135d57327d76cea37baa37dbf2f9c1-runc.D0zJEU.mount: Deactivated successfully. Dec 13 14:26:19.484233 systemd[1]: run-netns-cni\x2d9a3787af\x2df40e\x2da2ba\x2de0ca\x2d9df644711a09.mount: Deactivated successfully. Dec 13 14:26:20.174236 env[1266]: time="2024-12-13T14:26:20.174204121Z" level=info msg="StopPodSandbox for \"efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7\"" Dec 13 14:26:20.174922 env[1266]: time="2024-12-13T14:26:20.174209862Z" level=info msg="StopPodSandbox for \"1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa\"" Dec 13 14:26:20.279793 env[1266]: 2024-12-13 14:26:20.244 [INFO][3757] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" Dec 13 14:26:20.279793 env[1266]: 2024-12-13 14:26:20.245 [INFO][3757] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" iface="eth0" netns="/var/run/netns/cni-0e518208-e53c-cba2-677b-7e70e1c40f2a" Dec 13 14:26:20.279793 env[1266]: 2024-12-13 14:26:20.245 [INFO][3757] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" iface="eth0" netns="/var/run/netns/cni-0e518208-e53c-cba2-677b-7e70e1c40f2a" Dec 13 14:26:20.279793 env[1266]: 2024-12-13 14:26:20.247 [INFO][3757] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" iface="eth0" netns="/var/run/netns/cni-0e518208-e53c-cba2-677b-7e70e1c40f2a" Dec 13 14:26:20.279793 env[1266]: 2024-12-13 14:26:20.247 [INFO][3757] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" Dec 13 14:26:20.279793 env[1266]: 2024-12-13 14:26:20.247 [INFO][3757] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" Dec 13 14:26:20.279793 env[1266]: 2024-12-13 14:26:20.272 [INFO][3769] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" HandleID="k8s-pod-network.1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" Workload="localhost-k8s-csi--node--driver--xlj8g-eth0" Dec 13 14:26:20.279793 env[1266]: 2024-12-13 14:26:20.272 [INFO][3769] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:26:20.279793 env[1266]: 2024-12-13 14:26:20.272 [INFO][3769] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:26:20.279793 env[1266]: 2024-12-13 14:26:20.276 [WARNING][3769] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" HandleID="k8s-pod-network.1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" Workload="localhost-k8s-csi--node--driver--xlj8g-eth0" Dec 13 14:26:20.279793 env[1266]: 2024-12-13 14:26:20.277 [INFO][3769] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" HandleID="k8s-pod-network.1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" Workload="localhost-k8s-csi--node--driver--xlj8g-eth0" Dec 13 14:26:20.279793 env[1266]: 2024-12-13 14:26:20.277 [INFO][3769] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:26:20.279793 env[1266]: 2024-12-13 14:26:20.278 [INFO][3757] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" Dec 13 14:26:20.282555 env[1266]: time="2024-12-13T14:26:20.281327214Z" level=info msg="TearDown network for sandbox \"1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa\" successfully" Dec 13 14:26:20.282555 env[1266]: time="2024-12-13T14:26:20.281348682Z" level=info msg="StopPodSandbox for \"1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa\" returns successfully" Dec 13 14:26:20.281248 systemd[1]: run-netns-cni\x2d0e518208\x2de53c\x2dcba2\x2d677b\x2d7e70e1c40f2a.mount: Deactivated successfully. Dec 13 14:26:20.282839 env[1266]: time="2024-12-13T14:26:20.282813364Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xlj8g,Uid:c89227ed-30a3-4f3d-ba16-397f58d31fe4,Namespace:calico-system,Attempt:1,}" Dec 13 14:26:20.285822 systemd-networkd[1061]: caliebedc0a3020: Gained IPv6LL Dec 13 14:26:20.296978 env[1266]: 2024-12-13 14:26:20.257 [INFO][3758] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" Dec 13 14:26:20.296978 env[1266]: 2024-12-13 14:26:20.257 [INFO][3758] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" iface="eth0" netns="/var/run/netns/cni-8e605862-d367-4b90-2358-f5faae59f290" Dec 13 14:26:20.296978 env[1266]: 2024-12-13 14:26:20.257 [INFO][3758] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" iface="eth0" netns="/var/run/netns/cni-8e605862-d367-4b90-2358-f5faae59f290" Dec 13 14:26:20.296978 env[1266]: 2024-12-13 14:26:20.257 [INFO][3758] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" iface="eth0" netns="/var/run/netns/cni-8e605862-d367-4b90-2358-f5faae59f290" Dec 13 14:26:20.296978 env[1266]: 2024-12-13 14:26:20.257 [INFO][3758] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" Dec 13 14:26:20.296978 env[1266]: 2024-12-13 14:26:20.257 [INFO][3758] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" Dec 13 14:26:20.296978 env[1266]: 2024-12-13 14:26:20.285 [INFO][3773] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" HandleID="k8s-pod-network.efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" Workload="localhost-k8s-calico--apiserver--7f96648886--5cszg-eth0" Dec 13 14:26:20.296978 env[1266]: 2024-12-13 14:26:20.285 [INFO][3773] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:26:20.296978 env[1266]: 2024-12-13 14:26:20.285 [INFO][3773] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:26:20.296978 env[1266]: 2024-12-13 14:26:20.293 [WARNING][3773] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" HandleID="k8s-pod-network.efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" Workload="localhost-k8s-calico--apiserver--7f96648886--5cszg-eth0" Dec 13 14:26:20.296978 env[1266]: 2024-12-13 14:26:20.293 [INFO][3773] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" HandleID="k8s-pod-network.efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" Workload="localhost-k8s-calico--apiserver--7f96648886--5cszg-eth0" Dec 13 14:26:20.296978 env[1266]: 2024-12-13 14:26:20.294 [INFO][3773] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:26:20.296978 env[1266]: 2024-12-13 14:26:20.295 [INFO][3758] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" Dec 13 14:26:20.298737 systemd[1]: run-netns-cni\x2d8e605862\x2dd367\x2d4b90\x2d2358\x2df5faae59f290.mount: Deactivated successfully. Dec 13 14:26:20.299995 env[1266]: time="2024-12-13T14:26:20.299973378Z" level=info msg="TearDown network for sandbox \"efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7\" successfully" Dec 13 14:26:20.300072 env[1266]: time="2024-12-13T14:26:20.300060481Z" level=info msg="StopPodSandbox for \"efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7\" returns successfully" Dec 13 14:26:20.300606 env[1266]: time="2024-12-13T14:26:20.300592643Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7f96648886-5cszg,Uid:08ed695d-459c-416f-9e4f-957f40c790c1,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:26:20.349635 systemd-networkd[1061]: calica78d6b3324: Gained IPv6LL Dec 13 14:26:20.386838 systemd-networkd[1061]: cali1f5b88f88b5: Link UP Dec 13 14:26:20.389065 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:26:20.389096 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1f5b88f88b5: link becomes ready Dec 13 14:26:20.388825 systemd-networkd[1061]: cali1f5b88f88b5: Gained carrier Dec 13 14:26:20.414407 env[1266]: 2024-12-13 14:26:20.326 [INFO][3782] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--xlj8g-eth0 csi-node-driver- calico-system c89227ed-30a3-4f3d-ba16-397f58d31fe4 758 0 2024-12-13 14:25:55 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-xlj8g eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali1f5b88f88b5 [] []}} ContainerID="053dd7232ddbb43fcab05de504379de52cb13b238d2133b4f21f45ede7397eab" Namespace="calico-system" Pod="csi-node-driver-xlj8g" WorkloadEndpoint="localhost-k8s-csi--node--driver--xlj8g-" Dec 13 14:26:20.414407 env[1266]: 2024-12-13 14:26:20.326 [INFO][3782] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="053dd7232ddbb43fcab05de504379de52cb13b238d2133b4f21f45ede7397eab" Namespace="calico-system" Pod="csi-node-driver-xlj8g" WorkloadEndpoint="localhost-k8s-csi--node--driver--xlj8g-eth0" Dec 13 14:26:20.414407 env[1266]: 2024-12-13 14:26:20.354 [INFO][3803] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="053dd7232ddbb43fcab05de504379de52cb13b238d2133b4f21f45ede7397eab" HandleID="k8s-pod-network.053dd7232ddbb43fcab05de504379de52cb13b238d2133b4f21f45ede7397eab" Workload="localhost-k8s-csi--node--driver--xlj8g-eth0" Dec 13 14:26:20.414407 env[1266]: 2024-12-13 14:26:20.359 [INFO][3803] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="053dd7232ddbb43fcab05de504379de52cb13b238d2133b4f21f45ede7397eab" HandleID="k8s-pod-network.053dd7232ddbb43fcab05de504379de52cb13b238d2133b4f21f45ede7397eab" Workload="localhost-k8s-csi--node--driver--xlj8g-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00033d540), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-xlj8g", "timestamp":"2024-12-13 14:26:20.354122394 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:26:20.414407 env[1266]: 2024-12-13 14:26:20.359 [INFO][3803] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:26:20.414407 env[1266]: 2024-12-13 14:26:20.359 [INFO][3803] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:26:20.414407 env[1266]: 2024-12-13 14:26:20.359 [INFO][3803] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:26:20.414407 env[1266]: 2024-12-13 14:26:20.360 [INFO][3803] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.053dd7232ddbb43fcab05de504379de52cb13b238d2133b4f21f45ede7397eab" host="localhost" Dec 13 14:26:20.414407 env[1266]: 2024-12-13 14:26:20.362 [INFO][3803] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:26:20.414407 env[1266]: 2024-12-13 14:26:20.364 [INFO][3803] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:26:20.414407 env[1266]: 2024-12-13 14:26:20.365 [INFO][3803] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:26:20.414407 env[1266]: 2024-12-13 14:26:20.366 [INFO][3803] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:26:20.414407 env[1266]: 2024-12-13 14:26:20.366 [INFO][3803] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.053dd7232ddbb43fcab05de504379de52cb13b238d2133b4f21f45ede7397eab" host="localhost" Dec 13 14:26:20.414407 env[1266]: 2024-12-13 14:26:20.367 [INFO][3803] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.053dd7232ddbb43fcab05de504379de52cb13b238d2133b4f21f45ede7397eab Dec 13 14:26:20.414407 env[1266]: 2024-12-13 14:26:20.369 [INFO][3803] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.053dd7232ddbb43fcab05de504379de52cb13b238d2133b4f21f45ede7397eab" host="localhost" Dec 13 14:26:20.414407 env[1266]: 2024-12-13 14:26:20.384 [INFO][3803] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.053dd7232ddbb43fcab05de504379de52cb13b238d2133b4f21f45ede7397eab" host="localhost" Dec 13 14:26:20.414407 env[1266]: 2024-12-13 14:26:20.384 [INFO][3803] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.053dd7232ddbb43fcab05de504379de52cb13b238d2133b4f21f45ede7397eab" host="localhost" Dec 13 14:26:20.414407 env[1266]: 2024-12-13 14:26:20.384 [INFO][3803] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:26:20.414407 env[1266]: 2024-12-13 14:26:20.384 [INFO][3803] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="053dd7232ddbb43fcab05de504379de52cb13b238d2133b4f21f45ede7397eab" HandleID="k8s-pod-network.053dd7232ddbb43fcab05de504379de52cb13b238d2133b4f21f45ede7397eab" Workload="localhost-k8s-csi--node--driver--xlj8g-eth0" Dec 13 14:26:20.414947 env[1266]: 2024-12-13 14:26:20.385 [INFO][3782] cni-plugin/k8s.go 386: Populated endpoint ContainerID="053dd7232ddbb43fcab05de504379de52cb13b238d2133b4f21f45ede7397eab" Namespace="calico-system" Pod="csi-node-driver-xlj8g" WorkloadEndpoint="localhost-k8s-csi--node--driver--xlj8g-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--xlj8g-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c89227ed-30a3-4f3d-ba16-397f58d31fe4", ResourceVersion:"758", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-xlj8g", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali1f5b88f88b5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:26:20.414947 env[1266]: 2024-12-13 14:26:20.385 [INFO][3782] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="053dd7232ddbb43fcab05de504379de52cb13b238d2133b4f21f45ede7397eab" Namespace="calico-system" Pod="csi-node-driver-xlj8g" WorkloadEndpoint="localhost-k8s-csi--node--driver--xlj8g-eth0" Dec 13 14:26:20.414947 env[1266]: 2024-12-13 14:26:20.385 [INFO][3782] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1f5b88f88b5 ContainerID="053dd7232ddbb43fcab05de504379de52cb13b238d2133b4f21f45ede7397eab" Namespace="calico-system" Pod="csi-node-driver-xlj8g" WorkloadEndpoint="localhost-k8s-csi--node--driver--xlj8g-eth0" Dec 13 14:26:20.414947 env[1266]: 2024-12-13 14:26:20.389 [INFO][3782] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="053dd7232ddbb43fcab05de504379de52cb13b238d2133b4f21f45ede7397eab" Namespace="calico-system" Pod="csi-node-driver-xlj8g" WorkloadEndpoint="localhost-k8s-csi--node--driver--xlj8g-eth0" Dec 13 14:26:20.414947 env[1266]: 2024-12-13 14:26:20.401 [INFO][3782] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="053dd7232ddbb43fcab05de504379de52cb13b238d2133b4f21f45ede7397eab" Namespace="calico-system" Pod="csi-node-driver-xlj8g" WorkloadEndpoint="localhost-k8s-csi--node--driver--xlj8g-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--xlj8g-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c89227ed-30a3-4f3d-ba16-397f58d31fe4", ResourceVersion:"758", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"053dd7232ddbb43fcab05de504379de52cb13b238d2133b4f21f45ede7397eab", Pod:"csi-node-driver-xlj8g", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali1f5b88f88b5", MAC:"2e:09:33:6a:53:60", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:26:20.414947 env[1266]: 2024-12-13 14:26:20.413 [INFO][3782] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="053dd7232ddbb43fcab05de504379de52cb13b238d2133b4f21f45ede7397eab" Namespace="calico-system" Pod="csi-node-driver-xlj8g" WorkloadEndpoint="localhost-k8s-csi--node--driver--xlj8g-eth0" Dec 13 14:26:20.428414 env[1266]: time="2024-12-13T14:26:20.428334706Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:26:20.428414 env[1266]: time="2024-12-13T14:26:20.428380729Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:26:20.428414 env[1266]: time="2024-12-13T14:26:20.428398524Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:26:20.428619 env[1266]: time="2024-12-13T14:26:20.428478128Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/053dd7232ddbb43fcab05de504379de52cb13b238d2133b4f21f45ede7397eab pid=3832 runtime=io.containerd.runc.v2 Dec 13 14:26:20.447109 systemd[1]: Started cri-containerd-053dd7232ddbb43fcab05de504379de52cb13b238d2133b4f21f45ede7397eab.scope. Dec 13 14:26:20.469890 systemd-networkd[1061]: calie49bb63c44b: Link UP Dec 13 14:26:20.472633 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie49bb63c44b: link becomes ready Dec 13 14:26:20.472325 systemd-networkd[1061]: calie49bb63c44b: Gained carrier Dec 13 14:26:20.478841 env[1266]: 2024-12-13 14:26:20.340 [INFO][3792] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--7f96648886--5cszg-eth0 calico-apiserver-7f96648886- calico-apiserver 08ed695d-459c-416f-9e4f-957f40c790c1 759 0 2024-12-13 14:25:54 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7f96648886 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-7f96648886-5cszg eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calie49bb63c44b [] []}} ContainerID="cc930126c7014b7d24c33470fac0de2093b9bf12ec9de4c1fc3b316213fe8e1b" Namespace="calico-apiserver" Pod="calico-apiserver-7f96648886-5cszg" WorkloadEndpoint="localhost-k8s-calico--apiserver--7f96648886--5cszg-" Dec 13 14:26:20.478841 env[1266]: 2024-12-13 14:26:20.340 [INFO][3792] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="cc930126c7014b7d24c33470fac0de2093b9bf12ec9de4c1fc3b316213fe8e1b" Namespace="calico-apiserver" Pod="calico-apiserver-7f96648886-5cszg" WorkloadEndpoint="localhost-k8s-calico--apiserver--7f96648886--5cszg-eth0" Dec 13 14:26:20.478841 env[1266]: 2024-12-13 14:26:20.375 [INFO][3810] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="cc930126c7014b7d24c33470fac0de2093b9bf12ec9de4c1fc3b316213fe8e1b" HandleID="k8s-pod-network.cc930126c7014b7d24c33470fac0de2093b9bf12ec9de4c1fc3b316213fe8e1b" Workload="localhost-k8s-calico--apiserver--7f96648886--5cszg-eth0" Dec 13 14:26:20.478841 env[1266]: 2024-12-13 14:26:20.403 [INFO][3810] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="cc930126c7014b7d24c33470fac0de2093b9bf12ec9de4c1fc3b316213fe8e1b" HandleID="k8s-pod-network.cc930126c7014b7d24c33470fac0de2093b9bf12ec9de4c1fc3b316213fe8e1b" Workload="localhost-k8s-calico--apiserver--7f96648886--5cszg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00033edb0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-7f96648886-5cszg", "timestamp":"2024-12-13 14:26:20.375803449 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:26:20.478841 env[1266]: 2024-12-13 14:26:20.403 [INFO][3810] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:26:20.478841 env[1266]: 2024-12-13 14:26:20.403 [INFO][3810] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:26:20.478841 env[1266]: 2024-12-13 14:26:20.403 [INFO][3810] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:26:20.478841 env[1266]: 2024-12-13 14:26:20.407 [INFO][3810] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.cc930126c7014b7d24c33470fac0de2093b9bf12ec9de4c1fc3b316213fe8e1b" host="localhost" Dec 13 14:26:20.478841 env[1266]: 2024-12-13 14:26:20.413 [INFO][3810] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:26:20.478841 env[1266]: 2024-12-13 14:26:20.421 [INFO][3810] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:26:20.478841 env[1266]: 2024-12-13 14:26:20.433 [INFO][3810] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:26:20.478841 env[1266]: 2024-12-13 14:26:20.435 [INFO][3810] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:26:20.478841 env[1266]: 2024-12-13 14:26:20.435 [INFO][3810] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.cc930126c7014b7d24c33470fac0de2093b9bf12ec9de4c1fc3b316213fe8e1b" host="localhost" Dec 13 14:26:20.478841 env[1266]: 2024-12-13 14:26:20.436 [INFO][3810] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.cc930126c7014b7d24c33470fac0de2093b9bf12ec9de4c1fc3b316213fe8e1b Dec 13 14:26:20.478841 env[1266]: 2024-12-13 14:26:20.453 [INFO][3810] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.cc930126c7014b7d24c33470fac0de2093b9bf12ec9de4c1fc3b316213fe8e1b" host="localhost" Dec 13 14:26:20.478841 env[1266]: 2024-12-13 14:26:20.463 [INFO][3810] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.cc930126c7014b7d24c33470fac0de2093b9bf12ec9de4c1fc3b316213fe8e1b" host="localhost" Dec 13 14:26:20.478841 env[1266]: 2024-12-13 14:26:20.463 [INFO][3810] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.cc930126c7014b7d24c33470fac0de2093b9bf12ec9de4c1fc3b316213fe8e1b" host="localhost" Dec 13 14:26:20.478841 env[1266]: 2024-12-13 14:26:20.463 [INFO][3810] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:26:20.478841 env[1266]: 2024-12-13 14:26:20.463 [INFO][3810] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="cc930126c7014b7d24c33470fac0de2093b9bf12ec9de4c1fc3b316213fe8e1b" HandleID="k8s-pod-network.cc930126c7014b7d24c33470fac0de2093b9bf12ec9de4c1fc3b316213fe8e1b" Workload="localhost-k8s-calico--apiserver--7f96648886--5cszg-eth0" Dec 13 14:26:20.479299 env[1266]: 2024-12-13 14:26:20.464 [INFO][3792] cni-plugin/k8s.go 386: Populated endpoint ContainerID="cc930126c7014b7d24c33470fac0de2093b9bf12ec9de4c1fc3b316213fe8e1b" Namespace="calico-apiserver" Pod="calico-apiserver-7f96648886-5cszg" WorkloadEndpoint="localhost-k8s-calico--apiserver--7f96648886--5cszg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7f96648886--5cszg-eth0", GenerateName:"calico-apiserver-7f96648886-", Namespace:"calico-apiserver", SelfLink:"", UID:"08ed695d-459c-416f-9e4f-957f40c790c1", ResourceVersion:"759", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7f96648886", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-7f96648886-5cszg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie49bb63c44b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:26:20.479299 env[1266]: 2024-12-13 14:26:20.464 [INFO][3792] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="cc930126c7014b7d24c33470fac0de2093b9bf12ec9de4c1fc3b316213fe8e1b" Namespace="calico-apiserver" Pod="calico-apiserver-7f96648886-5cszg" WorkloadEndpoint="localhost-k8s-calico--apiserver--7f96648886--5cszg-eth0" Dec 13 14:26:20.479299 env[1266]: 2024-12-13 14:26:20.464 [INFO][3792] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie49bb63c44b ContainerID="cc930126c7014b7d24c33470fac0de2093b9bf12ec9de4c1fc3b316213fe8e1b" Namespace="calico-apiserver" Pod="calico-apiserver-7f96648886-5cszg" WorkloadEndpoint="localhost-k8s-calico--apiserver--7f96648886--5cszg-eth0" Dec 13 14:26:20.479299 env[1266]: 2024-12-13 14:26:20.472 [INFO][3792] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="cc930126c7014b7d24c33470fac0de2093b9bf12ec9de4c1fc3b316213fe8e1b" Namespace="calico-apiserver" Pod="calico-apiserver-7f96648886-5cszg" WorkloadEndpoint="localhost-k8s-calico--apiserver--7f96648886--5cszg-eth0" Dec 13 14:26:20.479299 env[1266]: 2024-12-13 14:26:20.472 [INFO][3792] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="cc930126c7014b7d24c33470fac0de2093b9bf12ec9de4c1fc3b316213fe8e1b" Namespace="calico-apiserver" Pod="calico-apiserver-7f96648886-5cszg" WorkloadEndpoint="localhost-k8s-calico--apiserver--7f96648886--5cszg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7f96648886--5cszg-eth0", GenerateName:"calico-apiserver-7f96648886-", Namespace:"calico-apiserver", SelfLink:"", UID:"08ed695d-459c-416f-9e4f-957f40c790c1", ResourceVersion:"759", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7f96648886", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"cc930126c7014b7d24c33470fac0de2093b9bf12ec9de4c1fc3b316213fe8e1b", Pod:"calico-apiserver-7f96648886-5cszg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie49bb63c44b", MAC:"52:d3:df:4a:d4:7c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:26:20.479299 env[1266]: 2024-12-13 14:26:20.477 [INFO][3792] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="cc930126c7014b7d24c33470fac0de2093b9bf12ec9de4c1fc3b316213fe8e1b" Namespace="calico-apiserver" Pod="calico-apiserver-7f96648886-5cszg" WorkloadEndpoint="localhost-k8s-calico--apiserver--7f96648886--5cszg-eth0" Dec 13 14:26:20.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit: BPF prog-id=173 op=LOAD Dec 13 14:26:20.479000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[3843]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3832 pid=3843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:20.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035336464373233326464626234336663616230356465353034333739 Dec 13 14:26:20.479000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[3843]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3832 pid=3843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:20.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035336464373233326464626234336663616230356465353034333739 Dec 13 14:26:20.479000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit: BPF prog-id=174 op=LOAD Dec 13 14:26:20.479000 audit[3843]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002948d0 items=0 ppid=3832 pid=3843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:20.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035336464373233326464626234336663616230356465353034333739 Dec 13 14:26:20.479000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit: BPF prog-id=175 op=LOAD Dec 13 14:26:20.479000 audit[3843]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000294918 items=0 ppid=3832 pid=3843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:20.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035336464373233326464626234336663616230356465353034333739 Dec 13 14:26:20.479000 audit: BPF prog-id=175 op=UNLOAD Dec 13 14:26:20.479000 audit: BPF prog-id=174 op=UNLOAD Dec 13 14:26:20.479000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.479000 audit: BPF prog-id=176 op=LOAD Dec 13 14:26:20.479000 audit[3843]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000294d28 items=0 ppid=3832 pid=3843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:20.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035336464373233326464626234336663616230356465353034333739 Dec 13 14:26:20.485451 systemd-resolved[1191]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:26:20.495000 audit[3872]: NETFILTER_CFG table=filter:105 family=2 entries=38 op=nft_register_chain pid=3872 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:26:20.495000 audit[3872]: SYSCALL arch=c000003e syscall=46 success=yes exit=19828 a0=3 a1=7ffd77322be0 a2=0 a3=7ffd77322bcc items=0 ppid=3282 pid=3872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:20.495000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:26:20.498972 env[1266]: time="2024-12-13T14:26:20.498947989Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xlj8g,Uid:c89227ed-30a3-4f3d-ba16-397f58d31fe4,Namespace:calico-system,Attempt:1,} returns sandbox id \"053dd7232ddbb43fcab05de504379de52cb13b238d2133b4f21f45ede7397eab\"" Dec 13 14:26:20.502302 env[1266]: time="2024-12-13T14:26:20.502273777Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:26:20.502426 env[1266]: time="2024-12-13T14:26:20.502413287Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:26:20.502487 env[1266]: time="2024-12-13T14:26:20.502473972Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:26:20.502637 env[1266]: time="2024-12-13T14:26:20.502621934Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cc930126c7014b7d24c33470fac0de2093b9bf12ec9de4c1fc3b316213fe8e1b pid=3887 runtime=io.containerd.runc.v2 Dec 13 14:26:20.513000 audit[3904]: NETFILTER_CFG table=filter:106 family=2 entries=58 op=nft_register_chain pid=3904 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:26:20.513000 audit[3904]: SYSCALL arch=c000003e syscall=46 success=yes exit=29908 a0=3 a1=7ffe2b4c4530 a2=0 a3=7ffe2b4c451c items=0 ppid=3282 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:20.513000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:26:20.517318 systemd[1]: Started cri-containerd-cc930126c7014b7d24c33470fac0de2093b9bf12ec9de4c1fc3b316213fe8e1b.scope. Dec 13 14:26:20.522018 systemd[1]: run-containerd-runc-k8s.io-cc930126c7014b7d24c33470fac0de2093b9bf12ec9de4c1fc3b316213fe8e1b-runc.bulRr5.mount: Deactivated successfully. Dec 13 14:26:20.