Dec 13 14:17:50.654845 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 14:17:50.654859 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:17:50.654865 kernel: Disabled fast string operations Dec 13 14:17:50.654869 kernel: BIOS-provided physical RAM map: Dec 13 14:17:50.654873 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ebff] usable Dec 13 14:17:50.654876 kernel: BIOS-e820: [mem 0x000000000009ec00-0x000000000009ffff] reserved Dec 13 14:17:50.654882 kernel: BIOS-e820: [mem 0x00000000000dc000-0x00000000000fffff] reserved Dec 13 14:17:50.654886 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007fedffff] usable Dec 13 14:17:50.654890 kernel: BIOS-e820: [mem 0x000000007fee0000-0x000000007fefefff] ACPI data Dec 13 14:17:50.654894 kernel: BIOS-e820: [mem 0x000000007feff000-0x000000007fefffff] ACPI NVS Dec 13 14:17:50.654898 kernel: BIOS-e820: [mem 0x000000007ff00000-0x000000007fffffff] usable Dec 13 14:17:50.654902 kernel: BIOS-e820: [mem 0x00000000f0000000-0x00000000f7ffffff] reserved Dec 13 14:17:50.654906 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec0ffff] reserved Dec 13 14:17:50.654910 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Dec 13 14:17:50.654916 kernel: BIOS-e820: [mem 0x00000000fffe0000-0x00000000ffffffff] reserved Dec 13 14:17:50.654921 kernel: NX (Execute Disable) protection: active Dec 13 14:17:50.654925 kernel: SMBIOS 2.7 present. Dec 13 14:17:50.654930 kernel: DMI: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/28/2020 Dec 13 14:17:50.654934 kernel: vmware: hypercall mode: 0x00 Dec 13 14:17:50.654938 kernel: Hypervisor detected: VMware Dec 13 14:17:50.654943 kernel: vmware: TSC freq read from hypervisor : 3408.000 MHz Dec 13 14:17:50.654948 kernel: vmware: Host bus clock speed read from hypervisor : 66000000 Hz Dec 13 14:17:50.654952 kernel: vmware: using clock offset of 4375357930 ns Dec 13 14:17:50.654957 kernel: tsc: Detected 3408.000 MHz processor Dec 13 14:17:50.654961 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 14:17:50.654966 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 14:17:50.654971 kernel: last_pfn = 0x80000 max_arch_pfn = 0x400000000 Dec 13 14:17:50.654975 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 14:17:50.654980 kernel: total RAM covered: 3072M Dec 13 14:17:50.654985 kernel: Found optimal setting for mtrr clean up Dec 13 14:17:50.654990 kernel: gran_size: 64K chunk_size: 64K num_reg: 2 lose cover RAM: 0G Dec 13 14:17:50.654995 kernel: Using GB pages for direct mapping Dec 13 14:17:50.654999 kernel: ACPI: Early table checksum verification disabled Dec 13 14:17:50.655004 kernel: ACPI: RSDP 0x00000000000F6A00 000024 (v02 PTLTD ) Dec 13 14:17:50.655008 kernel: ACPI: XSDT 0x000000007FEE965B 00005C (v01 INTEL 440BX 06040000 VMW 01324272) Dec 13 14:17:50.655013 kernel: ACPI: FACP 0x000000007FEFEE73 0000F4 (v04 INTEL 440BX 06040000 PTL 000F4240) Dec 13 14:17:50.655017 kernel: ACPI: DSDT 0x000000007FEEAD55 01411E (v01 PTLTD Custom 06040000 MSFT 03000001) Dec 13 14:17:50.655021 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Dec 13 14:17:50.655026 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Dec 13 14:17:50.655031 kernel: ACPI: BOOT 0x000000007FEEAD2D 000028 (v01 PTLTD $SBFTBL$ 06040000 LTP 00000001) Dec 13 14:17:50.655038 kernel: ACPI: APIC 0x000000007FEEA5EB 000742 (v01 PTLTD ? APIC 06040000 LTP 00000000) Dec 13 14:17:50.655042 kernel: ACPI: MCFG 0x000000007FEEA5AF 00003C (v01 PTLTD $PCITBL$ 06040000 LTP 00000001) Dec 13 14:17:50.655047 kernel: ACPI: SRAT 0x000000007FEE9757 0008A8 (v02 VMWARE MEMPLUG 06040000 VMW 00000001) Dec 13 14:17:50.655052 kernel: ACPI: HPET 0x000000007FEE971F 000038 (v01 VMWARE VMW HPET 06040000 VMW 00000001) Dec 13 14:17:50.655058 kernel: ACPI: WAET 0x000000007FEE96F7 000028 (v01 VMWARE VMW WAET 06040000 VMW 00000001) Dec 13 14:17:50.655063 kernel: ACPI: Reserving FACP table memory at [mem 0x7fefee73-0x7fefef66] Dec 13 14:17:50.655067 kernel: ACPI: Reserving DSDT table memory at [mem 0x7feead55-0x7fefee72] Dec 13 14:17:50.655072 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Dec 13 14:17:50.655077 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Dec 13 14:17:50.655082 kernel: ACPI: Reserving BOOT table memory at [mem 0x7feead2d-0x7feead54] Dec 13 14:17:50.655087 kernel: ACPI: Reserving APIC table memory at [mem 0x7feea5eb-0x7feead2c] Dec 13 14:17:50.655091 kernel: ACPI: Reserving MCFG table memory at [mem 0x7feea5af-0x7feea5ea] Dec 13 14:17:50.655096 kernel: ACPI: Reserving SRAT table memory at [mem 0x7fee9757-0x7fee9ffe] Dec 13 14:17:50.655102 kernel: ACPI: Reserving HPET table memory at [mem 0x7fee971f-0x7fee9756] Dec 13 14:17:50.655107 kernel: ACPI: Reserving WAET table memory at [mem 0x7fee96f7-0x7fee971e] Dec 13 14:17:50.655111 kernel: system APIC only can use physical flat Dec 13 14:17:50.655116 kernel: Setting APIC routing to physical flat. Dec 13 14:17:50.655121 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 14:17:50.655126 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Dec 13 14:17:50.655130 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Dec 13 14:17:50.655135 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Dec 13 14:17:50.655140 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Dec 13 14:17:50.655156 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Dec 13 14:17:50.655162 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Dec 13 14:17:50.655167 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Dec 13 14:17:50.655171 kernel: SRAT: PXM 0 -> APIC 0x10 -> Node 0 Dec 13 14:17:50.655176 kernel: SRAT: PXM 0 -> APIC 0x12 -> Node 0 Dec 13 14:17:50.655181 kernel: SRAT: PXM 0 -> APIC 0x14 -> Node 0 Dec 13 14:17:50.655185 kernel: SRAT: PXM 0 -> APIC 0x16 -> Node 0 Dec 13 14:17:50.655190 kernel: SRAT: PXM 0 -> APIC 0x18 -> Node 0 Dec 13 14:17:50.655195 kernel: SRAT: PXM 0 -> APIC 0x1a -> Node 0 Dec 13 14:17:50.655199 kernel: SRAT: PXM 0 -> APIC 0x1c -> Node 0 Dec 13 14:17:50.655206 kernel: SRAT: PXM 0 -> APIC 0x1e -> Node 0 Dec 13 14:17:50.655211 kernel: SRAT: PXM 0 -> APIC 0x20 -> Node 0 Dec 13 14:17:50.655215 kernel: SRAT: PXM 0 -> APIC 0x22 -> Node 0 Dec 13 14:17:50.655220 kernel: SRAT: PXM 0 -> APIC 0x24 -> Node 0 Dec 13 14:17:50.655225 kernel: SRAT: PXM 0 -> APIC 0x26 -> Node 0 Dec 13 14:17:50.655230 kernel: SRAT: PXM 0 -> APIC 0x28 -> Node 0 Dec 13 14:17:50.655234 kernel: SRAT: PXM 0 -> APIC 0x2a -> Node 0 Dec 13 14:17:50.655239 kernel: SRAT: PXM 0 -> APIC 0x2c -> Node 0 Dec 13 14:17:50.655244 kernel: SRAT: PXM 0 -> APIC 0x2e -> Node 0 Dec 13 14:17:50.655248 kernel: SRAT: PXM 0 -> APIC 0x30 -> Node 0 Dec 13 14:17:50.655254 kernel: SRAT: PXM 0 -> APIC 0x32 -> Node 0 Dec 13 14:17:50.655259 kernel: SRAT: PXM 0 -> APIC 0x34 -> Node 0 Dec 13 14:17:50.655264 kernel: SRAT: PXM 0 -> APIC 0x36 -> Node 0 Dec 13 14:17:50.655269 kernel: SRAT: PXM 0 -> APIC 0x38 -> Node 0 Dec 13 14:17:50.655274 kernel: SRAT: PXM 0 -> APIC 0x3a -> Node 0 Dec 13 14:17:50.655278 kernel: SRAT: PXM 0 -> APIC 0x3c -> Node 0 Dec 13 14:17:50.655283 kernel: SRAT: PXM 0 -> APIC 0x3e -> Node 0 Dec 13 14:17:50.655288 kernel: SRAT: PXM 0 -> APIC 0x40 -> Node 0 Dec 13 14:17:50.655293 kernel: SRAT: PXM 0 -> APIC 0x42 -> Node 0 Dec 13 14:17:50.655297 kernel: SRAT: PXM 0 -> APIC 0x44 -> Node 0 Dec 13 14:17:50.655303 kernel: SRAT: PXM 0 -> APIC 0x46 -> Node 0 Dec 13 14:17:50.655308 kernel: SRAT: PXM 0 -> APIC 0x48 -> Node 0 Dec 13 14:17:50.655313 kernel: SRAT: PXM 0 -> APIC 0x4a -> Node 0 Dec 13 14:17:50.655317 kernel: SRAT: PXM 0 -> APIC 0x4c -> Node 0 Dec 13 14:17:50.655322 kernel: SRAT: PXM 0 -> APIC 0x4e -> Node 0 Dec 13 14:17:50.655327 kernel: SRAT: PXM 0 -> APIC 0x50 -> Node 0 Dec 13 14:17:50.655332 kernel: SRAT: PXM 0 -> APIC 0x52 -> Node 0 Dec 13 14:17:50.655336 kernel: SRAT: PXM 0 -> APIC 0x54 -> Node 0 Dec 13 14:17:50.655341 kernel: SRAT: PXM 0 -> APIC 0x56 -> Node 0 Dec 13 14:17:50.655346 kernel: SRAT: PXM 0 -> APIC 0x58 -> Node 0 Dec 13 14:17:50.655351 kernel: SRAT: PXM 0 -> APIC 0x5a -> Node 0 Dec 13 14:17:50.655356 kernel: SRAT: PXM 0 -> APIC 0x5c -> Node 0 Dec 13 14:17:50.655361 kernel: SRAT: PXM 0 -> APIC 0x5e -> Node 0 Dec 13 14:17:50.655365 kernel: SRAT: PXM 0 -> APIC 0x60 -> Node 0 Dec 13 14:17:50.655370 kernel: SRAT: PXM 0 -> APIC 0x62 -> Node 0 Dec 13 14:17:50.655375 kernel: SRAT: PXM 0 -> APIC 0x64 -> Node 0 Dec 13 14:17:50.655380 kernel: SRAT: PXM 0 -> APIC 0x66 -> Node 0 Dec 13 14:17:50.655384 kernel: SRAT: PXM 0 -> APIC 0x68 -> Node 0 Dec 13 14:17:50.655389 kernel: SRAT: PXM 0 -> APIC 0x6a -> Node 0 Dec 13 14:17:50.655399 kernel: SRAT: PXM 0 -> APIC 0x6c -> Node 0 Dec 13 14:17:50.655405 kernel: SRAT: PXM 0 -> APIC 0x6e -> Node 0 Dec 13 14:17:50.655410 kernel: SRAT: PXM 0 -> APIC 0x70 -> Node 0 Dec 13 14:17:50.655414 kernel: SRAT: PXM 0 -> APIC 0x72 -> Node 0 Dec 13 14:17:50.655419 kernel: SRAT: PXM 0 -> APIC 0x74 -> Node 0 Dec 13 14:17:50.655424 kernel: SRAT: PXM 0 -> APIC 0x76 -> Node 0 Dec 13 14:17:50.655429 kernel: SRAT: PXM 0 -> APIC 0x78 -> Node 0 Dec 13 14:17:50.655437 kernel: SRAT: PXM 0 -> APIC 0x7a -> Node 0 Dec 13 14:17:50.655443 kernel: SRAT: PXM 0 -> APIC 0x7c -> Node 0 Dec 13 14:17:50.655448 kernel: SRAT: PXM 0 -> APIC 0x7e -> Node 0 Dec 13 14:17:50.655453 kernel: SRAT: PXM 0 -> APIC 0x80 -> Node 0 Dec 13 14:17:50.655459 kernel: SRAT: PXM 0 -> APIC 0x82 -> Node 0 Dec 13 14:17:50.655464 kernel: SRAT: PXM 0 -> APIC 0x84 -> Node 0 Dec 13 14:17:50.655469 kernel: SRAT: PXM 0 -> APIC 0x86 -> Node 0 Dec 13 14:17:50.655474 kernel: SRAT: PXM 0 -> APIC 0x88 -> Node 0 Dec 13 14:17:50.655479 kernel: SRAT: PXM 0 -> APIC 0x8a -> Node 0 Dec 13 14:17:50.655484 kernel: SRAT: PXM 0 -> APIC 0x8c -> Node 0 Dec 13 14:17:50.655489 kernel: SRAT: PXM 0 -> APIC 0x8e -> Node 0 Dec 13 14:17:50.655494 kernel: SRAT: PXM 0 -> APIC 0x90 -> Node 0 Dec 13 14:17:50.655501 kernel: SRAT: PXM 0 -> APIC 0x92 -> Node 0 Dec 13 14:17:50.655506 kernel: SRAT: PXM 0 -> APIC 0x94 -> Node 0 Dec 13 14:17:50.655511 kernel: SRAT: PXM 0 -> APIC 0x96 -> Node 0 Dec 13 14:17:50.655516 kernel: SRAT: PXM 0 -> APIC 0x98 -> Node 0 Dec 13 14:17:50.655521 kernel: SRAT: PXM 0 -> APIC 0x9a -> Node 0 Dec 13 14:17:50.655526 kernel: SRAT: PXM 0 -> APIC 0x9c -> Node 0 Dec 13 14:17:50.655531 kernel: SRAT: PXM 0 -> APIC 0x9e -> Node 0 Dec 13 14:17:50.655536 kernel: SRAT: PXM 0 -> APIC 0xa0 -> Node 0 Dec 13 14:17:50.655541 kernel: SRAT: PXM 0 -> APIC 0xa2 -> Node 0 Dec 13 14:17:50.655546 kernel: SRAT: PXM 0 -> APIC 0xa4 -> Node 0 Dec 13 14:17:50.655552 kernel: SRAT: PXM 0 -> APIC 0xa6 -> Node 0 Dec 13 14:17:50.655557 kernel: SRAT: PXM 0 -> APIC 0xa8 -> Node 0 Dec 13 14:17:50.655562 kernel: SRAT: PXM 0 -> APIC 0xaa -> Node 0 Dec 13 14:17:50.655567 kernel: SRAT: PXM 0 -> APIC 0xac -> Node 0 Dec 13 14:17:50.655572 kernel: SRAT: PXM 0 -> APIC 0xae -> Node 0 Dec 13 14:17:50.655578 kernel: SRAT: PXM 0 -> APIC 0xb0 -> Node 0 Dec 13 14:17:50.655583 kernel: SRAT: PXM 0 -> APIC 0xb2 -> Node 0 Dec 13 14:17:50.655588 kernel: SRAT: PXM 0 -> APIC 0xb4 -> Node 0 Dec 13 14:17:50.655593 kernel: SRAT: PXM 0 -> APIC 0xb6 -> Node 0 Dec 13 14:17:50.655598 kernel: SRAT: PXM 0 -> APIC 0xb8 -> Node 0 Dec 13 14:17:50.655604 kernel: SRAT: PXM 0 -> APIC 0xba -> Node 0 Dec 13 14:17:50.655609 kernel: SRAT: PXM 0 -> APIC 0xbc -> Node 0 Dec 13 14:17:50.655614 kernel: SRAT: PXM 0 -> APIC 0xbe -> Node 0 Dec 13 14:17:50.655619 kernel: SRAT: PXM 0 -> APIC 0xc0 -> Node 0 Dec 13 14:17:50.655624 kernel: SRAT: PXM 0 -> APIC 0xc2 -> Node 0 Dec 13 14:17:50.655629 kernel: SRAT: PXM 0 -> APIC 0xc4 -> Node 0 Dec 13 14:17:50.655634 kernel: SRAT: PXM 0 -> APIC 0xc6 -> Node 0 Dec 13 14:17:50.655639 kernel: SRAT: PXM 0 -> APIC 0xc8 -> Node 0 Dec 13 14:17:50.655644 kernel: SRAT: PXM 0 -> APIC 0xca -> Node 0 Dec 13 14:17:50.655650 kernel: SRAT: PXM 0 -> APIC 0xcc -> Node 0 Dec 13 14:17:50.655655 kernel: SRAT: PXM 0 -> APIC 0xce -> Node 0 Dec 13 14:17:50.655660 kernel: SRAT: PXM 0 -> APIC 0xd0 -> Node 0 Dec 13 14:17:50.655665 kernel: SRAT: PXM 0 -> APIC 0xd2 -> Node 0 Dec 13 14:17:50.655670 kernel: SRAT: PXM 0 -> APIC 0xd4 -> Node 0 Dec 13 14:17:50.655675 kernel: SRAT: PXM 0 -> APIC 0xd6 -> Node 0 Dec 13 14:17:50.655680 kernel: SRAT: PXM 0 -> APIC 0xd8 -> Node 0 Dec 13 14:17:50.655685 kernel: SRAT: PXM 0 -> APIC 0xda -> Node 0 Dec 13 14:17:50.655690 kernel: SRAT: PXM 0 -> APIC 0xdc -> Node 0 Dec 13 14:17:50.655695 kernel: SRAT: PXM 0 -> APIC 0xde -> Node 0 Dec 13 14:17:50.655701 kernel: SRAT: PXM 0 -> APIC 0xe0 -> Node 0 Dec 13 14:17:50.655706 kernel: SRAT: PXM 0 -> APIC 0xe2 -> Node 0 Dec 13 14:17:50.655711 kernel: SRAT: PXM 0 -> APIC 0xe4 -> Node 0 Dec 13 14:17:50.655716 kernel: SRAT: PXM 0 -> APIC 0xe6 -> Node 0 Dec 13 14:17:50.655721 kernel: SRAT: PXM 0 -> APIC 0xe8 -> Node 0 Dec 13 14:17:50.655727 kernel: SRAT: PXM 0 -> APIC 0xea -> Node 0 Dec 13 14:17:50.655732 kernel: SRAT: PXM 0 -> APIC 0xec -> Node 0 Dec 13 14:17:50.655737 kernel: SRAT: PXM 0 -> APIC 0xee -> Node 0 Dec 13 14:17:50.655742 kernel: SRAT: PXM 0 -> APIC 0xf0 -> Node 0 Dec 13 14:17:50.655747 kernel: SRAT: PXM 0 -> APIC 0xf2 -> Node 0 Dec 13 14:17:50.655753 kernel: SRAT: PXM 0 -> APIC 0xf4 -> Node 0 Dec 13 14:17:50.655758 kernel: SRAT: PXM 0 -> APIC 0xf6 -> Node 0 Dec 13 14:17:50.655763 kernel: SRAT: PXM 0 -> APIC 0xf8 -> Node 0 Dec 13 14:17:50.655768 kernel: SRAT: PXM 0 -> APIC 0xfa -> Node 0 Dec 13 14:17:50.655773 kernel: SRAT: PXM 0 -> APIC 0xfc -> Node 0 Dec 13 14:17:50.655778 kernel: SRAT: PXM 0 -> APIC 0xfe -> Node 0 Dec 13 14:17:50.655783 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Dec 13 14:17:50.655789 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Dec 13 14:17:50.655794 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000-0xbfffffff] hotplug Dec 13 14:17:50.655800 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7fffffff] -> [mem 0x00000000-0x7fffffff] Dec 13 14:17:50.655806 kernel: NODE_DATA(0) allocated [mem 0x7fffa000-0x7fffffff] Dec 13 14:17:50.655811 kernel: Zone ranges: Dec 13 14:17:50.655816 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 14:17:50.655821 kernel: DMA32 [mem 0x0000000001000000-0x000000007fffffff] Dec 13 14:17:50.655827 kernel: Normal empty Dec 13 14:17:50.655832 kernel: Movable zone start for each node Dec 13 14:17:50.655837 kernel: Early memory node ranges Dec 13 14:17:50.655842 kernel: node 0: [mem 0x0000000000001000-0x000000000009dfff] Dec 13 14:17:50.655848 kernel: node 0: [mem 0x0000000000100000-0x000000007fedffff] Dec 13 14:17:50.655853 kernel: node 0: [mem 0x000000007ff00000-0x000000007fffffff] Dec 13 14:17:50.655859 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007fffffff] Dec 13 14:17:50.655864 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:17:50.655869 kernel: On node 0, zone DMA: 98 pages in unavailable ranges Dec 13 14:17:50.655874 kernel: On node 0, zone DMA32: 32 pages in unavailable ranges Dec 13 14:17:50.655879 kernel: ACPI: PM-Timer IO Port: 0x1008 Dec 13 14:17:50.655884 kernel: system APIC only can use physical flat Dec 13 14:17:50.655889 kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) Dec 13 14:17:50.655895 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Dec 13 14:17:50.655900 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Dec 13 14:17:50.655906 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Dec 13 14:17:50.655911 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Dec 13 14:17:50.655916 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Dec 13 14:17:50.655921 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Dec 13 14:17:50.655926 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Dec 13 