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.530000 audit: BPF prog-id=177 op=LOAD Dec 13 14:26:20.530000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.530000 audit[3896]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3887 pid=3896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:20.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363393330313236633730313462376432346333333437306661633064 Dec 13 14:26:20.530000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.530000 audit[3896]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3887 pid=3896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:20.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363393330313236633730313462376432346333333437306661633064 Dec 13 14:26:20.530000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.530000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.530000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.530000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.530000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.530000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.530000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.530000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.530000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.530000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.530000 audit: BPF prog-id=178 op=LOAD Dec 13 14:26:20.530000 audit[3896]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000308d30 items=0 ppid=3887 pid=3896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:20.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363393330313236633730313462376432346333333437306661633064 Dec 13 14:26:20.531000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.531000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.531000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.531000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.531000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.531000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.531000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.531000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.531000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.531000 audit: BPF prog-id=179 op=LOAD Dec 13 14:26:20.531000 audit[3896]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000308d78 items=0 ppid=3887 pid=3896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:20.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363393330313236633730313462376432346333333437306661633064 Dec 13 14:26:20.531000 audit: BPF prog-id=179 op=UNLOAD Dec 13 14:26:20.531000 audit: BPF prog-id=178 op=UNLOAD Dec 13 14:26:20.531000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.531000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.531000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.531000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.531000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.531000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.531000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.531000 audit[3896]: AVC avc: denied { perfmon } for pid=3896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.531000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.531000 audit[3896]: AVC avc: denied { bpf } for pid=3896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:20.531000 audit: BPF prog-id=180 op=LOAD Dec 13 14:26:20.531000 audit[3896]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000309188 items=0 ppid=3887 pid=3896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:20.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363393330313236633730313462376432346333333437306661633064 Dec 13 14:26:20.534126 systemd-resolved[1191]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:26:20.553073 env[1266]: time="2024-12-13T14:26:20.553043839Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7f96648886-5cszg,Uid:08ed695d-459c-416f-9e4f-957f40c790c1,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"cc930126c7014b7d24c33470fac0de2093b9bf12ec9de4c1fc3b316213fe8e1b\"" Dec 13 14:26:21.173936 env[1266]: time="2024-12-13T14:26:21.173908204Z" level=info msg="StopPodSandbox for \"f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94\"" Dec 13 14:26:21.187745 env[1266]: time="2024-12-13T14:26:21.187720716Z" level=info msg="StopPodSandbox for \"bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496\"" Dec 13 14:26:21.306656 env[1266]: 2024-12-13 14:26:21.261 [INFO][3950] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" Dec 13 14:26:21.306656 env[1266]: 2024-12-13 14:26:21.261 [INFO][3950] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" iface="eth0" netns="/var/run/netns/cni-a1ef33c0-9a8d-352b-1237-2e513e7870d9" Dec 13 14:26:21.306656 env[1266]: 2024-12-13 14:26:21.261 [INFO][3950] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" iface="eth0" netns="/var/run/netns/cni-a1ef33c0-9a8d-352b-1237-2e513e7870d9" Dec 13 14:26:21.306656 env[1266]: 2024-12-13 14:26:21.261 [INFO][3950] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" iface="eth0" netns="/var/run/netns/cni-a1ef33c0-9a8d-352b-1237-2e513e7870d9" Dec 13 14:26:21.306656 env[1266]: 2024-12-13 14:26:21.261 [INFO][3950] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" Dec 13 14:26:21.306656 env[1266]: 2024-12-13 14:26:21.261 [INFO][3950] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" Dec 13 14:26:21.306656 env[1266]: 2024-12-13 14:26:21.295 [INFO][3960] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" HandleID="k8s-pod-network.f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" Workload="localhost-k8s-coredns--76f75df574--cctsn-eth0" Dec 13 14:26:21.306656 env[1266]: 2024-12-13 14:26:21.295 [INFO][3960] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:26:21.306656 env[1266]: 2024-12-13 14:26:21.295 [INFO][3960] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:26:21.306656 env[1266]: 2024-12-13 14:26:21.299 [WARNING][3960] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" HandleID="k8s-pod-network.f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" Workload="localhost-k8s-coredns--76f75df574--cctsn-eth0" Dec 13 14:26:21.306656 env[1266]: 2024-12-13 14:26:21.299 [INFO][3960] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" HandleID="k8s-pod-network.f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" Workload="localhost-k8s-coredns--76f75df574--cctsn-eth0" Dec 13 14:26:21.306656 env[1266]: 2024-12-13 14:26:21.304 [INFO][3960] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:26:21.306656 env[1266]: 2024-12-13 14:26:21.305 [INFO][3950] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" Dec 13 14:26:21.307441 env[1266]: time="2024-12-13T14:26:21.307407771Z" level=info msg="TearDown network for sandbox \"f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94\" successfully" Dec 13 14:26:21.307493 env[1266]: time="2024-12-13T14:26:21.307481878Z" level=info msg="StopPodSandbox for \"f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94\" returns successfully" Dec 13 14:26:21.307937 env[1266]: time="2024-12-13T14:26:21.307923950Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-cctsn,Uid:da687174-0225-4e56-9019-2e2c03247268,Namespace:kube-system,Attempt:1,}" Dec 13 14:26:21.334790 env[1266]: 2024-12-13 14:26:21.280 [INFO][3951] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" Dec 13 14:26:21.334790 env[1266]: 2024-12-13 14:26:21.280 [INFO][3951] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" iface="eth0" netns="/var/run/netns/cni-d2afd26c-fda8-959e-c1bf-982bdfd2713f" Dec 13 14:26:21.334790 env[1266]: 2024-12-13 14:26:21.280 [INFO][3951] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" iface="eth0" netns="/var/run/netns/cni-d2afd26c-fda8-959e-c1bf-982bdfd2713f" Dec 13 14:26:21.334790 env[1266]: 2024-12-13 14:26:21.280 [INFO][3951] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" iface="eth0" netns="/var/run/netns/cni-d2afd26c-fda8-959e-c1bf-982bdfd2713f" Dec 13 14:26:21.334790 env[1266]: 2024-12-13 14:26:21.280 [INFO][3951] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" Dec 13 14:26:21.334790 env[1266]: 2024-12-13 14:26:21.280 [INFO][3951] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" Dec 13 14:26:21.334790 env[1266]: 2024-12-13 14:26:21.315 [INFO][3967] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" HandleID="k8s-pod-network.bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" Workload="localhost-k8s-calico--apiserver--7f96648886--kg7v7-eth0" Dec 13 14:26:21.334790 env[1266]: 2024-12-13 14:26:21.315 [INFO][3967] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:26:21.334790 env[1266]: 2024-12-13 14:26:21.315 [INFO][3967] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:26:21.334790 env[1266]: 2024-12-13 14:26:21.319 [WARNING][3967] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" HandleID="k8s-pod-network.bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" Workload="localhost-k8s-calico--apiserver--7f96648886--kg7v7-eth0" Dec 13 14:26:21.334790 env[1266]: 2024-12-13 14:26:21.319 [INFO][3967] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" HandleID="k8s-pod-network.bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" Workload="localhost-k8s-calico--apiserver--7f96648886--kg7v7-eth0" Dec 13 14:26:21.334790 env[1266]: 2024-12-13 14:26:21.321 [INFO][3967] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:26:21.334790 env[1266]: 2024-12-13 14:26:21.325 [INFO][3951] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" Dec 13 14:26:21.335312 env[1266]: time="2024-12-13T14:26:21.335289228Z" level=info msg="TearDown network for sandbox \"bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496\" successfully" Dec 13 14:26:21.335372 env[1266]: time="2024-12-13T14:26:21.335360496Z" level=info msg="StopPodSandbox for \"bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496\" returns successfully" Dec 13 14:26:21.335738 env[1266]: time="2024-12-13T14:26:21.335725231Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7f96648886-kg7v7,Uid:8213859f-6e9b-422f-8e3b-bd8bf68e0801,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:26:21.423505 systemd-networkd[1061]: cali1484bdfad90: Link UP Dec 13 14:26:21.425868 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:26:21.425913 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1484bdfad90: link becomes ready Dec 13 14:26:21.425781 systemd-networkd[1061]: cali1484bdfad90: Gained carrier Dec 13 14:26:21.441585 env[1266]: 2024-12-13 14:26:21.351 [INFO][3975] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--76f75df574--cctsn-eth0 coredns-76f75df574- kube-system da687174-0225-4e56-9019-2e2c03247268 773 0 2024-12-13 14:25:47 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-76f75df574-cctsn eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali1484bdfad90 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="18dd69618b9982ca094f3fd6a3634cd39026f7b9b1e555de1342e7953afbae0b" Namespace="kube-system" Pod="coredns-76f75df574-cctsn" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--cctsn-" Dec 13 14:26:21.441585 env[1266]: 2024-12-13 14:26:21.352 [INFO][3975] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="18dd69618b9982ca094f3fd6a3634cd39026f7b9b1e555de1342e7953afbae0b" Namespace="kube-system" Pod="coredns-76f75df574-cctsn" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--cctsn-eth0" Dec 13 14:26:21.441585 env[1266]: 2024-12-13 14:26:21.401 [INFO][3990] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="18dd69618b9982ca094f3fd6a3634cd39026f7b9b1e555de1342e7953afbae0b" HandleID="k8s-pod-network.18dd69618b9982ca094f3fd6a3634cd39026f7b9b1e555de1342e7953afbae0b" Workload="localhost-k8s-coredns--76f75df574--cctsn-eth0" Dec 13 14:26:21.441585 env[1266]: 2024-12-13 14:26:21.405 [INFO][3990] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="18dd69618b9982ca094f3fd6a3634cd39026f7b9b1e555de1342e7953afbae0b" HandleID="k8s-pod-network.18dd69618b9982ca094f3fd6a3634cd39026f7b9b1e555de1342e7953afbae0b" Workload="localhost-k8s-coredns--76f75df574--cctsn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000310ea0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-76f75df574-cctsn", "timestamp":"2024-12-13 14:26:21.401091725 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:26:21.441585 env[1266]: 2024-12-13 14:26:21.406 [INFO][3990] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:26:21.441585 env[1266]: 2024-12-13 14:26:21.406 [INFO][3990] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:26:21.441585 env[1266]: 2024-12-13 14:26:21.406 [INFO][3990] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:26:21.441585 env[1266]: 2024-12-13 14:26:21.408 [INFO][3990] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.18dd69618b9982ca094f3fd6a3634cd39026f7b9b1e555de1342e7953afbae0b" host="localhost" Dec 13 14:26:21.441585 env[1266]: 2024-12-13 14:26:21.410 [INFO][3990] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:26:21.441585 env[1266]: 2024-12-13 14:26:21.412 [INFO][3990] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:26:21.441585 env[1266]: 2024-12-13 14:26:21.413 [INFO][3990] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:26:21.441585 env[1266]: 2024-12-13 14:26:21.414 [INFO][3990] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:26:21.441585 env[1266]: 2024-12-13 14:26:21.414 [INFO][3990] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.18dd69618b9982ca094f3fd6a3634cd39026f7b9b1e555de1342e7953afbae0b" host="localhost" Dec 13 14:26:21.441585 env[1266]: 2024-12-13 14:26:21.414 [INFO][3990] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.18dd69618b9982ca094f3fd6a3634cd39026f7b9b1e555de1342e7953afbae0b Dec 13 14:26:21.441585 env[1266]: 2024-12-13 14:26:21.416 [INFO][3990] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.18dd69618b9982ca094f3fd6a3634cd39026f7b9b1e555de1342e7953afbae0b" host="localhost" Dec 13 14:26:21.441585 env[1266]: 2024-12-13 14:26:21.419 [INFO][3990] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.18dd69618b9982ca094f3fd6a3634cd39026f7b9b1e555de1342e7953afbae0b" host="localhost" Dec 13 14:26:21.441585 env[1266]: 2024-12-13 14:26:21.419 [INFO][3990] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.18dd69618b9982ca094f3fd6a3634cd39026f7b9b1e555de1342e7953afbae0b" host="localhost" Dec 13 14:26:21.441585 env[1266]: 2024-12-13 14:26:21.419 [INFO][3990] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:26:21.441585 env[1266]: 2024-12-13 14:26:21.419 [INFO][3990] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="18dd69618b9982ca094f3fd6a3634cd39026f7b9b1e555de1342e7953afbae0b" HandleID="k8s-pod-network.18dd69618b9982ca094f3fd6a3634cd39026f7b9b1e555de1342e7953afbae0b" Workload="localhost-k8s-coredns--76f75df574--cctsn-eth0" Dec 13 14:26:21.442169 env[1266]: 2024-12-13 14:26:21.420 [INFO][3975] cni-plugin/k8s.go 386: Populated endpoint ContainerID="18dd69618b9982ca094f3fd6a3634cd39026f7b9b1e555de1342e7953afbae0b" Namespace="kube-system" Pod="coredns-76f75df574-cctsn" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--cctsn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--cctsn-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"da687174-0225-4e56-9019-2e2c03247268", ResourceVersion:"773", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-76f75df574-cctsn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1484bdfad90", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:26:21.442169 env[1266]: 2024-12-13 14:26:21.420 [INFO][3975] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="18dd69618b9982ca094f3fd6a3634cd39026f7b9b1e555de1342e7953afbae0b" Namespace="kube-system" Pod="coredns-76f75df574-cctsn" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--cctsn-eth0" Dec 13 14:26:21.442169 env[1266]: 2024-12-13 14:26:21.420 [INFO][3975] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1484bdfad90 ContainerID="18dd69618b9982ca094f3fd6a3634cd39026f7b9b1e555de1342e7953afbae0b" Namespace="kube-system" Pod="coredns-76f75df574-cctsn" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--cctsn-eth0" Dec 13 14:26:21.442169 env[1266]: 2024-12-13 14:26:21.426 [INFO][3975] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="18dd69618b9982ca094f3fd6a3634cd39026f7b9b1e555de1342e7953afbae0b" Namespace="kube-system" Pod="coredns-76f75df574-cctsn" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--cctsn-eth0" Dec 13 14:26:21.442169 env[1266]: 2024-12-13 14:26:21.427 [INFO][3975] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="18dd69618b9982ca094f3fd6a3634cd39026f7b9b1e555de1342e7953afbae0b" Namespace="kube-system" Pod="coredns-76f75df574-cctsn" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--cctsn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--cctsn-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"da687174-0225-4e56-9019-2e2c03247268", ResourceVersion:"773", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"18dd69618b9982ca094f3fd6a3634cd39026f7b9b1e555de1342e7953afbae0b", Pod:"coredns-76f75df574-cctsn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1484bdfad90", MAC:"a6:e1:2e:77:69:4c", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:26:21.442169 env[1266]: 2024-12-13 14:26:21.438 [INFO][3975] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="18dd69618b9982ca094f3fd6a3634cd39026f7b9b1e555de1342e7953afbae0b" Namespace="kube-system" Pod="coredns-76f75df574-cctsn" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--cctsn-eth0" Dec 13 14:26:21.462000 audit[4026]: NETFILTER_CFG table=filter:107 family=2 entries=44 op=nft_register_chain pid=4026 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:26:21.462000 audit[4026]: SYSCALL arch=c000003e syscall=46 success=yes exit=22244 a0=3 a1=7fff3675f8f0 a2=0 a3=7fff3675f8dc items=0 ppid=3282 pid=4026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:21.462000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:26:21.473057 systemd-networkd[1061]: calif0761948940: Link UP Dec 13 14:26:21.474870 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif0761948940: link becomes ready Dec 13 14:26:21.474626 systemd-networkd[1061]: calif0761948940: Gained carrier Dec 13 14:26:21.483771 systemd[1]: run-netns-cni\x2dd2afd26c\x2dfda8\x2d959e\x2dc1bf\x2d982bdfd2713f.mount: Deactivated successfully. Dec 13 14:26:21.483822 systemd[1]: run-netns-cni\x2da1ef33c0\x2d9a8d\x2d352b\x2d1237\x2d2e513e7870d9.mount: Deactivated successfully. Dec 13 14:26:21.492597 env[1266]: 2024-12-13 14:26:21.388 [INFO][3988] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--7f96648886--kg7v7-eth0 calico-apiserver-7f96648886- calico-apiserver 8213859f-6e9b-422f-8e3b-bd8bf68e0801 774 0 2024-12-13 14:25:54 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7f96648886 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-7f96648886-kg7v7 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calif0761948940 [] []}} ContainerID="edbe340a292cc547db09f8a0871647aaf9a60e04b7a840c09d21f362e60f0bfc" Namespace="calico-apiserver" Pod="calico-apiserver-7f96648886-kg7v7" WorkloadEndpoint="localhost-k8s-calico--apiserver--7f96648886--kg7v7-" Dec 13 14:26:21.492597 env[1266]: 2024-12-13 14:26:21.388 [INFO][3988] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="edbe340a292cc547db09f8a0871647aaf9a60e04b7a840c09d21f362e60f0bfc" Namespace="calico-apiserver" Pod="calico-apiserver-7f96648886-kg7v7" WorkloadEndpoint="localhost-k8s-calico--apiserver--7f96648886--kg7v7-eth0" Dec 13 14:26:21.492597 env[1266]: 2024-12-13 14:26:21.427 [INFO][4005] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="edbe340a292cc547db09f8a0871647aaf9a60e04b7a840c09d21f362e60f0bfc" HandleID="k8s-pod-network.edbe340a292cc547db09f8a0871647aaf9a60e04b7a840c09d21f362e60f0bfc" Workload="localhost-k8s-calico--apiserver--7f96648886--kg7v7-eth0" Dec 13 14:26:21.492597 env[1266]: 2024-12-13 14:26:21.444 [INFO][4005] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="edbe340a292cc547db09f8a0871647aaf9a60e04b7a840c09d21f362e60f0bfc" HandleID="k8s-pod-network.edbe340a292cc547db09f8a0871647aaf9a60e04b7a840c09d21f362e60f0bfc" Workload="localhost-k8s-calico--apiserver--7f96648886--kg7v7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000050d50), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-7f96648886-kg7v7", "timestamp":"2024-12-13 14:26:21.427450758 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:26:21.492597 env[1266]: 2024-12-13 14:26:21.444 [INFO][4005] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:26:21.492597 env[1266]: 2024-12-13 14:26:21.444 [INFO][4005] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:26:21.492597 env[1266]: 2024-12-13 14:26:21.444 [INFO][4005] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:26:21.492597 env[1266]: 2024-12-13 14:26:21.447 [INFO][4005] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.edbe340a292cc547db09f8a0871647aaf9a60e04b7a840c09d21f362e60f0bfc" host="localhost" Dec 13 14:26:21.492597 env[1266]: 2024-12-13 14:26:21.455 [INFO][4005] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:26:21.492597 env[1266]: 2024-12-13 14:26:21.460 [INFO][4005] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:26:21.492597 env[1266]: 2024-12-13 14:26:21.461 [INFO][4005] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:26:21.492597 env[1266]: 2024-12-13 14:26:21.463 [INFO][4005] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:26:21.492597 env[1266]: 2024-12-13 14:26:21.463 [INFO][4005] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.edbe340a292cc547db09f8a0871647aaf9a60e04b7a840c09d21f362e60f0bfc" host="localhost" Dec 13 14:26:21.492597 env[1266]: 2024-12-13 14:26:21.464 [INFO][4005] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.edbe340a292cc547db09f8a0871647aaf9a60e04b7a840c09d21f362e60f0bfc Dec 13 14:26:21.492597 env[1266]: 2024-12-13 14:26:21.467 [INFO][4005] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.edbe340a292cc547db09f8a0871647aaf9a60e04b7a840c09d21f362e60f0bfc" host="localhost" Dec 13 14:26:21.492597 env[1266]: 2024-12-13 14:26:21.470 [INFO][4005] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.edbe340a292cc547db09f8a0871647aaf9a60e04b7a840c09d21f362e60f0bfc" host="localhost" Dec 13 14:26:21.492597 env[1266]: 2024-12-13 14:26:21.470 [INFO][4005] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.edbe340a292cc547db09f8a0871647aaf9a60e04b7a840c09d21f362e60f0bfc" host="localhost" Dec 13 14:26:21.492597 env[1266]: 2024-12-13 14:26:21.470 [INFO][4005] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:26:21.492597 env[1266]: 2024-12-13 14:26:21.470 [INFO][4005] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="edbe340a292cc547db09f8a0871647aaf9a60e04b7a840c09d21f362e60f0bfc" HandleID="k8s-pod-network.edbe340a292cc547db09f8a0871647aaf9a60e04b7a840c09d21f362e60f0bfc" Workload="localhost-k8s-calico--apiserver--7f96648886--kg7v7-eth0" Dec 13 14:26:21.493054 env[1266]: 2024-12-13 14:26:21.471 [INFO][3988] cni-plugin/k8s.go 386: Populated endpoint ContainerID="edbe340a292cc547db09f8a0871647aaf9a60e04b7a840c09d21f362e60f0bfc" Namespace="calico-apiserver" Pod="calico-apiserver-7f96648886-kg7v7" WorkloadEndpoint="localhost-k8s-calico--apiserver--7f96648886--kg7v7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7f96648886--kg7v7-eth0", GenerateName:"calico-apiserver-7f96648886-", Namespace:"calico-apiserver", SelfLink:"", UID:"8213859f-6e9b-422f-8e3b-bd8bf68e0801", ResourceVersion:"774", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7f96648886", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-7f96648886-kg7v7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif0761948940", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:26:21.493054 env[1266]: 2024-12-13 14:26:21.471 [INFO][3988] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="edbe340a292cc547db09f8a0871647aaf9a60e04b7a840c09d21f362e60f0bfc" Namespace="calico-apiserver" Pod="calico-apiserver-7f96648886-kg7v7" WorkloadEndpoint="localhost-k8s-calico--apiserver--7f96648886--kg7v7-eth0" Dec 13 14:26:21.493054 env[1266]: 2024-12-13 14:26:21.471 [INFO][3988] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif0761948940 ContainerID="edbe340a292cc547db09f8a0871647aaf9a60e04b7a840c09d21f362e60f0bfc" Namespace="calico-apiserver" Pod="calico-apiserver-7f96648886-kg7v7" WorkloadEndpoint="localhost-k8s-calico--apiserver--7f96648886--kg7v7-eth0" Dec 13 14:26:21.493054 env[1266]: 2024-12-13 14:26:21.475 [INFO][3988] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="edbe340a292cc547db09f8a0871647aaf9a60e04b7a840c09d21f362e60f0bfc" Namespace="calico-apiserver" Pod="calico-apiserver-7f96648886-kg7v7" WorkloadEndpoint="localhost-k8s-calico--apiserver--7f96648886--kg7v7-eth0" Dec 13 14:26:21.493054 env[1266]: 2024-12-13 14:26:21.479 [INFO][3988] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="edbe340a292cc547db09f8a0871647aaf9a60e04b7a840c09d21f362e60f0bfc" Namespace="calico-apiserver" Pod="calico-apiserver-7f96648886-kg7v7" WorkloadEndpoint="localhost-k8s-calico--apiserver--7f96648886--kg7v7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7f96648886--kg7v7-eth0", GenerateName:"calico-apiserver-7f96648886-", Namespace:"calico-apiserver", SelfLink:"", UID:"8213859f-6e9b-422f-8e3b-bd8bf68e0801", ResourceVersion:"774", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7f96648886", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"edbe340a292cc547db09f8a0871647aaf9a60e04b7a840c09d21f362e60f0bfc", Pod:"calico-apiserver-7f96648886-kg7v7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif0761948940", MAC:"7e:f8:b6:de:58:ce", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:26:21.493054 env[1266]: 2024-12-13 14:26:21.490 [INFO][3988] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="edbe340a292cc547db09f8a0871647aaf9a60e04b7a840c09d21f362e60f0bfc" Namespace="calico-apiserver" Pod="calico-apiserver-7f96648886-kg7v7" WorkloadEndpoint="localhost-k8s-calico--apiserver--7f96648886--kg7v7-eth0" Dec 13 14:26:21.496722 env[1266]: time="2024-12-13T14:26:21.495140890Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:26:21.496722 env[1266]: time="2024-12-13T14:26:21.495167475Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:26:21.496722 env[1266]: time="2024-12-13T14:26:21.495174221Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:26:21.496722 env[1266]: time="2024-12-13T14:26:21.495819380Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/18dd69618b9982ca094f3fd6a3634cd39026f7b9b1e555de1342e7953afbae0b pid=4034 runtime=io.containerd.runc.v2 Dec 13 14:26:21.498000 audit[4048]: NETFILTER_CFG table=filter:108 family=2 entries=42 op=nft_register_chain pid=4048 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:26:21.498000 audit[4048]: SYSCALL arch=c000003e syscall=46 success=yes exit=22672 a0=3 a1=7ffcf13157d0 a2=0 a3=7ffcf13157bc items=0 ppid=3282 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:21.498000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:26:21.513267 systemd[1]: run-containerd-runc-k8s.io-18dd69618b9982ca094f3fd6a3634cd39026f7b9b1e555de1342e7953afbae0b-runc.e6BnRf.mount: Deactivated successfully. Dec 13 14:26:21.514638 systemd[1]: Started cri-containerd-18dd69618b9982ca094f3fd6a3634cd39026f7b9b1e555de1342e7953afbae0b.scope. Dec 13 14:26:21.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit: BPF prog-id=181 op=LOAD Dec 13 14:26:21.524000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[4051]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4034 pid=4051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:21.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138646436393631386239393832636130393466336664366133363334 Dec 13 14:26:21.524000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[4051]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=4034 pid=4051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:21.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138646436393631386239393832636130393466336664366133363334 Dec 13 14:26:21.524000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit: BPF prog-id=182 op=LOAD Dec 13 14:26:21.524000 audit[4051]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003bc0e0 items=0 ppid=4034 pid=4051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:21.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138646436393631386239393832636130393466336664366133363334 Dec 13 14:26:21.524000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit: BPF prog-id=183 op=LOAD Dec 13 14:26:21.524000 audit[4051]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003bc128 items=0 ppid=4034 pid=4051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:21.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138646436393631386239393832636130393466336664366133363334 Dec 13 14:26:21.524000 audit: BPF prog-id=183 op=UNLOAD Dec 13 14:26:21.524000 audit: BPF prog-id=182 op=UNLOAD Dec 13 14:26:21.524000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.524000 audit: BPF prog-id=184 op=LOAD Dec 13 14:26:21.524000 audit[4051]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003bc538 items=0 ppid=4034 pid=4051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:21.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138646436393631386239393832636130393466336664366133363334 Dec 13 14:26:21.527176 systemd-resolved[1191]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:26:21.537459 env[1266]: time="2024-12-13T14:26:21.537421511Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:26:21.537519 env[1266]: time="2024-12-13T14:26:21.537473300Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:26:21.537519 env[1266]: time="2024-12-13T14:26:21.537493700Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:26:21.537599 env[1266]: time="2024-12-13T14:26:21.537574642Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/edbe340a292cc547db09f8a0871647aaf9a60e04b7a840c09d21f362e60f0bfc pid=4078 runtime=io.containerd.runc.v2 Dec 13 14:26:21.564907 systemd[1]: Started cri-containerd-edbe340a292cc547db09f8a0871647aaf9a60e04b7a840c09d21f362e60f0bfc.scope. Dec 13 14:26:21.569016 env[1266]: time="2024-12-13T14:26:21.567971793Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-cctsn,Uid:da687174-0225-4e56-9019-2e2c03247268,Namespace:kube-system,Attempt:1,} returns sandbox id \"18dd69618b9982ca094f3fd6a3634cd39026f7b9b1e555de1342e7953afbae0b\"" Dec 13 14:26:21.572214 env[1266]: time="2024-12-13T14:26:21.571497610Z" level=info msg="CreateContainer within sandbox \"18dd69618b9982ca094f3fd6a3634cd39026f7b9b1e555de1342e7953afbae0b\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:26:21.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.574000 audit: BPF prog-id=185 op=LOAD Dec 13 14:26:21.575000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.575000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4078 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:21.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564626533343061323932636335343764623039663861303837313634 Dec 13 14:26:21.575000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.575000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4078 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:21.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564626533343061323932636335343764623039663861303837313634 Dec 13 14:26:21.575000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.575000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.575000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.575000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.575000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.575000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.575000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.575000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.575000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.575000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.575000 audit: BPF prog-id=186 op=LOAD Dec 13 14:26:21.575000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003da430 items=0 ppid=4078 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:21.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564626533343061323932636335343764623039663861303837313634 Dec 13 14:26:21.575000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.575000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.575000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.575000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.575000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.575000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.575000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.575000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.575000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.575000 audit: BPF prog-id=187 op=LOAD Dec 13 14:26:21.575000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003da478 items=0 ppid=4078 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:21.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564626533343061323932636335343764623039663861303837313634 Dec 13 14:26:21.575000 audit: BPF prog-id=187 op=UNLOAD Dec 13 14:26:21.575000 audit: BPF prog-id=186 op=UNLOAD Dec 13 14:26:21.575000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.575000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.575000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.575000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.575000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.575000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.575000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.575000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.575000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.575000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.575000 audit: BPF prog-id=188 op=LOAD Dec 13 14:26:21.575000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003da888 items=0 ppid=4078 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:21.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564626533343061323932636335343764623039663861303837313634 Dec 13 14:26:21.578395 systemd-resolved[1191]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:26:21.603655 env[1266]: time="2024-12-13T14:26:21.603630035Z" level=info msg="CreateContainer within sandbox \"18dd69618b9982ca094f3fd6a3634cd39026f7b9b1e555de1342e7953afbae0b\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"8bbb045a520c954047ab194f068e758365794718d067f17748d58afd261bbf20\"" Dec 13 14:26:21.605162 env[1266]: time="2024-12-13T14:26:21.605147813Z" level=info msg="StartContainer for \"8bbb045a520c954047ab194f068e758365794718d067f17748d58afd261bbf20\"" Dec 13 14:26:21.609056 env[1266]: time="2024-12-13T14:26:21.609037640Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7f96648886-kg7v7,Uid:8213859f-6e9b-422f-8e3b-bd8bf68e0801,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"edbe340a292cc547db09f8a0871647aaf9a60e04b7a840c09d21f362e60f0bfc\"" Dec 13 14:26:21.623240 systemd[1]: Started cri-containerd-8bbb045a520c954047ab194f068e758365794718d067f17748d58afd261bbf20.scope. Dec 13 14:26:21.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.628000 audit: BPF prog-id=189 op=LOAD Dec 13 14:26:21.628000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.628000 audit[4126]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4034 pid=4126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:21.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862626230343561353230633935343034376162313934663036386537 Dec 13 14:26:21.628000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.628000 audit[4126]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=4034 pid=4126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:21.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862626230343561353230633935343034376162313934663036386537 Dec 13 14:26:21.628000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.628000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.628000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.628000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.628000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.628000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.628000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.628000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.628000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.628000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.628000 audit: BPF prog-id=190 op=LOAD Dec 13 14:26:21.628000 audit[4126]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00039e210 items=0 ppid=4034 pid=4126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:21.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862626230343561353230633935343034376162313934663036386537 Dec 13 14:26:21.628000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.628000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.628000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.628000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.628000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.628000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.628000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.628000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.628000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.628000 audit: BPF prog-id=191 op=LOAD Dec 13 14:26:21.628000 audit[4126]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00039e258 items=0 ppid=4034 pid=4126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:21.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862626230343561353230633935343034376162313934663036386537 Dec 13 14:26:21.628000 audit: BPF prog-id=191 op=UNLOAD Dec 13 14:26:21.628000 audit: BPF prog-id=190 op=UNLOAD Dec 13 14:26:21.629000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.629000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.629000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.629000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.629000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.629000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.629000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.629000 audit[4126]: AVC avc: denied { perfmon } for pid=4126 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.629000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.629000 audit[4126]: AVC avc: denied { bpf } for pid=4126 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.629000 audit: BPF prog-id=192 op=LOAD Dec 13 14:26:21.629000 audit[4126]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00039e668 items=0 ppid=4034 pid=4126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:21.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862626230343561353230633935343034376162313934663036386537 Dec 13 14:26:21.639748 env[1266]: time="2024-12-13T14:26:21.639712647Z" level=info msg="StartContainer for \"8bbb045a520c954047ab194f068e758365794718d067f17748d58afd261bbf20\" returns successfully" Dec 13 14:26:21.821705 systemd-networkd[1061]: calie49bb63c44b: Gained IPv6LL Dec 13 14:26:21.896508 env[1266]: time="2024-12-13T14:26:21.896470989Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:21.897448 env[1266]: time="2024-12-13T14:26:21.897426037Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:21.898644 env[1266]: time="2024-12-13T14:26:21.898628460Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:21.899397 env[1266]: time="2024-12-13T14:26:21.899382718Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:21.899931 env[1266]: time="2024-12-13T14:26:21.899909185Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 14:26:21.900345 env[1266]: time="2024-12-13T14:26:21.900323028Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:26:21.907074 env[1266]: time="2024-12-13T14:26:21.907055781Z" level=info msg="CreateContainer within sandbox \"590c21849d3457913d3999dde0f3ee956e0a5250804551affd717525fc7eb958\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 14:26:21.912685 env[1266]: time="2024-12-13T14:26:21.912670512Z" level=info msg="CreateContainer within sandbox \"590c21849d3457913d3999dde0f3ee956e0a5250804551affd717525fc7eb958\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"4dea773aebc517ea91ff75ece6a4172992de97da82e0f3edf2b8427e2f93c2c3\"" Dec 13 14:26:21.913162 env[1266]: time="2024-12-13T14:26:21.913141494Z" level=info msg="StartContainer for \"4dea773aebc517ea91ff75ece6a4172992de97da82e0f3edf2b8427e2f93c2c3\"" Dec 13 14:26:21.928492 systemd[1]: Started cri-containerd-4dea773aebc517ea91ff75ece6a4172992de97da82e0f3edf2b8427e2f93c2c3.scope. Dec 13 14:26:21.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.947000 audit: BPF prog-id=193 op=LOAD Dec 13 14:26:21.948000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.948000 audit[4167]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3686 pid=4167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:21.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464656137373361656263353137656139316666373565636536613431 Dec 13 14:26:21.948000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.948000 audit[4167]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3686 pid=4167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:21.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464656137373361656263353137656139316666373565636536613431 Dec 13 14:26:21.948000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.948000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.948000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.948000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.948000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.948000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.948000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.948000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.948000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.948000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.948000 audit: BPF prog-id=194 op=LOAD Dec 13 14:26:21.948000 audit[4167]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002515c0 items=0 ppid=3686 pid=4167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:21.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464656137373361656263353137656139316666373565636536613431 Dec 13 14:26:21.949000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.949000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.949000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.949000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.949000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.949000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.949000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.949000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.949000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.949000 audit: BPF prog-id=195 op=LOAD Dec 13 14:26:21.949000 audit[4167]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000251608 items=0 ppid=3686 pid=4167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:21.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464656137373361656263353137656139316666373565636536613431 Dec 13 14:26:21.949000 audit: BPF prog-id=195 op=UNLOAD Dec 13 14:26:21.949000 audit: BPF prog-id=194 op=UNLOAD Dec 13 14:26:21.949000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.949000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.949000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.949000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.949000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.949000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.949000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.949000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.949000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.949000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:21.949000 audit: BPF prog-id=196 op=LOAD Dec 13 14:26:21.949000 audit[4167]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000251a18 items=0 ppid=3686 pid=4167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:21.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464656137373361656263353137656139316666373565636536613431 Dec 13 14:26:21.976273 env[1266]: time="2024-12-13T14:26:21.976242911Z" level=info msg="StartContainer for \"4dea773aebc517ea91ff75ece6a4172992de97da82e0f3edf2b8427e2f93c2c3\" returns successfully" Dec 13 14:26:22.077639 systemd-networkd[1061]: cali1f5b88f88b5: Gained IPv6LL Dec 13 14:26:22.403637 kubelet[2200]: I1213 14:26:22.403568 2200 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-cctsn" podStartSLOduration=35.403531959 podStartE2EDuration="35.403531959s" podCreationTimestamp="2024-12-13 14:25:47 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:26:22.403402249 +0000 UTC m=+46.395742322" watchObservedRunningTime="2024-12-13 14:26:22.403531959 +0000 UTC m=+46.395872030" Dec 13 14:26:22.415000 audit[4194]: NETFILTER_CFG table=filter:109 family=2 entries=10 op=nft_register_rule pid=4194 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:22.415000 audit[4194]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe47b9cda0 a2=0 a3=7ffe47b9cd8c items=0 ppid=2331 pid=4194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:22.415000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:22.418000 audit[4194]: NETFILTER_CFG table=nat:110 family=2 entries=44 op=nft_register_rule pid=4194 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:22.418000 audit[4194]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe47b9cda0 a2=0 a3=7ffe47b9cd8c items=0 ppid=2331 pid=4194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:22.418000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:22.452000 audit[4208]: NETFILTER_CFG table=filter:111 family=2 entries=10 op=nft_register_rule pid=4208 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:22.452000 audit[4208]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe4563cae0 a2=0 a3=7ffe4563cacc items=0 ppid=2331 pid=4208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:22.452000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:22.465000 audit[4208]: NETFILTER_CFG table=nat:112 family=2 entries=56 op=nft_register_chain pid=4208 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:22.465000 audit[4208]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffe4563cae0 a2=0 a3=7ffe4563cacc items=0 ppid=2331 pid=4208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:22.465000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:22.492981 kubelet[2200]: I1213 14:26:22.492841 2200 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-d4bb8cc5-fkhpg" podStartSLOduration=24.971114296 podStartE2EDuration="27.492814288s" podCreationTimestamp="2024-12-13 14:25:55 +0000 UTC" firstStartedPulling="2024-12-13 14:26:19.378448414 +0000 UTC m=+43.370788476" lastFinishedPulling="2024-12-13 14:26:21.9001484 +0000 UTC m=+45.892488468" observedRunningTime="2024-12-13 14:26:22.440772639 +0000 UTC m=+46.433112713" watchObservedRunningTime="2024-12-13 14:26:22.492814288 +0000 UTC m=+46.485154357" Dec 13 14:26:22.525667 systemd-networkd[1061]: cali1484bdfad90: Gained IPv6LL Dec 13 14:26:23.485714 systemd-networkd[1061]: calif0761948940: Gained IPv6LL Dec 13 14:26:23.658020 env[1266]: time="2024-12-13T14:26:23.657981091Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:23.659121 env[1266]: time="2024-12-13T14:26:23.658929402Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:23.660026 env[1266]: time="2024-12-13T14:26:23.659836472Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:23.661090 env[1266]: time="2024-12-13T14:26:23.660858965Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:23.661280 env[1266]: time="2024-12-13T14:26:23.661258398Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 14:26:23.662170 env[1266]: time="2024-12-13T14:26:23.662022260Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:26:23.667355 env[1266]: time="2024-12-13T14:26:23.667253565Z" level=info msg="CreateContainer within sandbox \"053dd7232ddbb43fcab05de504379de52cb13b238d2133b4f21f45ede7397eab\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:26:23.676690 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4123471578.mount: Deactivated successfully. Dec 13 14:26:23.685242 env[1266]: time="2024-12-13T14:26:23.685201012Z" level=info msg="CreateContainer within sandbox \"053dd7232ddbb43fcab05de504379de52cb13b238d2133b4f21f45ede7397eab\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"7f7ce71668fe1e55bb100200c10e97f85395cc05067685eb700c5137e2ba145e\"" Dec 13 14:26:23.686769 env[1266]: time="2024-12-13T14:26:23.686749280Z" level=info msg="StartContainer for \"7f7ce71668fe1e55bb100200c10e97f85395cc05067685eb700c5137e2ba145e\"" Dec 13 14:26:23.710525 systemd[1]: Started cri-containerd-7f7ce71668fe1e55bb100200c10e97f85395cc05067685eb700c5137e2ba145e.scope. Dec 13 14:26:23.712087 systemd[1]: run-containerd-runc-k8s.io-7f7ce71668fe1e55bb100200c10e97f85395cc05067685eb700c5137e2ba145e-runc.mH3YRC.mount: Deactivated successfully. Dec 13 14:26:23.726000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.731675 kernel: kauditd_printk_skb: 539 callbacks suppressed Dec 13 14:26:23.731899 kernel: audit: type=1400 audit(1734099983.726:1299): avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.732000 kernel: audit: type=1300 audit(1734099983.726:1299): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd7b173ec68 items=0 ppid=3832 pid=4228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:23.726000 audit[4228]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd7b173ec68 items=0 ppid=3832 pid=4228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:23.