14:17:50.655931 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Dec 13 14:17:50.655936 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Dec 13 14:17:50.655941 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Dec 13 14:17:50.655947 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Dec 13 14:17:50.655953 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Dec 13 14:17:50.655958 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Dec 13 14:17:50.655963 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Dec 13 14:17:50.655968 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Dec 13 14:17:50.655973 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Dec 13 14:17:50.655978 kernel: ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1]) Dec 13 14:17:50.655983 kernel: ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1]) Dec 13 14:17:50.655988 kernel: ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1]) Dec 13 14:17:50.655994 kernel: ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1]) Dec 13 14:17:50.656000 kernel: ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1]) Dec 13 14:17:50.656005 kernel: ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1]) Dec 13 14:17:50.656010 kernel: ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1]) Dec 13 14:17:50.656015 kernel: ACPI: LAPIC_NMI (acpi_id[0x18] high edge lint[0x1]) Dec 13 14:17:50.656020 kernel: ACPI: LAPIC_NMI (acpi_id[0x19] high edge lint[0x1]) Dec 13 14:17:50.656025 kernel: ACPI: LAPIC_NMI (acpi_id[0x1a] high edge lint[0x1]) Dec 13 14:17:50.656030 kernel: ACPI: LAPIC_NMI (acpi_id[0x1b] high edge lint[0x1]) Dec 13 14:17:50.656035 kernel: ACPI: LAPIC_NMI (acpi_id[0x1c] high edge lint[0x1]) Dec 13 14:17:50.656040 kernel: ACPI: LAPIC_NMI (acpi_id[0x1d] high edge lint[0x1]) Dec 13 14:17:50.656045 kernel: ACPI: LAPIC_NMI (acpi_id[0x1e] high edge lint[0x1]) Dec 13 14:17:50.656051 kernel: ACPI: LAPIC_NMI (acpi_id[0x1f] high edge lint[0x1]) Dec 13 14:17:50.656057 kernel: ACPI: LAPIC_NMI (acpi_id[0x20] high edge lint[0x1]) Dec 13 14:17:50.656062 kernel: ACPI: LAPIC_NMI (acpi_id[0x21] high edge lint[0x1]) Dec 13 14:17:50.656067 kernel: ACPI: LAPIC_NMI (acpi_id[0x22] high edge lint[0x1]) Dec 13 14:17:50.656073 kernel: ACPI: LAPIC_NMI (acpi_id[0x23] high edge lint[0x1]) Dec 13 14:17:50.656078 kernel: ACPI: LAPIC_NMI (acpi_id[0x24] high edge lint[0x1]) Dec 13 14:17:50.656083 kernel: ACPI: LAPIC_NMI (acpi_id[0x25] high edge lint[0x1]) Dec 13 14:17:50.656088 kernel: ACPI: LAPIC_NMI (acpi_id[0x26] high edge lint[0x1]) Dec 13 14:17:50.656093 kernel: ACPI: LAPIC_NMI (acpi_id[0x27] high edge lint[0x1]) Dec 13 14:17:50.656099 kernel: ACPI: LAPIC_NMI (acpi_id[0x28] high edge lint[0x1]) Dec 13 14:17:50.656104 kernel: ACPI: LAPIC_NMI (acpi_id[0x29] high edge lint[0x1]) Dec 13 14:17:50.656109 kernel: ACPI: LAPIC_NMI (acpi_id[0x2a] high edge lint[0x1]) Dec 13 14:17:50.656114 kernel: ACPI: LAPIC_NMI (acpi_id[0x2b] high edge lint[0x1]) Dec 13 14:17:50.656119 kernel: ACPI: LAPIC_NMI (acpi_id[0x2c] high edge lint[0x1]) Dec 13 14:17:50.656124 kernel: ACPI: LAPIC_NMI (acpi_id[0x2d] high edge lint[0x1]) Dec 13 14:17:50.656129 kernel: ACPI: LAPIC_NMI (acpi_id[0x2e] high edge lint[0x1]) Dec 13 14:17:50.656134 kernel: ACPI: LAPIC_NMI (acpi_id[0x2f] high edge lint[0x1]) Dec 13 14:17:50.656140 kernel: ACPI: LAPIC_NMI (acpi_id[0x30] high edge lint[0x1]) Dec 13 14:17:50.656154 kernel: ACPI: LAPIC_NMI (acpi_id[0x31] high edge lint[0x1]) Dec 13 14:17:50.656160 kernel: ACPI: LAPIC_NMI (acpi_id[0x32] high edge lint[0x1]) Dec 13 14:17:50.656165 kernel: ACPI: LAPIC_NMI (acpi_id[0x33] high edge lint[0x1]) Dec 13 14:17:50.656170 kernel: ACPI: LAPIC_NMI (acpi_id[0x34] high edge lint[0x1]) Dec 13 14:17:50.656175 kernel: ACPI: LAPIC_NMI (acpi_id[0x35] high edge lint[0x1]) Dec 13 14:17:50.656180 kernel: ACPI: LAPIC_NMI (acpi_id[0x36] high edge lint[0x1]) Dec 13 14:17:50.656186 