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766376365373136363866653165353562623130303230306331306539 Dec 13 14:26:23.738975 kernel: audit: type=1327 audit(1734099983.726:1299): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766376365373136363866653165353562623130303230306331306539 Dec 13 14:26:23.726000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.746602 kernel: audit: type=1400 audit(1734099983.726:1300): avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.746643 kernel: audit: type=1400 audit(1734099983.726:1300): avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.726000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.726000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.749093 kernel: audit: type=1400 audit(1734099983.726:1300): avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.726000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.751574 kernel: audit: type=1400 audit(1734099983.726:1300): avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.726000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.726000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.758593 kernel: audit: type=1400 audit(1734099983.726:1300): avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.758627 kernel: audit: type=1400 audit(1734099983.726:1300): avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.726000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.759129 env[1266]: time="2024-12-13T14:26:23.758896621Z" level=info msg="StartContainer for \"7f7ce71668fe1e55bb100200c10e97f85395cc05067685eb700c5137e2ba145e\" returns successfully" Dec 13 14:26:23.761412 kernel: audit: type=1400 audit(1734099983.726:1300): avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.726000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.726000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.726000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.726000 audit: BPF prog-id=197 op=LOAD Dec 13 14:26:23.726000 audit[4228]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000983d8 items=0 ppid=3832 pid=4228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:23.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766376365373136363866653165353562623130303230306331306539 Dec 13 14:26:23.726000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.726000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.726000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.726000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.726000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.726000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.726000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.726000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.726000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.726000 audit: BPF prog-id=198 op=LOAD Dec 13 14:26:23.726000 audit[4228]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000098428 items=0 ppid=3832 pid=4228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:23.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766376365373136363866653165353562623130303230306331306539 Dec 13 14:26:23.726000 audit: BPF prog-id=198 op=UNLOAD Dec 13 14:26:23.726000 audit: BPF prog-id=197 op=UNLOAD Dec 13 14:26:23.726000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.726000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.726000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.726000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.726000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.726000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.726000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.726000 audit[4228]: AVC avc: denied { perfmon } for pid=4228 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.726000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.726000 audit[4228]: AVC avc: denied { bpf } for pid=4228 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:23.726000 audit: BPF prog-id=199 op=LOAD Dec 13 14:26:23.726000 audit[4228]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000984b8 items=0 ppid=3832 pid=4228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:23.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766376365373136363866653165353562623130303230306331306539 Dec 13 14:26:24.619419 kubelet[2200]: I1213 14:26:24.619390 2200 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:26:24.691755 systemd[1]: run-containerd-runc-k8s.io-6c01a9320319e7b98dde5f53166fb8dc4d01b548439e4ce50f231679beed80ab-runc.8WzKM9.mount: Deactivated successfully. Dec 13 14:26:26.321707 env[1266]: time="2024-12-13T14:26:26.321665775Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:26.322638 env[1266]: time="2024-12-13T14:26:26.322622850Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:26.323652 env[1266]: time="2024-12-13T14:26:26.323636396Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:26.324710 env[1266]: time="2024-12-13T14:26:26.324690554Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:26.325293 env[1266]: time="2024-12-13T14:26:26.324864962Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 14:26:26.325593 env[1266]: time="2024-12-13T14:26:26.325577223Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:26:26.327136 env[1266]: time="2024-12-13T14:26:26.327116290Z" level=info msg="CreateContainer within sandbox \"cc930126c7014b7d24c33470fac0de2093b9bf12ec9de4c1fc3b316213fe8e1b\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:26:26.334073 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount692648779.mount: Deactivated successfully. Dec 13 14:26:26.335530 env[1266]: time="2024-12-13T14:26:26.335507275Z" level=info msg="CreateContainer within sandbox \"cc930126c7014b7d24c33470fac0de2093b9bf12ec9de4c1fc3b316213fe8e1b\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"df87666e3a9e374f359c4c9e931e106d95bd64b542d54b55d76279e0b9b0f641\"" Dec 13 14:26:26.335972 env[1266]: time="2024-12-13T14:26:26.335951292Z" level=info msg="StartContainer for \"df87666e3a9e374f359c4c9e931e106d95bd64b542d54b55d76279e0b9b0f641\"" Dec 13 14:26:26.364493 systemd[1]: Started cri-containerd-df87666e3a9e374f359c4c9e931e106d95bd64b542d54b55d76279e0b9b0f641.scope. Dec 13 14:26:26.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.383000 audit: BPF prog-id=200 op=LOAD Dec 13 14:26:26.383000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.383000 audit[4316]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3887 pid=4316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:26.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466383736363665336139653337346633353963346339653933316531 Dec 13 14:26:26.383000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.383000 audit[4316]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3887 pid=4316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:26.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466383736363665336139653337346633353963346339653933316531 Dec 13 14:26:26.383000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.383000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.383000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.383000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.383000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.383000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.383000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.383000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.383000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.383000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.383000 audit: BPF prog-id=201 op=LOAD Dec 13 14:26:26.383000 audit[4316]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000257ba0 items=0 ppid=3887 pid=4316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:26.383000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466383736363665336139653337346633353963346339653933316531 Dec 13 14:26:26.384000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.384000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.384000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.384000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.384000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.384000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.384000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.384000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.384000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.384000 audit: BPF prog-id=202 op=LOAD Dec 13 14:26:26.384000 audit[4316]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000257be8 items=0 ppid=3887 pid=4316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:26.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466383736363665336139653337346633353963346339653933316531 Dec 13 14:26:26.384000 audit: BPF prog-id=202 op=UNLOAD Dec 13 14:26:26.384000 audit: BPF prog-id=201 op=UNLOAD Dec 13 14:26:26.384000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.384000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.384000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.384000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.384000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.384000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.384000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.384000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.384000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.384000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.384000 audit: BPF prog-id=203 op=LOAD Dec 13 14:26:26.384000 audit[4316]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000257ff8 items=0 ppid=3887 pid=4316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:26.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466383736363665336139653337346633353963346339653933316531 Dec 13 14:26:26.418610 env[1266]: time="2024-12-13T14:26:26.418582301Z" level=info msg="StartContainer for \"df87666e3a9e374f359c4c9e931e106d95bd64b542d54b55d76279e0b9b0f641\" returns successfully" Dec 13 14:26:26.429914 kubelet[2200]: I1213 14:26:26.429771 2200 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7f96648886-5cszg" podStartSLOduration=26.658527264 podStartE2EDuration="32.429741416s" podCreationTimestamp="2024-12-13 14:25:54 +0000 UTC" firstStartedPulling="2024-12-13 14:26:20.553884065 +0000 UTC m=+44.546224130" lastFinishedPulling="2024-12-13 14:26:26.32509822 +0000 UTC m=+50.317438282" observedRunningTime="2024-12-13 14:26:26.429573093 +0000 UTC m=+50.421913169" watchObservedRunningTime="2024-12-13 14:26:26.429741416 +0000 UTC m=+50.422081484" Dec 13 14:26:26.478000 audit[4347]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4347 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:26.478000 audit[4347]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc5e6658b0 a2=0 a3=7ffc5e66589c items=0 ppid=2331 pid=4347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:26.478000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:26.482000 audit[4347]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4347 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:26.482000 audit[4347]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc5e6658b0 a2=0 a3=7ffc5e66589c items=0 ppid=2331 pid=4347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:26.482000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:26.781422 env[1266]: time="2024-12-13T14:26:26.781394263Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:26.856951 env[1266]: time="2024-12-13T14:26:26.856922971Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:26.860229 env[1266]: time="2024-12-13T14:26:26.860205982Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:26.863671 env[1266]: time="2024-12-13T14:26:26.863656689Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:26.863858 env[1266]: time="2024-12-13T14:26:26.863840843Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 14:26:26.864263 env[1266]: time="2024-12-13T14:26:26.864251136Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:26:26.866880 env[1266]: time="2024-12-13T14:26:26.866866819Z" level=info msg="CreateContainer within sandbox \"edbe340a292cc547db09f8a0871647aaf9a60e04b7a840c09d21f362e60f0bfc\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:26:26.884539 env[1266]: time="2024-12-13T14:26:26.884504009Z" level=info msg="CreateContainer within sandbox \"edbe340a292cc547db09f8a0871647aaf9a60e04b7a840c09d21f362e60f0bfc\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"c032d13b1a87477102e275821a6755ae78483c2ed4ca17d97c05df2f627eda71\"" Dec 13 14:26:26.885379 env[1266]: time="2024-12-13T14:26:26.885013215Z" level=info msg="StartContainer for \"c032d13b1a87477102e275821a6755ae78483c2ed4ca17d97c05df2f627eda71\"" Dec 13 14:26:26.899642 systemd[1]: Started cri-containerd-c032d13b1a87477102e275821a6755ae78483c2ed4ca17d97c05df2f627eda71.scope. Dec 13 14:26:26.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.913000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.913000 audit: BPF prog-id=204 op=LOAD Dec 13 14:26:26.914000 audit[4358]: AVC avc: denied { bpf } for pid=4358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.914000 audit[4358]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4078 pid=4358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:26.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330333264313362316138373437373130326532373538323161363735 Dec 13 14:26:26.914000 audit[4358]: AVC avc: denied { perfmon } for pid=4358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.914000 audit[4358]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4078 pid=4358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:26.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330333264313362316138373437373130326532373538323161363735 Dec 13 14:26:26.914000 audit[4358]: AVC avc: denied { bpf } for pid=4358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.914000 audit[4358]: AVC avc: denied { bpf } for pid=4358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.914000 audit[4358]: AVC avc: denied { bpf } for pid=4358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.914000 audit[4358]: AVC avc: denied { perfmon } for pid=4358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.914000 audit[4358]: AVC avc: denied { perfmon } for pid=4358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.914000 audit[4358]: AVC avc: denied { perfmon } for pid=4358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.914000 audit[4358]: AVC avc: denied { perfmon } for pid=4358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.914000 audit[4358]: AVC avc: denied { perfmon } for pid=4358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.914000 audit[4358]: AVC avc: denied { bpf } for pid=4358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.914000 audit[4358]: AVC avc: denied { bpf } for pid=4358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.914000 audit: BPF prog-id=205 op=LOAD Dec 13 14:26:26.914000 audit[4358]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000349cf0 items=0 ppid=4078 pid=4358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:26.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330333264313362316138373437373130326532373538323161363735 Dec 13 14:26:26.914000 audit[4358]: AVC avc: denied { bpf } for pid=4358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.914000 audit[4358]: AVC avc: denied { bpf } for pid=4358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.914000 audit[4358]: AVC avc: denied { perfmon } for pid=4358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.914000 audit[4358]: AVC avc: denied { perfmon } for pid=4358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.914000 audit[4358]: AVC avc: denied { perfmon } for pid=4358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.914000 audit[4358]: AVC avc: denied { perfmon } for pid=4358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.914000 audit[4358]: AVC avc: denied { perfmon } for pid=4358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.914000 audit[4358]: AVC avc: denied { bpf } for pid=4358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.914000 audit[4358]: AVC avc: denied { bpf } for pid=4358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.914000 audit: BPF prog-id=206 op=LOAD Dec 13 14:26:26.914000 audit[4358]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000349d38 items=0 ppid=4078 pid=4358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:26.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330333264313362316138373437373130326532373538323161363735 Dec 13 14:26:26.914000 audit: BPF prog-id=206 op=UNLOAD Dec 13 14:26:26.914000 audit: BPF prog-id=205 op=UNLOAD Dec 13 14:26:26.914000 audit[4358]: AVC avc: denied { bpf } for pid=4358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.914000 audit[4358]: AVC avc: denied { bpf } for pid=4358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.914000 audit[4358]: AVC avc: denied { bpf } for pid=4358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.914000 audit[4358]: AVC avc: denied { perfmon } for pid=4358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.914000 audit[4358]: AVC avc: denied { perfmon } for pid=4358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.914000 audit[4358]: AVC avc: denied { perfmon } for pid=4358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.914000 audit[4358]: AVC avc: denied { perfmon } for pid=4358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.914000 audit[4358]: AVC avc: denied { perfmon } for pid=4358 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.914000 audit[4358]: AVC avc: denied { bpf } for pid=4358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.914000 audit[4358]: AVC avc: denied { bpf } for pid=4358 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:26.914000 audit: BPF prog-id=207 op=LOAD Dec 13 14:26:26.914000 audit[4358]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c0148 items=0 ppid=4078 pid=4358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:26.914000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330333264313362316138373437373130326532373538323161363735 Dec 13 14:26:26.981539 env[1266]: time="2024-12-13T14:26:26.981511202Z" level=info msg="StartContainer for \"c032d13b1a87477102e275821a6755ae78483c2ed4ca17d97c05df2f627eda71\" returns successfully" Dec 13 14:26:27.205000 audit[4327]: AVC avc: denied { watch } for pid=4327 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_26_05.1243136933/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c428,c743 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c428,c743 tclass=file permissive=0 Dec 13 14:26:27.205000 audit[4327]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0003bca40 a2=fc6 a3=0 items=0 ppid=3887 pid=4327 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c428,c743 key=(null) Dec 13 14:26:27.205000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:26:27.334669 systemd[1]: run-containerd-runc-k8s.io-df87666e3a9e374f359c4c9e931e106d95bd64b542d54b55d76279e0b9b0f641-runc.A7U0Rm.mount: Deactivated successfully. Dec 13 14:26:27.429000 audit[2044]: AVC avc: denied { watch } for pid=2044 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:26:27.429000 audit[2044]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c000843d10 a2=fc6 a3=0 items=0 ppid=1881 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 key=(null) Dec 13 14:26:27.429000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:26:27.430000 audit[2044]: AVC avc: denied { watch } for pid=2044 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:26:27.430000 audit[2044]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ab8c00 a2=fc6 a3=0 items=0 ppid=1881 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 key=(null) Dec 13 14:26:27.430000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:26:27.514604 kubelet[2200]: I1213 14:26:27.514585 2200 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:26:27.610000 audit[4386]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4386 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:27.610000 audit[4386]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff8fa08d70 a2=0 a3=7fff8fa08d5c items=0 ppid=2331 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:27.610000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:27.615000 audit[4386]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4386 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:27.615000 audit[4386]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff8fa08d70 a2=0 a3=7fff8fa08d5c items=0 ppid=2331 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:27.615000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:27.729000 audit[4368]: AVC avc: denied { watch } for pid=4368 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_26_05.4127477885/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c448,c880 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c448,c880 tclass=file permissive=0 Dec 13 14:26:27.729000 audit[4368]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000ac5080 a2=fc6 a3=0 items=0 ppid=4078 pid=4368 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c448,c880 key=(null) Dec 13 14:26:27.729000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:26:28.530646 kubelet[2200]: I1213 14:26:28.530620 2200 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:26:29.018419 env[1266]: time="2024-12-13T14:26:29.018386289Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:29.019211 env[1266]: time="2024-12-13T14:26:29.019193851Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:29.019938 env[1266]: time="2024-12-13T14:26:29.019924553Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:29.020923 env[1266]: time="2024-12-13T14:26:29.020909422Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:26:29.021211 env[1266]: time="2024-12-13T14:26:29.021193819Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 14:26:29.034316 env[1266]: time="2024-12-13T14:26:29.033132186Z" level=info msg="CreateContainer within sandbox \"053dd7232ddbb43fcab05de504379de52cb13b238d2133b4f21f45ede7397eab\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:26:29.043852 env[1266]: time="2024-12-13T14:26:29.043829704Z" level=info msg="CreateContainer within sandbox \"053dd7232ddbb43fcab05de504379de52cb13b238d2133b4f21f45ede7397eab\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"22e5b30062a0e535e3093005602571d50ffe7f76cbb295375dd646b294b83c20\"" Dec 13 14:26:29.044277 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount378790498.mount: Deactivated successfully. Dec 13 14:26:29.046779 env[1266]: time="2024-12-13T14:26:29.046752917Z" level=info msg="StartContainer for \"22e5b30062a0e535e3093005602571d50ffe7f76cbb295375dd646b294b83c20\"" Dec 13 14:26:29.074849 systemd[1]: Started cri-containerd-22e5b30062a0e535e3093005602571d50ffe7f76cbb295375dd646b294b83c20.scope. Dec 13 14:26:29.091462 kernel: kauditd_printk_skb: 171 callbacks suppressed Dec 13 14:26:29.097868 kernel: audit: type=1400 audit(1734099989.083:1349): avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.098866 kernel: audit: type=1300 audit(1734099989.083:1349): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fbff023e918 items=0 ppid=3832 pid=4395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:29.099473 kernel: audit: type=1327 audit(1734099989.083:1349): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232653562333030363261306535333565333039333030353630323537 Dec 13 14:26:29.083000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.083000 audit[4395]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fbff023e918 items=0 ppid=3832 pid=4395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:29.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232653562333030363261306535333565333039333030353630323537 Dec 13 14:26:29.104777 kernel: audit: type=1400 audit(1734099989.085:1350): avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.104803 kernel: audit: type=1400 audit(1734099989.085:1350): avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.085000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.085000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.085000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.109670 kernel: audit: type=1400 audit(1734099989.085:1350): avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.085000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.085000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.114685 kernel: audit: type=1400 audit(1734099989.085:1350): avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.114722 kernel: audit: type=1400 audit(1734099989.085:1350): avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.117213 kernel: audit: type=1400 audit(1734099989.085:1350): avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.117240 kernel: audit: type=1400 audit(1734099989.085:1350): avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.085000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.085000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.117804 env[1266]: time="2024-12-13T14:26:29.117778524Z" level=info msg="StartContainer for \"22e5b30062a0e535e3093005602571d50ffe7f76cbb295375dd646b294b83c20\" returns successfully" Dec 13 14:26:29.085000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.085000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.085000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.085000 audit: BPF prog-id=208 op=LOAD Dec 13 14:26:29.085000 audit[4395]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00045c028 items=0 ppid=3832 pid=4395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:29.085000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232653562333030363261306535333565333039333030353630323537 Dec 13 14:26:29.090000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.090000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.090000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.090000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.090000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.090000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.090000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.090000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.090000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.090000 audit: BPF prog-id=209 op=LOAD Dec 13 14:26:29.090000 audit[4395]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00045c078 items=0 ppid=3832 pid=4395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:29.