kernel: ACPI: LAPIC_NMI (acpi_id[0x37] high edge lint[0x1]) Dec 13 14:17:50.656191 kernel: ACPI: LAPIC_NMI (acpi_id[0x38] high edge lint[0x1]) Dec 13 14:17:50.656196 kernel: ACPI: LAPIC_NMI (acpi_id[0x39] high edge lint[0x1]) Dec 13 14:17:50.656201 kernel: ACPI: LAPIC_NMI (acpi_id[0x3a] high edge lint[0x1]) Dec 13 14:17:50.656207 kernel: ACPI: LAPIC_NMI (acpi_id[0x3b] high edge lint[0x1]) Dec 13 14:17:50.656212 kernel: ACPI: LAPIC_NMI (acpi_id[0x3c] high edge lint[0x1]) Dec 13 14:17:50.656217 kernel: ACPI: LAPIC_NMI (acpi_id[0x3d] high edge lint[0x1]) Dec 13 14:17:50.656222 kernel: ACPI: LAPIC_NMI (acpi_id[0x3e] high edge lint[0x1]) Dec 13 14:17:50.656227 kernel: ACPI: LAPIC_NMI (acpi_id[0x3f] high edge lint[0x1]) Dec 13 14:17:50.656232 kernel: ACPI: LAPIC_NMI (acpi_id[0x40] high edge lint[0x1]) Dec 13 14:17:50.656238 kernel: ACPI: LAPIC_NMI (acpi_id[0x41] high edge lint[0x1]) Dec 13 14:17:50.656243 kernel: ACPI: LAPIC_NMI (acpi_id[0x42] high edge lint[0x1]) Dec 13 14:17:50.656248 kernel: ACPI: LAPIC_NMI (acpi_id[0x43] high edge lint[0x1]) Dec 13 14:17:50.656254 kernel: ACPI: LAPIC_NMI (acpi_id[0x44] high edge lint[0x1]) Dec 13 14:17:50.656259 kernel: ACPI: LAPIC_NMI (acpi_id[0x45] high edge lint[0x1]) Dec 13 14:17:50.656264 kernel: ACPI: LAPIC_NMI (acpi_id[0x46] high edge lint[0x1]) Dec 13 14:17:50.656269 kernel: ACPI: LAPIC_NMI (acpi_id[0x47] high edge lint[0x1]) Dec 13 14:17:50.656275 kernel: ACPI: LAPIC_NMI (acpi_id[0x48] high edge lint[0x1]) Dec 13 14:17:50.656280 kernel: ACPI: LAPIC_NMI (acpi_id[0x49] high edge lint[0x1]) Dec 13 14:17:50.656285 kernel: ACPI: LAPIC_NMI (acpi_id[0x4a] high edge lint[0x1]) Dec 13 14:17:50.656290 kernel: ACPI: LAPIC_NMI (acpi_id[0x4b] high edge lint[0x1]) Dec 13 14:17:50.656295 kernel: ACPI: LAPIC_NMI (acpi_id[0x4c] high edge lint[0x1]) Dec 13 14:17:50.656300 kernel: ACPI: LAPIC_NMI (acpi_id[0x4d] high edge lint[0x1]) Dec 13 14:17:50.656306 kernel: ACPI: LAPIC_NMI (acpi_id[0x4e] high edge lint[0x1]) Dec 13 14:17:50.656311 kernel: ACPI: LAPIC_NMI (acpi_id[0x4f] high edge lint[0x1]) Dec 13 14:17:50.656316 kernel: ACPI: LAPIC_NMI (acpi_id[0x50] high edge lint[0x1]) Dec 13 14:17:50.656321 kernel: ACPI: LAPIC_NMI (acpi_id[0x51] high edge lint[0x1]) Dec 13 14:17:50.656326 kernel: ACPI: LAPIC_NMI (acpi_id[0x52] high edge lint[0x1]) Dec 13 14:17:50.656331 kernel: ACPI: LAPIC_NMI (acpi_id[0x53] high edge lint[0x1]) Dec 13 14:17:50.656336 kernel: ACPI: LAPIC_NMI (acpi_id[0x54] high edge lint[0x1]) Dec 13 14:17:50.656341 kernel: ACPI: LAPIC_NMI (acpi_id[0x55] high edge lint[0x1]) Dec 13 14:17:50.656347 kernel: ACPI: LAPIC_NMI (acpi_id[0x56] high edge lint[0x1]) Dec 13 14:17:50.656353 kernel: ACPI: LAPIC_NMI (acpi_id[0x57] high edge lint[0x1]) Dec 13 14:17:50.656358 kernel: ACPI: LAPIC_NMI (acpi_id[0x58] high edge lint[0x1]) Dec 13 14:17:50.656363 kernel: ACPI: LAPIC_NMI (acpi_id[0x59] high edge lint[0x1]) Dec 13 14:17:50.656368 kernel: ACPI: LAPIC_NMI (acpi_id[0x5a] high edge lint[0x1]) Dec 13 14:17:50.656373 kernel: ACPI: LAPIC_NMI (acpi_id[0x5b] high edge lint[0x1]) Dec 13 14:17:50.656378 kernel: ACPI: LAPIC_NMI (acpi_id[0x5c] high edge lint[0x1]) Dec 13 14:17:50.656383 kernel: ACPI: LAPIC_NMI (acpi_id[0x5d] high edge lint[0x1]) Dec 13 14:17:50.656388 kernel: ACPI: LAPIC_NMI (acpi_id[0x5e] high edge lint[0x1]) Dec 13 14:17:50.656393 kernel: ACPI: LAPIC_NMI (acpi_id[0x5f] high edge lint[0x1]) Dec 13 14:17:50.656398 kernel: ACPI: LAPIC_NMI (acpi_id[0x60] high edge lint[0x1]) Dec 13 14:17:50.656405 kernel: ACPI: LAPIC_NMI (acpi_id[0x61] high edge lint[0x1]) Dec 13 14:17:50.656410 kernel: ACPI: LAPIC_NMI (acpi_id[0x62] high edge lint[0x1]) Dec 13 14:17:50.656415 kernel: ACPI: LAPIC_NMI (acpi_id[0x63] high edge lint[0x1]) Dec 13 14:17:50.656420 kernel: ACPI: LAPIC_NMI (acpi_id[0x64] high edge lint[0x1]) Dec 13 14:17:50.656425 kernel: ACPI: LAPIC_NMI (acpi_id[0x65] high edge lint[0x1]) Dec 13 