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232653562333030363261306535333565333039333030353630323537 Dec 13 14:26:29.090000 audit: BPF prog-id=209 op=UNLOAD Dec 13 14:26:29.090000 audit: BPF prog-id=208 op=UNLOAD Dec 13 14:26:29.090000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.090000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.090000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.090000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.090000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.090000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.090000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.090000 audit[4395]: AVC avc: denied { perfmon } for pid=4395 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.090000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.090000 audit[4395]: AVC avc: denied { bpf } for pid=4395 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:26:29.090000 audit: BPF prog-id=210 op=LOAD Dec 13 14:26:29.090000 audit[4395]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00045c108 items=0 ppid=3832 pid=4395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:29.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232653562333030363261306535333565333039333030353630323537 Dec 13 14:26:29.351246 kubelet[2200]: I1213 14:26:29.350489 2200 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:26:29.351365 kubelet[2200]: I1213 14:26:29.351356 2200 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:26:29.523000 audit[2080]: AVC avc: denied { watch } for pid=2080 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:26:29.523000 audit[2080]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c009c6ec00 a2=fc6 a3=0 items=0 ppid=1963 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 key=(null) Dec 13 14:26:29.523000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:26:29.523000 audit[2080]: AVC avc: denied { watch } for pid=2080 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:26:29.523000 audit[2080]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c009c6ec30 a2=fc6 a3=0 items=0 ppid=1963 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 key=(null) Dec 13 14:26:29.523000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:26:29.528000 audit[2080]: AVC avc: denied { watch } for pid=2080 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:26:29.528000 audit[2080]: AVC avc: denied { watch } for pid=2080 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:26:29.528000 audit[2080]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00bdefe00 a2=fc6 a3=0 items=0 ppid=1963 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 key=(null) Dec 13 14:26:29.528000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:26:29.528000 audit[2080]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c009c6ec90 a2=fc6 a3=0 items=0 ppid=1963 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 key=(null) Dec 13 14:26:29.528000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:26:29.633771 kubelet[2200]: I1213 14:26:29.633695 2200 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7f96648886-kg7v7" podStartSLOduration=30.379336581 podStartE2EDuration="35.633643231s" podCreationTimestamp="2024-12-13 14:25:54 +0000 UTC" firstStartedPulling="2024-12-13 14:26:21.609759651 +0000 UTC m=+45.602099716" lastFinishedPulling="2024-12-13 14:26:26.864066301 +0000 UTC m=+50.856406366" observedRunningTime="2024-12-13 14:26:27.586779441 +0000 UTC m=+51.579119515" watchObservedRunningTime="2024-12-13 14:26:29.633643231 +0000 UTC m=+53.625983305" Dec 13 14:26:29.634088 kubelet[2200]: I1213 14:26:29.633929 2200 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-xlj8g" podStartSLOduration=26.113504871 podStartE2EDuration="34.633913123s" podCreationTimestamp="2024-12-13 14:25:55 +0000 UTC" firstStartedPulling="2024-12-13 14:26:20.500995551 +0000 UTC m=+44.493335617" lastFinishedPulling="2024-12-13 14:26:29.021403803 +0000 UTC m=+53.013743869" observedRunningTime="2024-12-13 14:26:29.632437739 +0000 UTC m=+53.624777821" watchObservedRunningTime="2024-12-13 14:26:29.633913123 +0000 UTC m=+53.626253197" Dec 13 14:26:29.658000 audit[2080]: AVC avc: denied { watch } for pid=2080 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:26:29.658000 audit[2080]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c009edfc80 a2=fc6 a3=0 items=0 ppid=1963 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 key=(null) Dec 13 14:26:29.658000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:26:29.693000 audit[2080]: AVC avc: denied { watch } for pid=2080 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:26:29.693000 audit[2080]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c009ebbc80 a2=fc6 a3=0 items=0 ppid=1963 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 key=(null) Dec 13 14:26:29.693000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:26:36.401573 env[1266]: time="2024-12-13T14:26:36.401224561Z" level=info msg="StopPodSandbox for \"efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7\"" Dec 13 14:26:36.872896 env[1266]: 2024-12-13 14:26:36.663 [WARNING][4448] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7f96648886--5cszg-eth0", GenerateName:"calico-apiserver-7f96648886-", Namespace:"calico-apiserver", SelfLink:"", UID:"08ed695d-459c-416f-9e4f-957f40c790c1", ResourceVersion:"824", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7f96648886", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"cc930126c7014b7d24c33470fac0de2093b9bf12ec9de4c1fc3b316213fe8e1b", Pod:"calico-apiserver-7f96648886-5cszg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie49bb63c44b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:26:36.872896 env[1266]: 2024-12-13 14:26:36.664 [INFO][4448] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" Dec 13 14:26:36.872896 env[1266]: 2024-12-13 14:26:36.664 [INFO][4448] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" iface="eth0" netns="" Dec 13 14:26:36.872896 env[1266]: 2024-12-13 14:26:36.664 [INFO][4448] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" Dec 13 14:26:36.872896 env[1266]: 2024-12-13 14:26:36.664 [INFO][4448] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" Dec 13 14:26:36.872896 env[1266]: 2024-12-13 14:26:36.859 [INFO][4454] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" HandleID="k8s-pod-network.efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" Workload="localhost-k8s-calico--apiserver--7f96648886--5cszg-eth0" Dec 13 14:26:36.872896 env[1266]: 2024-12-13 14:26:36.861 [INFO][4454] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:26:36.872896 env[1266]: 2024-12-13 14:26:36.862 [INFO][4454] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:26:36.872896 env[1266]: 2024-12-13 14:26:36.870 [WARNING][4454] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" HandleID="k8s-pod-network.efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" Workload="localhost-k8s-calico--apiserver--7f96648886--5cszg-eth0" Dec 13 14:26:36.872896 env[1266]: 2024-12-13 14:26:36.870 [INFO][4454] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" HandleID="k8s-pod-network.efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" Workload="localhost-k8s-calico--apiserver--7f96648886--5cszg-eth0" Dec 13 14:26:36.872896 env[1266]: 2024-12-13 14:26:36.870 [INFO][4454] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:26:36.872896 env[1266]: 2024-12-13 14:26:36.871 [INFO][4448] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" Dec 13 14:26:36.874070 env[1266]: time="2024-12-13T14:26:36.872911205Z" level=info msg="TearDown network for sandbox \"efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7\" successfully" Dec 13 14:26:36.874070 env[1266]: time="2024-12-13T14:26:36.872930819Z" level=info msg="StopPodSandbox for \"efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7\" returns successfully" Dec 13 14:26:36.877449 env[1266]: time="2024-12-13T14:26:36.877431709Z" level=info msg="RemovePodSandbox for \"efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7\"" Dec 13 14:26:36.877774 env[1266]: time="2024-12-13T14:26:36.877451752Z" level=info msg="Forcibly stopping sandbox \"efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7\"" Dec 13 14:26:36.952923 env[1266]: 2024-12-13 14:26:36.919 [WARNING][4472] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7f96648886--5cszg-eth0", GenerateName:"calico-apiserver-7f96648886-", Namespace:"calico-apiserver", SelfLink:"", UID:"08ed695d-459c-416f-9e4f-957f40c790c1", ResourceVersion:"824", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7f96648886", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"cc930126c7014b7d24c33470fac0de2093b9bf12ec9de4c1fc3b316213fe8e1b", Pod:"calico-apiserver-7f96648886-5cszg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calie49bb63c44b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:26:36.952923 env[1266]: 2024-12-13 14:26:36.919 [INFO][4472] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" Dec 13 14:26:36.952923 env[1266]: 2024-12-13 14:26:36.919 [INFO][4472] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" iface="eth0" netns="" Dec 13 14:26:36.952923 env[1266]: 2024-12-13 14:26:36.919 [INFO][4472] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" Dec 13 14:26:36.952923 env[1266]: 2024-12-13 14:26:36.919 [INFO][4472] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" Dec 13 14:26:36.952923 env[1266]: 2024-12-13 14:26:36.942 [INFO][4478] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" HandleID="k8s-pod-network.efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" Workload="localhost-k8s-calico--apiserver--7f96648886--5cszg-eth0" Dec 13 14:26:36.952923 env[1266]: 2024-12-13 14:26:36.942 [INFO][4478] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:26:36.952923 env[1266]: 2024-12-13 14:26:36.942 [INFO][4478] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:26:36.952923 env[1266]: 2024-12-13 14:26:36.946 [WARNING][4478] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" HandleID="k8s-pod-network.efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" Workload="localhost-k8s-calico--apiserver--7f96648886--5cszg-eth0" Dec 13 14:26:36.952923 env[1266]: 2024-12-13 14:26:36.946 [INFO][4478] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" HandleID="k8s-pod-network.efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" Workload="localhost-k8s-calico--apiserver--7f96648886--5cszg-eth0" Dec 13 14:26:36.952923 env[1266]: 2024-12-13 14:26:36.947 [INFO][4478] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:26:36.952923 env[1266]: 2024-12-13 14:26:36.949 [INFO][4472] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7" Dec 13 14:26:36.953952 env[1266]: time="2024-12-13T14:26:36.953106144Z" level=info msg="TearDown network for sandbox \"efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7\" successfully" Dec 13 14:26:36.955647 env[1266]: time="2024-12-13T14:26:36.955628052Z" level=info msg="RemovePodSandbox \"efdc9690e1b7a2080ab25f73dfe06226758c60f3952cc68723fe5235bfbf1ac7\" returns successfully" Dec 13 14:26:36.969372 env[1266]: time="2024-12-13T14:26:36.969332942Z" level=info msg="StopPodSandbox for \"bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496\"" Dec 13 14:26:37.017700 env[1266]: 2024-12-13 14:26:36.995 [WARNING][4496] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7f96648886--kg7v7-eth0", GenerateName:"calico-apiserver-7f96648886-", Namespace:"calico-apiserver", SelfLink:"", UID:"8213859f-6e9b-422f-8e3b-bd8bf68e0801", ResourceVersion:"832", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7f96648886", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"edbe340a292cc547db09f8a0871647aaf9a60e04b7a840c09d21f362e60f0bfc", Pod:"calico-apiserver-7f96648886-kg7v7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif0761948940", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:26:37.017700 env[1266]: 2024-12-13 14:26:36.995 [INFO][4496] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" Dec 13 14:26:37.017700 env[1266]: 2024-12-13 14:26:36.995 [INFO][4496] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" iface="eth0" netns="" Dec 13 14:26:37.017700 env[1266]: 2024-12-13 14:26:36.995 [INFO][4496] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" Dec 13 14:26:37.017700 env[1266]: 2024-12-13 14:26:36.995 [INFO][4496] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" Dec 13 14:26:37.017700 env[1266]: 2024-12-13 14:26:37.009 [INFO][4502] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" HandleID="k8s-pod-network.bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" Workload="localhost-k8s-calico--apiserver--7f96648886--kg7v7-eth0" Dec 13 14:26:37.017700 env[1266]: 2024-12-13 14:26:37.009 [INFO][4502] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:26:37.017700 env[1266]: 2024-12-13 14:26:37.009 [INFO][4502] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:26:37.017700 env[1266]: 2024-12-13 14:26:37.013 [WARNING][4502] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" HandleID="k8s-pod-network.bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" Workload="localhost-k8s-calico--apiserver--7f96648886--kg7v7-eth0" Dec 13 14:26:37.017700 env[1266]: 2024-12-13 14:26:37.013 [INFO][4502] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" HandleID="k8s-pod-network.bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" Workload="localhost-k8s-calico--apiserver--7f96648886--kg7v7-eth0" Dec 13 14:26:37.017700 env[1266]: 2024-12-13 14:26:37.015 [INFO][4502] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:26:37.017700 env[1266]: 2024-12-13 14:26:37.016 [INFO][4496] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" Dec 13 14:26:37.018904 env[1266]: time="2024-12-13T14:26:37.018011472Z" level=info msg="TearDown network for sandbox \"bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496\" successfully" Dec 13 14:26:37.018904 env[1266]: time="2024-12-13T14:26:37.018033461Z" level=info msg="StopPodSandbox for \"bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496\" returns successfully" Dec 13 14:26:37.018904 env[1266]: time="2024-12-13T14:26:37.018346638Z" level=info msg="RemovePodSandbox for \"bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496\"" Dec 13 14:26:37.018904 env[1266]: time="2024-12-13T14:26:37.018363862Z" level=info msg="Forcibly stopping sandbox \"bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496\"" Dec 13 14:26:37.063382 env[1266]: 2024-12-13 14:26:37.044 [WARNING][4520] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7f96648886--kg7v7-eth0", GenerateName:"calico-apiserver-7f96648886-", Namespace:"calico-apiserver", SelfLink:"", UID:"8213859f-6e9b-422f-8e3b-bd8bf68e0801", ResourceVersion:"832", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7f96648886", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"edbe340a292cc547db09f8a0871647aaf9a60e04b7a840c09d21f362e60f0bfc", Pod:"calico-apiserver-7f96648886-kg7v7", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif0761948940", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:26:37.063382 env[1266]: 2024-12-13 14:26:37.044 [INFO][4520] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" Dec 13 14:26:37.063382 env[1266]: 2024-12-13 14:26:37.044 [INFO][4520] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" iface="eth0" netns="" Dec 13 14:26:37.063382 env[1266]: 2024-12-13 14:26:37.044 [INFO][4520] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" Dec 13 14:26:37.063382 env[1266]: 2024-12-13 14:26:37.044 [INFO][4520] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" Dec 13 14:26:37.063382 env[1266]: 2024-12-13 14:26:37.056 [INFO][4526] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" HandleID="k8s-pod-network.bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" Workload="localhost-k8s-calico--apiserver--7f96648886--kg7v7-eth0" Dec 13 14:26:37.063382 env[1266]: 2024-12-13 14:26:37.056 [INFO][4526] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:26:37.063382 env[1266]: 2024-12-13 14:26:37.056 [INFO][4526] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:26:37.063382 env[1266]: 2024-12-13 14:26:37.060 [WARNING][4526] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" HandleID="k8s-pod-network.bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" Workload="localhost-k8s-calico--apiserver--7f96648886--kg7v7-eth0" Dec 13 14:26:37.063382 env[1266]: 2024-12-13 14:26:37.060 [INFO][4526] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" HandleID="k8s-pod-network.bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" Workload="localhost-k8s-calico--apiserver--7f96648886--kg7v7-eth0" Dec 13 14:26:37.063382 env[1266]: 2024-12-13 14:26:37.061 [INFO][4526] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:26:37.063382 env[1266]: 2024-12-13 14:26:37.062 [INFO][4520] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496" Dec 13 14:26:37.065273 env[1266]: time="2024-12-13T14:26:37.063815465Z" level=info msg="TearDown network for sandbox \"bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496\" successfully" Dec 13 14:26:37.065696 env[1266]: time="2024-12-13T14:26:37.065681557Z" level=info msg="RemovePodSandbox \"bb93b5a0af88a9888be8d3885514e5588bd3f1b56d22269c950f3e092fc91496\" returns successfully" Dec 13 14:26:37.069730 env[1266]: time="2024-12-13T14:26:37.069682934Z" level=info msg="StopPodSandbox for \"f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94\"" Dec 13 14:26:37.116849 env[1266]: 2024-12-13 14:26:37.094 [WARNING][4544] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--cctsn-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"da687174-0225-4e56-9019-2e2c03247268", ResourceVersion:"796", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"18dd69618b9982ca094f3fd6a3634cd39026f7b9b1e555de1342e7953afbae0b", Pod:"coredns-76f75df574-cctsn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1484bdfad90", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:26:37.116849 env[1266]: 2024-12-13 14:26:37.094 [INFO][4544] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" Dec 13 14:26:37.116849 env[1266]: 2024-12-13 14:26:37.094 [INFO][4544] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" iface="eth0" netns="" Dec 13 14:26:37.116849 env[1266]: 2024-12-13 14:26:37.094 [INFO][4544] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" Dec 13 14:26:37.116849 env[1266]: 2024-12-13 14:26:37.094 [INFO][4544] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" Dec 13 14:26:37.116849 env[1266]: 2024-12-13 14:26:37.109 [INFO][4550] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" HandleID="k8s-pod-network.f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" Workload="localhost-k8s-coredns--76f75df574--cctsn-eth0" Dec 13 14:26:37.116849 env[1266]: 2024-12-13 14:26:37.109 [INFO][4550] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:26:37.116849 env[1266]: 2024-12-13 14:26:37.109 [INFO][4550] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:26:37.116849 env[1266]: 2024-12-13 14:26:37.114 [WARNING][4550] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" HandleID="k8s-pod-network.f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" Workload="localhost-k8s-coredns--76f75df574--cctsn-eth0" Dec 13 14:26:37.116849 env[1266]: 2024-12-13 14:26:37.114 [INFO][4550] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" HandleID="k8s-pod-network.f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" Workload="localhost-k8s-coredns--76f75df574--cctsn-eth0" Dec 13 14:26:37.116849 env[1266]: 2024-12-13 14:26:37.114 [INFO][4550] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:26:37.116849 env[1266]: 2024-12-13 14:26:37.115 [INFO][4544] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" Dec 13 14:26:37.117213 env[1266]: time="2024-12-13T14:26:37.116866571Z" level=info msg="TearDown network for sandbox \"f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94\" successfully" Dec 13 14:26:37.117213 env[1266]: time="2024-12-13T14:26:37.116886291Z" level=info msg="StopPodSandbox for \"f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94\" returns successfully" Dec 13 14:26:37.117213 env[1266]: time="2024-12-13T14:26:37.117180644Z" level=info msg="RemovePodSandbox for \"f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94\"" Dec 13 14:26:37.117213 env[1266]: time="2024-12-13T14:26:37.117196047Z" level=info msg="Forcibly stopping sandbox \"f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94\"" Dec 13 14:26:37.160619 env[1266]: 2024-12-13 14:26:37.138 [WARNING][4569] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--cctsn-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"da687174-0225-4e56-9019-2e2c03247268", ResourceVersion:"796", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"18dd69618b9982ca094f3fd6a3634cd39026f7b9b1e555de1342e7953afbae0b", Pod:"coredns-76f75df574-cctsn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1484bdfad90", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:26:37.160619 env[1266]: 2024-12-13 14:26:37.138 [INFO][4569] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" Dec 13 14:26:37.160619 env[1266]: 2024-12-13 14:26:37.138 [INFO][4569] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" iface="eth0" netns="" Dec 13 14:26:37.160619 env[1266]: 2024-12-13 14:26:37.138 [INFO][4569] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" Dec 13 14:26:37.160619 env[1266]: 2024-12-13 14:26:37.138 [INFO][4569] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" Dec 13 14:26:37.160619 env[1266]: 2024-12-13 14:26:37.153 [INFO][4575] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" HandleID="k8s-pod-network.f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" Workload="localhost-k8s-coredns--76f75df574--cctsn-eth0" Dec 13 14:26:37.160619 env[1266]: 2024-12-13 14:26:37.153 [INFO][4575] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:26:37.160619 env[1266]: 2024-12-13 14:26:37.153 [INFO][4575] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:26:37.160619 env[1266]: 2024-12-13 14:26:37.156 [WARNING][4575] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" HandleID="k8s-pod-network.f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" Workload="localhost-k8s-coredns--76f75df574--cctsn-eth0" Dec 13 14:26:37.160619 env[1266]: 2024-12-13 14:26:37.156 [INFO][4575] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" HandleID="k8s-pod-network.f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" Workload="localhost-k8s-coredns--76f75df574--cctsn-eth0" Dec 13 14:26:37.160619 env[1266]: 2024-12-13 14:26:37.157 [INFO][4575] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:26:37.160619 env[1266]: 2024-12-13 14:26:37.158 [INFO][4569] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94" Dec 13 14:26:37.161733 env[1266]: time="2024-12-13T14:26:37.161127007Z" level=info msg="TearDown network for sandbox \"f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94\" successfully" Dec 13 14:26:37.162827 env[1266]: time="2024-12-13T14:26:37.162807204Z" level=info msg="RemovePodSandbox \"f458c93cec33016d8dc63d58bd3046693d019cada1926863175b2030c84e7b94\" returns successfully" Dec 13 14:26:37.163167 env[1266]: time="2024-12-13T14:26:37.163143258Z" level=info msg="StopPodSandbox for \"3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559\"" Dec 13 14:26:37.209636 env[1266]: 2024-12-13 14:26:37.185 [WARNING][4593] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--mdtnh-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"28c95b79-f6d0-4c1a-9283-a65395471a14", ResourceVersion:"750", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b7aa5ab13a02e996d32e1cafaee1c8bf27135d57327d76cea37baa37dbf2f9c1", Pod:"coredns-76f75df574-mdtnh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliebedc0a3020", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:26:37.209636 env[1266]: 2024-12-13 14:26:37.185 [INFO][4593] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" Dec 13 14:26:37.209636 env[1266]: 2024-12-13 14:26:37.185 [INFO][4593] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" iface="eth0" netns="" Dec 13 14:26:37.209636 env[1266]: 2024-12-13 14:26:37.185 [INFO][4593] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" Dec 13 14:26:37.209636 env[1266]: 2024-12-13 14:26:37.185 [INFO][4593] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" Dec 13 14:26:37.209636 env[1266]: 2024-12-13 14:26:37.202 [INFO][4599] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" HandleID="k8s-pod-network.3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" Workload="localhost-k8s-coredns--76f75df574--mdtnh-eth0" Dec 13 14:26:37.209636 env[1266]: 2024-12-13 14:26:37.202 [INFO][4599] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:26:37.209636 env[1266]: 2024-12-13 14:26:37.203 [INFO][4599] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:26:37.209636 env[1266]: 2024-12-13 14:26:37.207 [WARNING][4599] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" HandleID="k8s-pod-network.3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" Workload="localhost-k8s-coredns--76f75df574--mdtnh-eth0" Dec 13 14:26:37.209636 env[1266]: 2024-12-13 14:26:37.207 [INFO][4599] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" HandleID="k8s-pod-network.3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" Workload="localhost-k8s-coredns--76f75df574--mdtnh-eth0" Dec 13 14:26:37.209636 env[1266]: 2024-12-13 14:26:37.207 [INFO][4599] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:26:37.209636 env[1266]: 2024-12-13 14:26:37.208 [INFO][4593] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" Dec 13 14:26:37.210970 env[1266]: time="2024-12-13T14:26:37.210049225Z" level=info msg="TearDown network for sandbox \"3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559\" successfully" Dec 13 14:26:37.210970 env[1266]: time="2024-12-13T14:26:37.210084787Z" level=info msg="StopPodSandbox for \"3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559\" returns successfully" Dec 13 14:26:37.210970 env[1266]: time="2024-12-13T14:26:37.210428991Z" level=info msg="RemovePodSandbox for \"3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559\"" Dec 13 14:26:37.210970 env[1266]: time="2024-12-13T14:26:37.210448480Z" level=info msg="Forcibly stopping sandbox \"3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559\"" Dec 13 14:26:37.254706 env[1266]: 2024-12-13 14:26:37.233 [WARNING][4618] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--mdtnh-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"28c95b79-f6d0-4c1a-9283-a65395471a14", ResourceVersion:"750", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b7aa5ab13a02e996d32e1cafaee1c8bf27135d57327d76cea37baa37dbf2f9c1", Pod:"coredns-76f75df574-mdtnh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliebedc0a3020", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:26:37.254706 env[1266]: 2024-12-13 14:26:37.233 [INFO][4618] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" Dec 13 14:26:37.254706 env[1266]: 2024-12-13 14:26:37.233 [INFO][4618] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" iface="eth0" netns="" Dec 13 14:26:37.254706 env[1266]: 2024-12-13 14:26:37.233 [INFO][4618] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" Dec 13 14:26:37.254706 env[1266]: 2024-12-13 14:26:37.233 [INFO][4618] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" Dec 13 14:26:37.254706 env[1266]: 2024-12-13 14:26:37.248 [INFO][4624] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" HandleID="k8s-pod-network.3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" Workload="localhost-k8s-coredns--76f75df574--mdtnh-eth0" Dec 13 14:26:37.254706 env[1266]: 2024-12-13 14:26:37.248 [INFO][4624] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:26:37.254706 env[1266]: 2024-12-13 14:26:37.248 [INFO][4624] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:26:37.254706 env[1266]: 2024-12-13 14:26:37.252 [WARNING][4624] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" HandleID="k8s-pod-network.3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" Workload="localhost-k8s-coredns--76f75df574--mdtnh-eth0" Dec 13 14:26:37.254706 env[1266]: 2024-12-13 14:26:37.252 [INFO][4624] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" HandleID="k8s-pod-network.3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" Workload="localhost-k8s-coredns--76f75df574--mdtnh-eth0" Dec 13 14:26:37.254706 env[1266]: 2024-12-13 14:26:37.252 [INFO][4624] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:26:37.254706 env[1266]: 2024-12-13 14:26:37.253 [INFO][4618] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559" Dec 13 14:26:37.255466 env[1266]: time="2024-12-13T14:26:37.255365011Z" level=info msg="TearDown network for sandbox \"3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559\" successfully" Dec 13 14:26:37.256904 env[1266]: time="2024-12-13T14:26:37.256889883Z" level=info msg="RemovePodSandbox \"3139ef81902ba41a5501782f50caf9670e91568c719993fca015d64b5aa2e559\" returns successfully" Dec 13 14:26:37.257228 env[1266]: time="2024-12-13T14:26:37.257208765Z" level=info msg="StopPodSandbox for \"45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767\"" Dec 13 14:26:37.325239 env[1266]: 2024-12-13 14:26:37.288 [WARNING][4643] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--d4bb8cc5--fkhpg-eth0", GenerateName:"calico-kube-controllers-d4bb8cc5-", Namespace:"calico-system", SelfLink:"", UID:"d719f53b-80fd-46d3-90c7-f51fe9e36be1", ResourceVersion:"802", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"d4bb8cc5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"590c21849d3457913d3999dde0f3ee956e0a5250804551affd717525fc7eb958", Pod:"calico-kube-controllers-d4bb8cc5-fkhpg", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calica78d6b3324", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:26:37.325239 env[1266]: 2024-12-13 14:26:37.288 [INFO][4643] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" Dec 13 14:26:37.325239 env[1266]: 2024-12-13 14:26:37.288 [INFO][4643] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" iface="eth0" netns="" Dec 13 14:26:37.325239 env[1266]: 2024-12-13 14:26:37.288 [INFO][4643] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" Dec 13 14:26:37.325239 env[1266]: 2024-12-13 14:26:37.288 [INFO][4643] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" Dec 13 14:26:37.325239 env[1266]: 2024-12-13 14:26:37.318 [INFO][4649] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" HandleID="k8s-pod-network.45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" Workload="localhost-k8s-calico--kube--controllers--d4bb8cc5--fkhpg-eth0" Dec 13 14:26:37.325239 env[1266]: 2024-12-13 14:26:37.319 [INFO][4649] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:26:37.325239 env[1266]: 2024-12-13 14:26:37.319 [INFO][4649] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:26:37.325239 env[1266]: 2024-12-13 14:26:37.322 [WARNING][4649] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" HandleID="k8s-pod-network.45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" Workload="localhost-k8s-calico--kube--controllers--d4bb8cc5--fkhpg-eth0" Dec 13 14:26:37.325239 env[1266]: 2024-12-13 14:26:37.322 [INFO][4649] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" HandleID="k8s-pod-network.45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" Workload="localhost-k8s-calico--kube--controllers--d4bb8cc5--fkhpg-eth0" Dec 13 14:26:37.325239 env[1266]: 2024-12-13 14:26:37.323 [INFO][4649] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:26:37.325239 env[1266]: 2024-12-13 14:26:37.324 [INFO][4643] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" Dec 13 14:26:37.328703 env[1266]: time="2024-12-13T14:26:37.325497732Z" level=info msg="TearDown network for sandbox \"45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767\" successfully" Dec 13 14:26:37.328703 env[1266]: time="2024-12-13T14:26:37.325518928Z" level=info msg="StopPodSandbox for \"45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767\" returns successfully" Dec 13 14:26:37.328703 env[1266]: time="2024-12-13T14:26:37.325849261Z" level=info msg="RemovePodSandbox for \"45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767\"" Dec 13 14:26:37.328703 env[1266]: time="2024-12-13T14:26:37.325870090Z" level=info msg="Forcibly stopping sandbox \"45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767\"" Dec 13 14:26:37.397947 env[1266]: 2024-12-13 14:26:37.371 [WARNING][4667] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--d4bb8cc5--fkhpg-eth0", GenerateName:"calico-kube-controllers-d4bb8cc5-", Namespace:"calico-system", SelfLink:"", UID:"d719f53b-80fd-46d3-90c7-f51fe9e36be1", ResourceVersion:"802", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"d4bb8cc5", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"590c21849d3457913d3999dde0f3ee956e0a5250804551affd717525fc7eb958", Pod:"calico-kube-controllers-d4bb8cc5-fkhpg", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calica78d6b3324", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:26:37.397947 env[1266]: 2024-12-13 14:26:37.371 [INFO][4667] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" Dec 13 14:26:37.397947 env[1266]: 2024-12-13 14:26:37.371 [INFO][4667] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" iface="eth0" netns="" Dec 13 14:26:37.397947 env[1266]: 2024-12-13 14:26:37.371 [INFO][4667] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" Dec 13 14:26:37.397947 env[1266]: 2024-12-13 14:26:37.371 [INFO][4667] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" Dec 13 14:26:37.397947 env[1266]: 2024-12-13 14:26:37.391 [INFO][4675] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" HandleID="k8s-pod-network.45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" Workload="localhost-k8s-calico--kube--controllers--d4bb8cc5--fkhpg-eth0" Dec 13 14:26:37.397947 env[1266]: 2024-12-13 14:26:37.391 [INFO][4675] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:26:37.397947 env[1266]: 2024-12-13 14:26:37.391 [INFO][4675] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:26:37.397947 env[1266]: 2024-12-13 14:26:37.395 [WARNING][4675] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" HandleID="k8s-pod-network.45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" Workload="localhost-k8s-calico--kube--controllers--d4bb8cc5--fkhpg-eth0" Dec 13 14:26:37.397947 env[1266]: 2024-12-13 14:26:37.395 [INFO][4675] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" HandleID="k8s-pod-network.45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" Workload="localhost-k8s-calico--kube--controllers--d4bb8cc5--fkhpg-eth0" Dec 13 14:26:37.397947 env[1266]: 2024-12-13 14:26:37.395 [INFO][4675] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:26:37.397947 env[1266]: 2024-12-13 14:26:37.396 [INFO][4667] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767" Dec 13 14:26:37.398300 env[1266]: time="2024-12-13T14:26:37.397956115Z" level=info msg="TearDown network for sandbox \"45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767\" successfully" Dec 13 14:26:37.408044 env[1266]: time="2024-12-13T14:26:37.408022405Z" level=info msg="RemovePodSandbox \"45b3e9b4da08c8797de37ba47f8aea4f65a98c15e841a325062b53678d348767\" returns successfully" Dec 13 14:26:37.408415 env[1266]: time="2024-12-13T14:26:37.408354431Z" level=info msg="StopPodSandbox for \"1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa\"" Dec 13 14:26:37.450098 env[1266]: 2024-12-13 14:26:37.429 [WARNING][4694] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--xlj8g-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c89227ed-30a3-4f3d-ba16-397f58d31fe4", ResourceVersion:"846", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"053dd7232ddbb43fcab05de504379de52cb13b238d2133b4f21f45ede7397eab", Pod:"csi-node-driver-xlj8g", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali1f5b88f88b5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:26:37.450098 env[1266]: 2024-12-13 14:26:37.429 [INFO][4694] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" Dec 13 14:26:37.450098 env[1266]: 2024-12-13 14:26:37.429 [INFO][4694] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" iface="eth0" netns="" Dec 13 14:26:37.450098 env[1266]: 2024-12-13 14:26:37.429 [INFO][4694] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" Dec 13 14:26:37.450098 env[1266]: 2024-12-13 14:26:37.429 [INFO][4694] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" Dec 13 14:26:37.450098 env[1266]: 2024-12-13 14:26:37.441 [INFO][4700] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" HandleID="k8s-pod-network.1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" Workload="localhost-k8s-csi--node--driver--xlj8g-eth0" Dec 13 14:26:37.450098 env[1266]: 2024-12-13 14:26:37.441 [INFO][4700] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:26:37.450098 env[1266]: 2024-12-13 14:26:37.441 [INFO][4700] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:26:37.450098 env[1266]: 2024-12-13 14:26:37.446 [WARNING][4700] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" HandleID="k8s-pod-network.1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" Workload="localhost-k8s-csi--node--driver--xlj8g-eth0" Dec 13 14:26:37.450098 env[1266]: 2024-12-13 14:26:37.446 [INFO][4700] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" HandleID="k8s-pod-network.1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" Workload="localhost-k8s-csi--node--driver--xlj8g-eth0" Dec 13 14:26:37.450098 env[1266]: 2024-12-13 14:26:37.446 [INFO][4700] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:26:37.450098 env[1266]: 2024-12-13 14:26:37.447 [INFO][4694] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" Dec 13 14:26:37.450098 env[1266]: time="2024-12-13T14:26:37.448932502Z" level=info msg="TearDown network for sandbox \"1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa\" successfully" Dec 13 14:26:37.450098 env[1266]: time="2024-12-13T14:26:37.448951806Z" level=info msg="StopPodSandbox for \"1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa\" returns successfully" Dec 13 14:26:37.450569 env[1266]: time="2024-12-13T14:26:37.450554350Z" level=info msg="RemovePodSandbox for \"1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa\"" Dec 13 14:26:37.450666 env[1266]: time="2024-12-13T14:26:37.450635307Z" level=info msg="Forcibly stopping sandbox \"1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa\"" Dec 13 14:26:37.495585 env[1266]: 2024-12-13 14:26:37.472 [WARNING][4719] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--xlj8g-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c89227ed-30a3-4f3d-ba16-397f58d31fe4", ResourceVersion:"846", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 25, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"053dd7232ddbb43fcab05de504379de52cb13b238d2133b4f21f45ede7397eab", Pod:"csi-node-driver-xlj8g", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali1f5b88f88b5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:26:37.495585 env[1266]: 2024-12-13 14:26:37.473 [INFO][4719] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" Dec 13 14:26:37.495585 env[1266]: 2024-12-13 14:26:37.473 [INFO][4719] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" iface="eth0" netns="" Dec 13 14:26:37.495585 env[1266]: 2024-12-13 14:26:37.473 [INFO][4719] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" Dec 13 14:26:37.495585 env[1266]: 2024-12-13 14:26:37.473 [INFO][4719] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" Dec 13 14:26:37.495585 env[1266]: 2024-12-13 14:26:37.486 [INFO][4726] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" HandleID="k8s-pod-network.1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" Workload="localhost-k8s-csi--node--driver--xlj8g-eth0" Dec 13 14:26:37.495585 env[1266]: 2024-12-13 14:26:37.486 [INFO][4726] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:26:37.495585 env[1266]: 2024-12-13 14:26:37.486 [INFO][4726] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:26:37.495585 env[1266]: 2024-12-13 14:26:37.491 [WARNING][4726] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" HandleID="k8s-pod-network.1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" Workload="localhost-k8s-csi--node--driver--xlj8g-eth0" Dec 13 14:26:37.495585 env[1266]: 2024-12-13 14:26:37.491 [INFO][4726] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" HandleID="k8s-pod-network.1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" Workload="localhost-k8s-csi--node--driver--xlj8g-eth0" Dec 13 14:26:37.495585 env[1266]: 2024-12-13 14:26:37.493 [INFO][4726] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:26:37.495585 env[1266]: 2024-12-13 14:26:37.494 [INFO][4719] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa" Dec 13 14:26:37.501639 env[1266]: time="2024-12-13T14:26:37.495823700Z" level=info msg="TearDown network for sandbox \"1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa\" successfully" Dec 13 14:26:37.507000 audit[2044]: AVC avc: denied { watch } for pid=2044 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:26:37.512648 kernel: kauditd_printk_skb: 51 callbacks suppressed Dec 13 14:26:37.512692 kernel: audit: type=1400 audit(1734099997.507:1361): avc: denied { watch } for pid=2044 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:26:37.512713 kernel: audit: type=1300 audit(1734099997.507:1361): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c0017fd180 a2=fc6 a3=0 items=0 ppid=1881 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 key=(null) Dec 13 14:26:37.507000 audit[2044]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=c0017fd180 a2=fc6 a3=0 items=0 ppid=1881 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 key=(null) Dec 13 14:26:37.512829 env[1266]: time="2024-12-13T14:26:37.509700149Z" level=info msg="RemovePodSandbox \"1a2538328a6e66229891553874b40096597b906c4fd0e934dd21f6dc65266dfa\" returns successfully" Dec 13 14:26:37.507000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:26:37.519912 kernel: audit: type=1327 audit(1734099997.507:1361): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:26:37.533000 audit[2044]: AVC avc: denied { watch } for pid=2044 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:26:37.533000 audit[2044]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f6ea40 a2=fc6 a3=0 items=0 ppid=1881 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 key=(null) Dec 13 14:26:37.542220 kernel: audit: type=1400 audit(1734099997.533:1362): avc: denied { watch } for pid=2044 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:26:37.542263 kernel: audit: type=1300 audit(1734099997.533:1362): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f6ea40 a2=fc6 a3=0 items=0 ppid=1881 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 key=(null) Dec 13 14:26:37.533000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:26:37.545691 kernel: audit: type=1327 audit(1734099997.533:1362): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:26:37.587000 audit[2044]: AVC avc: denied { watch } for pid=2044 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:26:37.587000 audit[2044]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000f6eb20 a2=fc6 a3=0 items=0 ppid=1881 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 key=(null) Dec 13 14:26:37.596226 kernel: audit: type=1400 audit(1734099997.587:1363): avc: denied { watch } for pid=2044 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:26:37.596270 kernel: audit: type=1300 audit(1734099997.587:1363): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000f6eb20 a2=fc6 a3=0 items=0 ppid=1881 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 key=(null) Dec 13 14:26:37.596300 kernel: audit: type=1327 audit(1734099997.587:1363): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:26:37.587000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:26:37.600000 audit[2044]: AVC avc: denied { watch } for pid=2044 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:26:37.606550 kernel: audit: type=1400 audit(1734099997.600:1364): avc: denied { watch } for pid=2044 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:26:37.600000 audit[2044]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c000f6eb40 a2=fc6 a3=0 items=0 ppid=1881 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 key=(null) Dec 13 14:26:37.600000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:26:50.878099 systemd[1]: run-containerd-runc-k8s.io-4dea773aebc517ea91ff75ece6a4172992de97da82e0f3edf2b8427e2f93c2c3-runc.CxMfWv.mount: Deactivated successfully. Dec 13 14:26:52.250039 kubelet[2200]: I1213 14:26:52.250018 2200 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:26:52.420000 audit[4778]: NETFILTER_CFG table=filter:117 family=2 entries=9 op=nft_register_rule pid=4778 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:52.433569 kernel: kauditd_printk_skb: 2 callbacks suppressed Dec 13 14:26:52.433644 kernel: audit: type=1325 audit(1734100012.420:1365): table=filter:117 family=2 entries=9 op=nft_register_rule pid=4778 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:52.433672 kernel: audit: type=1300 audit(1734100012.420:1365): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffffeda97b0 a2=0 a3=7ffffeda979c items=0 ppid=2331 pid=4778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:52.433692 kernel: audit: type=1327 audit(1734100012.420:1365): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:52.420000 audit[4778]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffffeda97b0 a2=0 a3=7ffffeda979c items=0 ppid=2331 pid=4778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:52.441262 kernel: audit: type=1325 audit(1734100012.432:1366): table=nat:118 family=2 entries=27 op=nft_register_chain pid=4778 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:52.454978 kernel: audit: type=1300 audit(1734100012.432:1366): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffffeda97b0 a2=0 a3=7ffffeda979c items=0 ppid=2331 pid=4778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:52.455006 kernel: audit: type=1327 audit(1734100012.432:1366): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:52.420000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:52.432000 audit[4778]: NETFILTER_CFG table=nat:118 family=2 entries=27 op=nft_register_chain pid=4778 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:26:52.432000 audit[4778]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffffeda97b0 a2=0 a3=7ffffeda979c items=0 ppid=2331 pid=4778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:26:52.432000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:26:54.634395 systemd[1]: run-containerd-runc-k8s.io-6c01a9320319e7b98dde5f53166fb8dc4d01b548439e4ce50f231679beed80ab-runc.5d0KiH.mount: Deactivated successfully. Dec 13 14:27:00.225513 kubelet[2200]: I1213 14:27:00.225487 2200 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:27:00.296000 audit[4813]: NETFILTER_CFG table=filter:119 family=2 entries=8 op=nft_register_rule pid=4813 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:00.296000 audit[4813]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc17bfe930 a2=0 a3=7ffc17bfe91c items=0 ppid=2331 pid=4813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:00.304811 kernel: audit: type=1325 audit(1734100020.296:1367): table=filter:119 family=2 entries=8 op=nft_register_rule pid=4813 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:00.304862 kernel: audit: type=1300 audit(1734100020.296:1367): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc17bfe930 a2=0 a3=7ffc17bfe91c items=0 ppid=2331 pid=4813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:00.304883 kernel: audit: type=1327 audit(1734100020.296:1367): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:00.296000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:00.307000 audit[4813]: NETFILTER_CFG table=nat:120 family=2 entries=34 op=nft_register_chain pid=4813 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:00.307000 audit[4813]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffc17bfe930 a2=0 a3=7ffc17bfe91c items=0 ppid=2331 pid=4813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:00.315653 kernel: audit: type=1325 audit(1734100020.307:1368): table=nat:120 family=2 entries=34 op=nft_register_chain pid=4813 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:00.315713 kernel: audit: type=1300 audit(1734100020.307:1368): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffc17bfe930 a2=0 a3=7ffc17bfe91c items=0 ppid=2331 pid=4813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:00.315740 kernel: audit: type=1327 audit(1734100020.307:1368): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:00.307000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:01.330241 systemd[1]: Started sshd@7-139.178.70.104:22-147.75.109.163:41586.service. Dec 13 14:27:01.342608 kernel: audit: type=1130 audit(1734100021.330:1369): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.104:22-147.75.109.163:41586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:01.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.104:22-147.75.109.163:41586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:01.526000 audit[4818]: USER_ACCT pid=4818 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:01.528529 sshd[4818]: Accepted publickey for core from 147.75.109.163 port 41586 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:27:01.530000 audit[4818]: CRED_ACQ pid=4818 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:01.535800 kernel: audit: type=1101 audit(1734100021.526:1370): pid=4818 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:01.535837 kernel: audit: type=1103 audit(1734100021.530:1371): pid=4818 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:01.535857 kernel: audit: type=1006 audit(1734100021.530:1372): pid=4818 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Dec 13 14:27:01.536886 sshd[4818]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:01.530000 audit[4818]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff3a4ee90 a2=3 a3=0 items=0 ppid=1 pid=4818 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:01.530000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:01.563590 systemd-logind[1236]: New session 10 of user core. Dec 13 14:27:01.564511 systemd[1]: Started session-10.scope. Dec 13 14:27:01.566000 audit[4818]: USER_START pid=4818 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:01.567000 audit[4822]: CRED_ACQ pid=4822 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:02.389505 sshd[4818]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:02.388000 audit[4818]: USER_END pid=4818 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:02.388000 audit[4818]: CRED_DISP pid=4818 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:02.391737 systemd-logind[1236]: Session 10 logged out. Waiting for processes to exit. Dec 13 14:27:02.392467 systemd[1]: sshd@7-139.178.70.104:22-147.75.109.163:41586.service: Deactivated successfully. Dec 13 14:27:02.393955 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 14:27:02.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.104:22-147.75.109.163:41586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:02.394785 systemd-logind[1236]: Removed session 10. Dec 13 14:27:07.395912 systemd[1]: Started sshd@8-139.178.70.104:22-147.75.109.163:49744.service. Dec 13 14:27:07.400787 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 14:27:07.400831 kernel: audit: type=1130 audit(1734100027.394:1378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.104:22-147.75.109.163:49744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:07.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.104:22-147.75.109.163:49744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:07.474000 audit[4835]: USER_ACCT pid=4835 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:07.476513 sshd[4835]: Accepted publickey for core from 147.75.109.163 port 49744 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:27:07.480571 kernel: audit: type=1101 audit(1734100027.474:1379): pid=4835 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:07.479000 audit[4835]: CRED_ACQ pid=4835 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:07.485896 kernel: audit: type=1103 audit(1734100027.479:1380): pid=4835 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:07.485938 kernel: audit: type=1006 audit(1734100027.479:1381): pid=4835 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Dec 13 14:27:07.485955 kernel: audit: type=1300 audit(1734100027.479:1381): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff42b3260 a2=3 a3=0 items=0 ppid=1 pid=4835 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:07.479000 audit[4835]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff42b3260 a2=3 a3=0 items=0 ppid=1 pid=4835 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:07.480893 sshd[4835]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:07.479000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:07.492315 kernel: audit: type=1327 audit(1734100027.479:1381): proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:07.491767 systemd[1]: Started session-11.scope. Dec 13 14:27:07.492017 systemd-logind[1236]: New session 11 of user core. Dec 13 14:27:07.494000 audit[4835]: USER_START pid=4835 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:07.503670 kernel: audit: type=1105 audit(1734100027.494:1382): pid=4835 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:07.503710 kernel: audit: type=1103 audit(1734100027.495:1383): pid=4837 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:07.495000 audit[4837]: CRED_ACQ pid=4837 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:07.700303 sshd[4835]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:07.700000 audit[4835]: USER_END pid=4835 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:07.711418 kernel: audit: type=1106 audit(1734100027.700:1384): pid=4835 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:07.712099 kernel: audit: type=1104 audit(1734100027.700:1385): pid=4835 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:07.700000 audit[4835]: CRED_DISP pid=4835 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:07.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.104:22-147.75.109.163:49744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:07.703087 systemd[1]: sshd@8-139.178.70.104:22-147.75.109.163:49744.service: Deactivated successfully. Dec 13 14:27:07.703558 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 14:27:07.711540 systemd-logind[1236]: Session 11 logged out. Waiting for processes to exit. Dec 13 14:27:07.713234 systemd-logind[1236]: Removed session 11. Dec 13 14:27:12.704179 systemd[1]: Started sshd@9-139.178.70.104:22-147.75.109.163:49754.service. Dec 13 14:27:12.711144 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:27:12.715838 kernel: audit: type=1130 audit(1734100032.704:1387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.104:22-147.75.109.163:49754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:12.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.104:22-147.75.109.163:49754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:12.774000 audit[4847]: USER_ACCT pid=4847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:12.779658 sshd[4847]: Accepted publickey for core from 147.75.109.163 port 49754 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:27:12.778000 audit[4847]: CRED_ACQ pid=4847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:12.789021 kernel: audit: type=1101 audit(1734100032.774:1388): pid=4847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:12.789057 kernel: audit: type=1103 audit(1734100032.778:1389): pid=4847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:12.789079 kernel: audit: type=1006 audit(1734100032.778:1390): pid=4847 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Dec 13 14:27:12.795935 kernel: audit: type=1300 audit(1734100032.778:1390): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffeafaba20 a2=3 a3=0 items=0 ppid=1 pid=4847 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:12.800640 kernel: audit: type=1327 audit(1734100032.778:1390): proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:12.800683 kernel: audit: type=1105 audit(1734100032.790:1391): pid=4847 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:12.800701 kernel: audit: type=1103 audit(1734100032.791:1392): pid=4849 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:12.778000 audit[4847]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffeafaba20 a2=3 a3=0 items=0 ppid=1 pid=4847 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:12.778000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:12.790000 audit[4847]: USER_START pid=4847 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:12.791000 audit[4849]: CRED_ACQ pid=4849 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:12.787805 systemd[1]: Started session-12.scope. Dec 13 14:27:12.780887 sshd[4847]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:12.788650 systemd-logind[1236]: New session 12 of user core. Dec 13 14:27:12.913751 sshd[4847]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:12.913000 audit[4847]: USER_END pid=4847 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:12.917000 audit[4847]: CRED_DISP pid=4847 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:12.921433 systemd[1]: Started sshd@10-139.178.70.104:22-147.75.109.163:49756.service. Dec 13 14:27:12.922150 kernel: audit: type=1106 audit(1734100032.913:1393): pid=4847 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:12.922222 kernel: audit: type=1104 audit(1734100032.917:1394): pid=4847 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:12.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.104:22-147.75.109.163:49756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:12.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.104:22-147.75.109.163:49754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:12.925240 systemd[1]: sshd@9-139.178.70.104:22-147.75.109.163:49754.service: Deactivated successfully. Dec 13 14:27:12.926414 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 14:27:12.928493 systemd-logind[1236]: Session 12 logged out. Waiting for processes to exit. Dec 13 14:27:12.929671 systemd-logind[1236]: Removed session 12. Dec 13 14:27:12.956000 audit[4859]: USER_ACCT pid=4859 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:12.957000 audit[4859]: CRED_ACQ pid=4859 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:12.957000 audit[4859]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc29318620 a2=3 a3=0 items=0 ppid=1 pid=4859 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:12.957000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:12.960311 sshd[4859]: Accepted publickey for core from 147.75.109.163 port 49756 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:27:12.959780 sshd[4859]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:12.965806 systemd-logind[1236]: New session 13 of user core. Dec 13 14:27:12.966283 systemd[1]: Started session-13.scope. Dec 13 14:27:12.968000 audit[4859]: USER_START pid=4859 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:12.970000 audit[4862]: CRED_ACQ pid=4862 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:13.197835 systemd[1]: Started sshd@11-139.178.70.104:22-147.75.109.163:49772.service. Dec 13 14:27:13.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.104:22-147.75.109.163:49772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:13.203852 sshd[4859]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:13.214000 audit[4859]: USER_END pid=4859 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:13.214000 audit[4859]: CRED_DISP pid=4859 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:13.217235 systemd[1]: sshd@10-139.178.70.104:22-147.75.109.163:49756.service: Deactivated successfully. Dec 13 14:27:13.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.104:22-147.75.109.163:49756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:13.217959 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 14:27:13.218317 systemd-logind[1236]: Session 13 logged out. Waiting for processes to exit. Dec 13 14:27:13.218950 systemd-logind[1236]: Removed session 13. Dec 13 14:27:13.856000 audit[4868]: USER_ACCT pid=4868 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:13.858269 sshd[4868]: Accepted publickey for core from 147.75.109.163 port 49772 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:27:13.857000 audit[4868]: CRED_ACQ pid=4868 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:13.857000 audit[4868]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd83045f00 a2=3 a3=0 items=0 ppid=1 pid=4868 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:13.857000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:13.859868 sshd[4868]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:13.863783 systemd[1]: Started session-14.scope. Dec 13 14:27:13.863895 systemd-logind[1236]: New session 14 of user core. Dec 13 14:27:13.866000 audit[4868]: USER_START pid=4868 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:13.867000 audit[4871]: CRED_ACQ pid=4871 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:14.064146 sshd[4868]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:14.063000 audit[4868]: USER_END pid=4868 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:14.063000 audit[4868]: CRED_DISP pid=4868 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:14.066098 systemd[1]: sshd@11-139.178.70.104:22-147.75.109.163:49772.service: Deactivated successfully. Dec 13 14:27:14.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.104:22-147.75.109.163:49772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:14.066567 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 14:27:14.066582 systemd-logind[1236]: Session 14 logged out. Waiting for processes to exit. Dec 13 14:27:14.067432 systemd-logind[1236]: Removed session 14. Dec 13 14:27:19.067878 systemd[1]: Started sshd@12-139.178.70.104:22-147.75.109.163:54140.service. Dec 13 14:27:19.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.104:22-147.75.109.163:54140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.069099 kernel: kauditd_printk_skb: 23 callbacks suppressed Dec 13 14:27:19.069152 kernel: audit: type=1130 audit(1734100039.066:1414): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.104:22-147.75.109.163:54140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:19.157000 audit[4909]: USER_ACCT pid=4909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:19.161592 sshd[4909]: Accepted publickey for core from 147.75.109.163 port 54140 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:27:19.161000 audit[4909]: CRED_ACQ pid=4909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:19.164339 sshd[4909]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:19.166595 kernel: audit: type=1101 audit(1734100039.157:1415): pid=4909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:19.166632 kernel: audit: type=1103 audit(1734100039.161:1416): pid=4909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:19.166651 kernel: audit: type=1006 audit(1734100039.162:1417): pid=4909 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 14:27:19.162000 audit[4909]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe19ef2670 a2=3 a3=0 items=0 ppid=1 pid=4909 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:19.171783 kernel: audit: type=1300 audit(1734100039.162:1417): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe19ef2670 a2=3 a3=0 items=0 ppid=1 pid=4909 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:19.171819 kernel: audit: type=1327 audit(1734100039.162:1417): proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:19.162000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:19.173973 systemd[1]: Started session-15.scope. Dec 13 14:27:19.174878 systemd-logind[1236]: New session 15 of user core. Dec 13 14:27:19.176000 audit[4909]: USER_START pid=4909 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:19.177000 audit[4911]: CRED_ACQ pid=4911 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:19.184842 kernel: audit: type=1105 audit(1734100039.176:1418): pid=4909 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:19.184900 kernel: audit: type=1103 audit(1734100039.177:1419): pid=4911 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:19.446744 sshd[4909]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:19.455000 audit[4909]: USER_END pid=4909 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:19.461350 kernel: audit: type=1106 audit(1734100039.455:1420): pid=4909 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:19.461383 kernel: audit: type=1104 audit(1734100039.456:1421): pid=4909 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:19.456000 audit[4909]: CRED_DISP pid=4909 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:19.461030 systemd-logind[1236]: Session 15 logged out. Waiting for processes to exit. Dec 13 14:27:19.462161 systemd[1]: sshd@12-139.178.70.104:22-147.75.109.163:54140.service: Deactivated successfully. Dec 13 14:27:19.462608 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 14:27:19.463485 systemd-logind[1236]: Removed session 15. Dec 13 14:27:19.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.104:22-147.75.109.163:54140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:24.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.104:22-147.75.109.163:54154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:24.444215 systemd[1]: Started sshd@13-139.178.70.104:22-147.75.109.163:54154.service. Dec 13 14:27:24.451109 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:27:24.451138 kernel: audit: type=1130 audit(1734100044.442:1423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.104:22-147.75.109.163:54154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:24.520000 audit[4925]: USER_ACCT pid=4925 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:24.521795 sshd[4925]: Accepted publickey for core from 147.75.109.163 port 54154 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:27:24.525579 kernel: audit: type=1101 audit(1734100044.520:1424): pid=4925 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:24.530698 kernel: audit: type=1103 audit(1734100044.524:1425): pid=4925 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:24.530735 kernel: audit: type=1006 audit(1734100044.524:1426): pid=4925 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 14:27:24.524000 audit[4925]: CRED_ACQ pid=4925 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:24.526117 sshd[4925]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:24.529429 systemd[1]: Started session-16.scope. Dec 13 14:27:24.524000 audit[4925]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5b20a7a0 a2=3 a3=0 items=0 ppid=1 pid=4925 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:24.530277 systemd-logind[1236]: New session 16 of user core. Dec 13 14:27:24.535065 kernel: audit: type=1300 audit(1734100044.524:1426): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5b20a7a0 a2=3 a3=0 items=0 ppid=1 pid=4925 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:24.539996 kernel: audit: type=1327 audit(1734100044.524:1426): proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:24.540057 kernel: audit: type=1105 audit(1734100044.532:1427): pid=4925 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:24.540074 kernel: audit: type=1103 audit(1734100044.534:1428): pid=4927 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:24.524000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:24.532000 audit[4925]: USER_START pid=4925 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:24.534000 audit[4927]: CRED_ACQ pid=4927 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:24.658196 sshd[4925]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:24.657000 audit[4925]: USER_END pid=4925 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:24.660925 systemd-logind[1236]: Session 16 logged out. Waiting for processes to exit. Dec 13 14:27:24.661989 systemd[1]: sshd@13-139.178.70.104:22-147.75.109.163:54154.service: Deactivated successfully. Dec 13 14:27:24.662423 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 14:27:24.657000 audit[4925]: CRED_DISP pid=4925 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:24.663679 systemd-logind[1236]: Removed session 16. Dec 13 14:27:24.666537 kernel: audit: type=1106 audit(1734100044.657:1429): pid=4925 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:24.666607 kernel: audit: type=1104 audit(1734100044.657:1430): pid=4925 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:24.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.104:22-147.75.109.163:54154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:27.248000 audit[4327]: AVC avc: denied { watch } for pid=4327 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_26_05.1243136933/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c428,c743 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c428,c743 tclass=file permissive=0 Dec 13 14:27:27.248000 audit[4327]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0009a4680 a2=fc6 a3=0 items=0 ppid=3887 pid=4327 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c428,c743 key=(null) Dec 13 14:27:27.248000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:27:27.470000 audit[2044]: AVC avc: denied { watch } for pid=2044 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:27:27.470000 audit[2044]: AVC avc: denied { watch } for pid=2044 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:27:27.470000 audit[2044]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00265fb90 a2=fc6 a3=0 items=0 ppid=1881 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 key=(null) Dec 13 14:27:27.470000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:27:27.470000 audit[2044]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002cfb680 a2=fc6 a3=0 items=0 ppid=1881 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 key=(null) Dec 13 14:27:27.470000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:27:27.730000 audit[4368]: AVC avc: denied { watch } for pid=4368 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_26_05.4127477885/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c448,c880 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c448,c880 tclass=file permissive=0 Dec 13 14:27:27.730000 audit[4368]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c01b20 a2=fc6 a3=0 items=0 ppid=4078 pid=4368 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c448,c880 key=(null) Dec 13 14:27:27.730000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:27:29.533000 audit[2080]: AVC avc: denied { watch } for pid=2080 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:27:29.538512 kernel: kauditd_printk_skb: 13 callbacks suppressed Dec 13 14:27:29.538568 kernel: audit: type=1400 audit(1734100049.533:1436): avc: denied { watch } for pid=2080 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:27:29.533000 audit[2080]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c010eb34a0 a2=fc6 a3=0 items=0 ppid=1963 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 key=(null) Dec 13 14:27:29.533000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:27:29.546051 kernel: audit: type=1300 audit(1734100049.533:1436): arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c010eb34a0 a2=fc6 a3=0 items=0 ppid=1963 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 key=(null) Dec 13 14:27:29.546093 kernel: audit: type=1327 audit(1734100049.533:1436): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:27:29.546113 kernel: audit: type=1400 audit(1734100049.534:1437): avc: denied { watch } for pid=2080 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:27:29.534000 audit[2080]: AVC avc: denied { watch } for pid=2080 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:27:29.534000 audit[2080]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c010dcfd60 a2=fc6 a3=0 items=0 ppid=1963 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 key=(null) Dec 13 14:27:29.552903 kernel: audit: type=1300 audit(1734100049.534:1437): arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c010dcfd60 a2=fc6 a3=0 items=0 ppid=1963 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 key=(null) Dec 13 14:27:29.552948 kernel: audit: type=1327 audit(1734100049.534:1437): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:27:29.534000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:27:29.535000 audit[2080]: AVC avc: denied { watch } for pid=2080 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:27:29.559286 kernel: audit: type=1400 audit(1734100049.535:1438): avc: denied { watch } for pid=2080 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:27:29.559323 kernel: audit: type=1300 audit(1734100049.535:1438): arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c010eb3500 a2=fc6 a3=0 items=0 ppid=1963 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 key=(null) Dec 13 14:27:29.535000 audit[2080]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c010eb3500 a2=fc6 a3=0 items=0 ppid=1963 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 key=(null) Dec 13 14:27:29.535000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:27:29.566403 kernel: audit: type=1327 audit(1734100049.535:1438): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:27:29.566435 kernel: audit: type=1400 audit(1734100049.535:1439): avc: denied { watch } for pid=2080 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:27:29.535000 audit[2080]: AVC avc: denied { watch } for pid=2080 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:27:29.535000 audit[2080]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c011068270 a2=fc6 a3=0 items=0 ppid=1963 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 key=(null) Dec 13 14:27:29.535000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:27:29.660645 systemd[1]: Started sshd@14-139.178.70.104:22-147.75.109.163:49234.service. Dec 13 14:27:29.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.104:22-147.75.109.163:49234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:29.693000 audit[2080]: AVC avc: denied { watch } for pid=2080 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:27:29.693000 audit[2080]: AVC avc: denied { watch } for pid=2080 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8240 scontext=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:27:29.693000 audit[2080]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c010eb3620 a2=fc6 a3=0 items=0 ppid=1963 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 key=(null) Dec 13 14:27:29.693000 audit[2080]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c01107e200 a2=fc6 a3=0 items=0 ppid=1963 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c19,c1014 key=(null) Dec 13 14:27:29.693000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:27:29.693000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:27:29.834000 audit[4961]: USER_ACCT pid=4961 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:29.836621 sshd[4961]: Accepted publickey for core from 147.75.109.163 port 49234 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:27:29.836000 audit[4961]: CRED_ACQ pid=4961 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:29.836000 audit[4961]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff166c59c0 a2=3 a3=0 items=0 ppid=1 pid=4961 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:29.836000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:29.838399 sshd[4961]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:29.841277 systemd-logind[1236]: New session 17 of user core. Dec 13 14:27:29.841876 systemd[1]: Started session-17.scope. Dec 13 14:27:29.843000 audit[4961]: USER_START pid=4961 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:29.844000 audit[4963]: CRED_ACQ pid=4963 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:29.984234 sshd[4961]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:29.983000 audit[4961]: USER_END pid=4961 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:29.983000 audit[4961]: CRED_DISP pid=4961 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:29.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.104:22-147.75.109.163:49234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:29.986752 systemd-logind[1236]: Session 17 logged out. Waiting for processes to exit. Dec 13 14:27:29.986865 systemd[1]: sshd@14-139.178.70.104:22-147.75.109.163:49234.service: Deactivated successfully. Dec 13 14:27:29.987312 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 14:27:29.987922 systemd-logind[1236]: Removed session 17. Dec 13 14:27:34.987759 systemd[1]: Started sshd@15-139.178.70.104:22-147.75.109.163:49238.service. Dec 13 14:27:34.990573 kernel: kauditd_printk_skb: 19 callbacks suppressed Dec 13 14:27:34.990615 kernel: audit: type=1130 audit(1734100054.986:1451): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.104:22-147.75.109.163:49238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:34.