14:17:50.656430 kernel: ACPI: LAPIC_NMI (acpi_id[0x66] high edge lint[0x1]) Dec 13 14:17:50.656435 kernel: ACPI: LAPIC_NMI (acpi_id[0x67] high edge lint[0x1]) Dec 13 14:17:50.656440 kernel: ACPI: LAPIC_NMI (acpi_id[0x68] high edge lint[0x1]) Dec 13 14:17:50.656446 kernel: ACPI: LAPIC_NMI (acpi_id[0x69] high edge lint[0x1]) Dec 13 14:17:50.656452 kernel: ACPI: LAPIC_NMI (acpi_id[0x6a] high edge lint[0x1]) Dec 13 14:17:50.656457 kernel: ACPI: LAPIC_NMI (acpi_id[0x6b] high edge lint[0x1]) Dec 13 14:17:50.656462 kernel: ACPI: LAPIC_NMI (acpi_id[0x6c] high edge lint[0x1]) Dec 13 14:17:50.656467 kernel: ACPI: LAPIC_NMI (acpi_id[0x6d] high edge lint[0x1]) Dec 13 14:17:50.656472 kernel: ACPI: LAPIC_NMI (acpi_id[0x6e] high edge lint[0x1]) Dec 13 14:17:50.656477 kernel: ACPI: LAPIC_NMI (acpi_id[0x6f] high edge lint[0x1]) Dec 13 14:17:50.656482 kernel: ACPI: LAPIC_NMI (acpi_id[0x70] high edge lint[0x1]) Dec 13 14:17:50.656487 kernel: ACPI: LAPIC_NMI (acpi_id[0x71] high edge lint[0x1]) Dec 13 14:17:50.656492 kernel: ACPI: LAPIC_NMI (acpi_id[0x72] high edge lint[0x1]) Dec 13 14:17:50.656497 kernel: ACPI: LAPIC_NMI (acpi_id[0x73] high edge lint[0x1]) Dec 13 14:17:50.656504 kernel: ACPI: LAPIC_NMI (acpi_id[0x74] high edge lint[0x1]) Dec 13 14:17:50.656509 kernel: ACPI: LAPIC_NMI (acpi_id[0x75] high edge lint[0x1]) Dec 13 14:17:50.656514 kernel: ACPI: LAPIC_NMI (acpi_id[0x76] high edge lint[0x1]) Dec 13 14:17:50.656519 kernel: ACPI: LAPIC_NMI (acpi_id[0x77] high edge lint[0x1]) Dec 13 14:17:50.656524 kernel: ACPI: LAPIC_NMI (acpi_id[0x78] high edge lint[0x1]) Dec 13 14:17:50.656529 kernel: ACPI: LAPIC_NMI (acpi_id[0x79] high edge lint[0x1]) Dec 13 14:17:50.656534 kernel: ACPI: LAPIC_NMI (acpi_id[0x7a] high edge lint[0x1]) Dec 13 14:17:50.656540 kernel: ACPI: LAPIC_NMI (acpi_id[0x7b] high edge lint[0x1]) Dec 13 14:17:50.656545 kernel: ACPI: LAPIC_NMI (acpi_id[0x7c] high edge lint[0x1]) Dec 13 14:17:50.656551 kernel: ACPI: LAPIC_NMI (acpi_id[0x7d] high edge lint[0x1]) Dec 13 14:17:50.656556 kernel: ACPI: LAPIC_NMI (acpi_id[0x7e] high edge lint[0x1]) Dec 13 14:17:50.656561 kernel: ACPI: LAPIC_NMI (acpi_id[0x7f] high edge lint[0x1]) Dec 13 14:17:50.656566 kernel: IOAPIC[0]: apic_id 1, version 17, address 0xfec00000, GSI 0-23 Dec 13 14:17:50.656571 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 high edge) Dec 13 14:17:50.656577 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 14:17:50.656582 kernel: ACPI: HPET id: 0x8086af01 base: 0xfed00000 Dec 13 14:17:50.656587 kernel: TSC deadline timer available Dec 13 14:17:50.656592 kernel: smpboot: Allowing 128 CPUs, 126 hotplug CPUs Dec 13 14:17:50.656598 kernel: [mem 0x80000000-0xefffffff] available for PCI devices Dec 13 14:17:50.656603 kernel: Booting paravirtualized kernel on VMware hypervisor Dec 13 14:17:50.656609 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 14:17:50.656614 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:128 nr_node_ids:1 Dec 13 14:17:50.656620 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Dec 13 14:17:50.656625 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Dec 13 14:17:50.656630 kernel: pcpu-alloc: [0] 000 001 002 003 004 005 006 007 Dec 13 14:17:50.656635 kernel: pcpu-alloc: [0] 008 009 010 011 012 013 014 015 Dec 13 14:17:50.656640 kernel: pcpu-alloc: [0] 016 017 018 019 020 021 022 023 Dec 13 14:17:50.656646 kernel: pcpu-alloc: [0] 024 025 026 027 028 029 030 031 Dec 13 14:17:50.656651 kernel: pcpu-alloc: [0] 032 033 034 035 036 037 038 039 Dec 13 14:17:50.656656 kernel: pcpu-alloc: [0] 040 041 042 043 044 045 046 047 Dec 13 14:17:50.656661 kernel: pcpu-alloc: [0] 048 049 050 051 052 053 054 055 Dec 13 14:17:50.656673 kernel: pcpu-alloc: [0] 056 057 058 059 060 061 062 063 Dec 13 14:17:50.656679 kernel: pcpu-alloc: [0] 064 065 066 067 068 069 070 071 Dec 13 14:17:50.656685 kernel: pcpu-alloc: [0] 072 073 074 075 076 077 078 