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.104:22-147.75.109.163:49238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:35.022000 audit[4979]: USER_ACCT pid=4979 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:35.027779 kernel: audit: type=1101 audit(1734100055.022:1452): pid=4979 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:35.027813 sshd[4979]: Accepted publickey for core from 147.75.109.163 port 49238 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:27:35.027000 audit[4979]: CRED_ACQ pid=4979 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:35.037482 kernel: audit: type=1103 audit(1734100055.027:1453): pid=4979 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:35.037509 kernel: audit: type=1006 audit(1734100055.027:1454): pid=4979 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Dec 13 14:27:35.037528 kernel: audit: type=1300 audit(1734100055.027:1454): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc353a5470 a2=3 a3=0 items=0 ppid=1 pid=4979 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:35.027000 audit[4979]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc353a5470 a2=3 a3=0 items=0 ppid=1 pid=4979 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:35.028828 sshd[4979]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:35.027000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:35.040152 systemd-logind[1236]: New session 18 of user core. Dec 13 14:27:35.040621 kernel: audit: type=1327 audit(1734100055.027:1454): proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:35.040729 systemd[1]: Started session-18.scope. Dec 13 14:27:35.043000 audit[4979]: USER_START pid=4979 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:35.049562 kernel: audit: type=1105 audit(1734100055.043:1455): pid=4979 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:35.044000 audit[4981]: CRED_ACQ pid=4981 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:35.053561 kernel: audit: type=1103 audit(1734100055.044:1456): pid=4981 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:35.167286 sshd[4979]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:35.169855 systemd[1]: Started sshd@16-139.178.70.104:22-147.75.109.163:49244.service. Dec 13 14:27:35.173563 kernel: audit: type=1130 audit(1734100055.168:1457): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.104:22-147.75.109.163:49244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:35.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.104:22-147.75.109.163:49244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:35.173000 audit[4979]: USER_END pid=4979 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:35.173000 audit[4979]: CRED_DISP pid=4979 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:35.179564 kernel: audit: type=1106 audit(1734100055.173:1458): pid=4979 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:35.181115 systemd-logind[1236]: Session 18 logged out. Waiting for processes to exit. Dec 13 14:27:35.181224 systemd[1]: sshd@15-139.178.70.104:22-147.75.109.163:49238.service: Deactivated successfully. Dec 13 14:27:35.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.104:22-147.75.109.163:49238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:35.181693 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 14:27:35.182233 systemd-logind[1236]: Removed session 18. Dec 13 14:27:35.204000 audit[4990]: USER_ACCT pid=4990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:35.206049 sshd[4990]: Accepted publickey for core from 147.75.109.163 port 49244 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:27:35.205000 audit[4990]: CRED_ACQ pid=4990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:35.205000 audit[4990]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4b940520 a2=3 a3=0 items=0 ppid=1 pid=4990 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:35.205000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:35.207132 sshd[4990]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:35.209585 systemd-logind[1236]: New session 19 of user core. Dec 13 14:27:35.210118 systemd[1]: Started session-19.scope. Dec 13 14:27:35.211000 audit[4990]: USER_START pid=4990 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:35.212000 audit[4993]: CRED_ACQ pid=4993 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:35.578751 systemd[1]: Started sshd@17-139.178.70.104:22-147.75.109.163:49252.service. Dec 13 14:27:35.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.104:22-147.75.109.163:49252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:35.579297 sshd[4990]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:35.580000 audit[4990]: USER_END pid=4990 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:35.580000 audit[4990]: CRED_DISP pid=4990 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:35.583341 systemd-logind[1236]: Session 19 logged out. Waiting for processes to exit. Dec 13 14:27:35.583461 systemd[1]: sshd@16-139.178.70.104:22-147.75.109.163:49244.service: Deactivated successfully. Dec 13 14:27:35.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.104:22-147.75.109.163:49244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:35.583897 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 14:27:35.584641 systemd-logind[1236]: Removed session 19. Dec 13 14:27:35.623000 audit[5000]: USER_ACCT pid=5000 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:35.625172 sshd[5000]: Accepted publickey for core from 147.75.109.163 port 49252 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:27:35.624000 audit[5000]: CRED_ACQ pid=5000 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:35.624000 audit[5000]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6c8862d0 a2=3 a3=0 items=0 ppid=1 pid=5000 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:35.624000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:35.626651 sshd[5000]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:35.629533 systemd-logind[1236]: New session 20 of user core. Dec 13 14:27:35.630058 systemd[1]: Started session-20.scope. Dec 13 14:27:35.631000 audit[5000]: USER_START pid=5000 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:35.632000 audit[5003]: CRED_ACQ pid=5003 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:37.336203 systemd[1]: Started sshd@18-139.178.70.104:22-147.75.109.163:49620.service. Dec 13 14:27:37.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.104:22-147.75.109.163:49620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:37.361000 audit[5000]: USER_END pid=5000 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:37.363000 audit[5000]: CRED_DISP pid=5000 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:37.350352 sshd[5000]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:37.380000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.104:22-147.75.109.163:49252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:37.381565 systemd[1]: sshd@17-139.178.70.104:22-147.75.109.163:49252.service: Deactivated successfully. Dec 13 14:27:37.382133 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 14:27:37.383598 systemd-logind[1236]: Session 20 logged out. Waiting for processes to exit. Dec 13 14:27:37.384305 systemd-logind[1236]: Removed session 20. Dec 13 14:27:37.419000 audit[5019]: NETFILTER_CFG table=filter:121 family=2 entries=20 op=nft_register_rule pid=5019 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:37.419000 audit[5019]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd3c288fd0 a2=0 a3=7ffd3c288fbc items=0 ppid=2331 pid=5019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:37.419000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:37.425000 audit[5019]: NETFILTER_CFG table=nat:122 family=2 entries=22 op=nft_register_rule pid=5019 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:37.425000 audit[5019]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd3c288fd0 a2=0 a3=0 items=0 ppid=2331 pid=5019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:37.425000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:37.439000 audit[5015]: USER_ACCT pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:37.440895 sshd[5015]: Accepted publickey for core from 147.75.109.163 port 49620 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:27:37.440000 audit[5015]: CRED_ACQ pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:37.440000 audit[5015]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffeb332060 a2=3 a3=0 items=0 ppid=1 pid=5015 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:37.440000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:37.443174 sshd[5015]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:37.442000 audit[5021]: NETFILTER_CFG table=filter:123 family=2 entries=32 op=nft_register_rule pid=5021 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:37.442000 audit[5021]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffcbcecceb0 a2=0 a3=7ffcbcecce9c items=0 ppid=2331 pid=5021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:37.442000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:37.447938 systemd[1]: Started session-21.scope. Dec 13 14:27:37.448035 systemd-logind[1236]: New session 21 of user core. Dec 13 14:27:37.447000 audit[5021]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=5021 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:37.447000 audit[5021]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffcbcecceb0 a2=0 a3=0 items=0 ppid=2331 pid=5021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:37.447000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:37.449000 audit[5015]: USER_START pid=5015 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:37.450000 audit[5022]: CRED_ACQ pid=5022 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:37.570000 audit[2044]: AVC avc: denied { watch } for pid=2044 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:27:37.570000 audit[2044]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ddf700 a2=fc6 a3=0 items=0 ppid=1881 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 key=(null) Dec 13 14:27:37.570000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:27:37.601000 audit[2044]: AVC avc: denied { watch } for pid=2044 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:27:37.601000 audit[2044]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ddf720 a2=fc6 a3=0 items=0 ppid=1881 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 key=(null) Dec 13 14:27:37.601000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:27:37.601000 audit[2044]: AVC avc: denied { watch } for pid=2044 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:27:37.601000 audit[2044]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ab9960 a2=fc6 a3=0 items=0 ppid=1881 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 key=(null) Dec 13 14:27:37.601000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:27:37.607000 audit[2044]: AVC avc: denied { watch } for pid=2044 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:27:37.607000 audit[2044]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0017fc020 a2=fc6 a3=0 items=0 ppid=1881 pid=2044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c563,c967 key=(null) Dec 13 14:27:37.607000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:27:39.422746 systemd[1]: Started sshd@19-139.178.70.104:22-147.75.109.163:49630.service. Dec 13 14:27:39.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.104:22-147.75.109.163:49630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:39.426000 audit[5015]: USER_END pid=5015 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:39.426000 audit[5015]: CRED_DISP pid=5015 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:39.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.104:22-147.75.109.163:49620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:39.427410 sshd[5015]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:39.429739 systemd[1]: sshd@18-139.178.70.104:22-147.75.109.163:49620.service: Deactivated successfully. Dec 13 14:27:39.430233 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 14:27:39.430517 systemd-logind[1236]: Session 21 logged out. Waiting for processes to exit. Dec 13 14:27:39.431418 systemd-logind[1236]: Removed session 21. Dec 13 14:27:39.479000 audit[5029]: USER_ACCT pid=5029 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:39.481670 sshd[5029]: Accepted publickey for core from 147.75.109.163 port 49630 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:27:39.480000 audit[5029]: CRED_ACQ pid=5029 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:39.480000 audit[5029]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff00319d0 a2=3 a3=0 items=0 ppid=1 pid=5029 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:39.480000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:39.482806 sshd[5029]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:39.486944 systemd[1]: Started session-22.scope. Dec 13 14:27:39.487214 systemd-logind[1236]: New session 22 of user core. Dec 13 14:27:39.490000 audit[5029]: USER_START pid=5029 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:39.491000 audit[5032]: CRED_ACQ pid=5032 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:39.607583 sshd[5029]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:39.606000 audit[5029]: USER_END pid=5029 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:39.607000 audit[5029]: CRED_DISP pid=5029 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:39.608000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.104:22-147.75.109.163:49630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:39.609742 systemd[1]: sshd@19-139.178.70.104:22-147.75.109.163:49630.service: Deactivated successfully. Dec 13 14:27:39.610177 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 14:27:39.610436 systemd-logind[1236]: Session 22 logged out. Waiting for processes to exit. Dec 13 14:27:39.611033 systemd-logind[1236]: Removed session 22. Dec 13 14:27:42.481000 audit[5043]: NETFILTER_CFG table=filter:125 family=2 entries=20 op=nft_register_rule pid=5043 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:42.486207 kernel: kauditd_printk_skb: 69 callbacks suppressed Dec 13 14:27:42.488733 kernel: audit: type=1325 audit(1734100062.481:1504): table=filter:125 family=2 entries=20 op=nft_register_rule pid=5043 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:42.489087 kernel: audit: type=1300 audit(1734100062.481:1504): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe0e66e910 a2=0 a3=7ffe0e66e8fc items=0 ppid=2331 pid=5043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:42.481000 audit[5043]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe0e66e910 a2=0 a3=7ffe0e66e8fc items=0 ppid=2331 pid=5043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:42.481000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:42.489000 audit[5043]: NETFILTER_CFG table=nat:126 family=2 entries=106 op=nft_register_chain pid=5043 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:42.494989 kernel: audit: type=1327 audit(1734100062.481:1504): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:42.495033 kernel: audit: type=1325 audit(1734100062.489:1505): table=nat:126 family=2 entries=106 op=nft_register_chain pid=5043 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:27:42.495056 kernel: audit: type=1300 audit(1734100062.489:1505): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffe0e66e910 a2=0 a3=7ffe0e66e8fc items=0 ppid=2331 pid=5043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:42.489000 audit[5043]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffe0e66e910 a2=0 a3=7ffe0e66e8fc items=0 ppid=2331 pid=5043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:42.489000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:42.500649 kernel: audit: type=1327 audit(1734100062.489:1505): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:27:44.611485 systemd[1]: Started sshd@20-139.178.70.104:22-147.75.109.163:49632.service. Dec 13 14:27:44.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.104:22-147.75.109.163:49632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:44.616593 kernel: audit: type=1130 audit(1734100064.610:1506): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.104:22-147.75.109.163:49632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:44.720000 audit[5046]: USER_ACCT pid=5046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:44.723574 sshd[5046]: Accepted publickey for core from 147.75.109.163 port 49632 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:27:44.725559 kernel: audit: type=1101 audit(1734100064.720:1507): pid=5046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:44.724000 audit[5046]: CRED_ACQ pid=5046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:44.730849 kernel: audit: type=1103 audit(1734100064.724:1508): pid=5046 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:44.730887 kernel: audit: type=1006 audit(1734100064.724:1509): pid=5046 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Dec 13 14:27:44.724000 audit[5046]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2f6a4b30 a2=3 a3=0 items=0 ppid=1 pid=5046 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:44.724000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:44.731351 sshd[5046]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:44.735629 systemd[1]: Started session-23.scope. Dec 13 14:27:44.735897 systemd-logind[1236]: New session 23 of user core. Dec 13 14:27:44.737000 audit[5046]: USER_START pid=5046 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:44.738000 audit[5048]: CRED_ACQ pid=5048 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:44.915134 sshd[5046]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:44.914000 audit[5046]: USER_END pid=5046 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:44.914000 audit[5046]: CRED_DISP pid=5046 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:44.915000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.104:22-147.75.109.163:49632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:44.917392 systemd[1]: sshd@20-139.178.70.104:22-147.75.109.163:49632.service: Deactivated successfully. Dec 13 14:27:44.917879 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 14:27:44.918180 systemd-logind[1236]: Session 23 logged out. Waiting for processes to exit. Dec 13 14:27:44.918706 systemd-logind[1236]: Removed session 23. Dec 13 14:27:49.918625 systemd[1]: Started sshd@21-139.178.70.104:22-147.75.109.163:50010.service. Dec 13 14:27:49.920676 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 14:27:49.921956 kernel: audit: type=1130 audit(1734100069.917:1515): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.104:22-147.75.109.163:50010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:49.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.104:22-147.75.109.163:50010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:50.014000 audit[5080]: USER_ACCT pid=5080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:50.019610 sshd[5080]: Accepted publickey for core from 147.75.109.163 port 50010 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:27:50.021849 kernel: audit: type=1101 audit(1734100070.014:1516): pid=5080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:50.021000 audit[5080]: CRED_ACQ pid=5080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:50.027536 sshd[5080]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:50.029152 kernel: audit: type=1103 audit(1734100070.021:1517): pid=5080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:50.029188 kernel: audit: type=1006 audit(1734100070.022:1518): pid=5080 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 14:27:50.022000 audit[5080]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda6c10e80 a2=3 a3=0 items=0 ppid=1 pid=5080 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:50.032613 kernel: audit: type=1300 audit(1734100070.022:1518): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda6c10e80 a2=3 a3=0 items=0 ppid=1 pid=5080 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:50.022000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:50.033977 kernel: audit: type=1327 audit(1734100070.022:1518): proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:50.036930 systemd-logind[1236]: New session 24 of user core. Dec 13 14:27:50.037454 systemd[1]: Started session-24.scope. Dec 13 14:27:50.039000 audit[5080]: USER_START pid=5080 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:50.044575 kernel: audit: type=1105 audit(1734100070.039:1519): pid=5080 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:50.043000 audit[5083]: CRED_ACQ pid=5083 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:50.048564 kernel: audit: type=1103 audit(1734100070.043:1520): pid=5083 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:50.336519 sshd[5080]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:50.335000 audit[5080]: USER_END pid=5080 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:50.344029 kernel: audit: type=1106 audit(1734100070.335:1521): pid=5080 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:50.344144 kernel: audit: type=1104 audit(1734100070.335:1522): pid=5080 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:50.335000 audit[5080]: CRED_DISP pid=5080 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:50.342687 systemd[1]: sshd@21-139.178.70.104:22-147.75.109.163:50010.service: Deactivated successfully. Dec 13 14:27:50.343159 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 14:27:50.344717 systemd-logind[1236]: Session 24 logged out. Waiting for processes to exit. Dec 13 14:27:50.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.104:22-147.75.109.163:50010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:50.345509 systemd-logind[1236]: Removed session 24. Dec 13 14:27:50.870910 systemd[1]: run-containerd-runc-k8s.io-4dea773aebc517ea91ff75ece6a4172992de97da82e0f3edf2b8427e2f93c2c3-runc.sQo7uZ.mount: Deactivated successfully. Dec 13 14:27:54.636093 systemd[1]: run-containerd-runc-k8s.io-6c01a9320319e7b98dde5f53166fb8dc4d01b548439e4ce50f231679beed80ab-runc.KfDoBf.mount: Deactivated successfully. Dec 13 14:27:55.345613 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:27:55.346494 kernel: audit: type=1130 audit(1734100075.339:1524): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.104:22-147.75.109.163:50024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:55.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.104:22-147.75.109.163:50024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:55.341070 systemd[1]: Started sshd@22-139.178.70.104:22-147.75.109.163:50024.service. Dec 13 14:27:55.435000 audit[5154]: USER_ACCT pid=5154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:55.439000 audit[5154]: CRED_ACQ pid=5154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:55.441770 sshd[5154]: Accepted publickey for core from 147.75.109.163 port 50024 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:27:55.442361 sshd[5154]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:27:55.444409 kernel: audit: type=1101 audit(1734100075.435:1525): pid=5154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:55.444626 kernel: audit: type=1103 audit(1734100075.439:1526): pid=5154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:55.439000 audit[5154]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeffd5c800 a2=3 a3=0 items=0 ppid=1 pid=5154 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:55.450245 kernel: audit: type=1006 audit(1734100075.439:1527): pid=5154 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 13 14:27:55.450283 kernel: audit: type=1300 audit(1734100075.439:1527): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeffd5c800 a2=3 a3=0 items=0 ppid=1 pid=5154 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:27:55.439000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:55.453153 kernel: audit: type=1327 audit(1734100075.439:1527): proctitle=737368643A20636F7265205B707269765D Dec 13 14:27:55.454234 systemd[1]: Started session-25.scope. Dec 13 14:27:55.455069 systemd-logind[1236]: New session 25 of user core. Dec 13 14:27:55.456000 audit[5154]: USER_START pid=5154 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:55.460000 audit[5156]: CRED_ACQ pid=5156 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:55.465446 kernel: audit: type=1105 audit(1734100075.456:1528): pid=5154 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:55.465482 kernel: audit: type=1103 audit(1734100075.460:1529): pid=5156 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:55.875047 sshd[5154]: pam_unix(sshd:session): session closed for user core Dec 13 14:27:55.874000 audit[5154]: USER_END pid=5154 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:55.881061 kernel: audit: type=1106 audit(1734100075.874:1530): pid=5154 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:55.880330 systemd[1]: sshd@22-139.178.70.104:22-147.75.109.163:50024.service: Deactivated successfully. Dec 13 14:27:55.874000 audit[5154]: CRED_DISP pid=5154 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:55.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.104:22-147.75.109.163:50024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:27:55.880848 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 14:27:55.885878 kernel: audit: type=1104 audit(1734100075.874:1531): pid=5154 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:27:55.881703 systemd-logind[1236]: Session 25 logged out. Waiting for processes to exit. Dec 13 14:27:55.882293 systemd-logind[1236]: Removed session 25.