079 Dec 13 14:17:50.656690 kernel: pcpu-alloc: [0] 080 081 082 083 084 085 086 087 Dec 13 14:17:50.656695 kernel: pcpu-alloc: [0] 088 089 090 091 092 093 094 095 Dec 13 14:17:50.656702 kernel: pcpu-alloc: [0] 096 097 098 099 100 101 102 103 Dec 13 14:17:50.656707 kernel: pcpu-alloc: [0] 104 105 106 107 108 109 110 111 Dec 13 14:17:50.656712 kernel: pcpu-alloc: [0] 112 113 114 115 116 117 118 119 Dec 13 14:17:50.656717 kernel: pcpu-alloc: [0] 120 121 122 123 124 125 126 127 Dec 13 14:17:50.656724 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515808 Dec 13 14:17:50.656730 kernel: Policy zone: DMA32 Dec 13 14:17:50.656736 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:17:50.656742 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:17:50.656748 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes Dec 13 14:17:50.656754 kernel: printk: log_buf_len total cpu_extra contributions: 520192 bytes Dec 13 14:17:50.656759 kernel: printk: log_buf_len min size: 262144 bytes Dec 13 14:17:50.656765 kernel: printk: log_buf_len: 1048576 bytes Dec 13 14:17:50.656770 kernel: printk: early log buf free: 239728(91%) Dec 13 14:17:50.656776 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 14:17:50.656782 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 14:17:50.656787 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:17:50.656793 kernel: Memory: 1940392K/2096628K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 155976K reserved, 0K cma-reserved) Dec 13 14:17:50.656800 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=128, Nodes=1 Dec 13 14:17:50.656805 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 14:17:50.656811 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 14:17:50.656817 kernel: rcu: Hierarchical RCU implementation. Dec 13 14:17:50.656823 kernel: rcu: RCU event tracing is enabled. Dec 13 14:17:50.656829 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=128. Dec 13 14:17:50.656835 kernel: Rude variant of Tasks RCU enabled. Dec 13 14:17:50.664092 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:17:50.664104 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:17:50.664110 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=128 Dec 13 14:17:50.664119 kernel: NR_IRQS: 33024, nr_irqs: 1448, preallocated irqs: 16 Dec 13 14:17:50.664127 kernel: random: crng init done Dec 13 14:17:50.664133 kernel: Console: colour VGA+ 80x25 Dec 13 14:17:50.664139 kernel: printk: console [tty0] enabled Dec 13 14:17:50.664151 kernel: printk: console [ttyS0] enabled Dec 13 14:17:50.664166 kernel: ACPI: Core revision 20210730 Dec 13 14:17:50.664172 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns Dec 13 14:17:50.664178 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 14:17:50.664184 kernel: x2apic enabled Dec 13 14:17:50.664190 kernel: Switched APIC routing to physical x2apic. Dec 13 14:17:50.664195 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Dec 13 14:17:50.664207 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Dec 13 14:17:50.664215 kernel: Calibrating delay loop (skipped) preset value.. 6816.00 BogoMIPS (lpj=3408000) Dec 13 14:17:50.664221 kernel: Disabled fast string operations Dec 13 14:17:50.664228 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Dec 13 14:17:50.664234 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Dec 13 14:17:50.664245 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 14:17:50.664251 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Dec 13 14:17:50.664257 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Dec 13 14:17:50.664263 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Dec 13 14:17:50.664271 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Dec 13 14:17:50.664279 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 14:17:50.664286 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Dec 13 14:17:50.664292 kernel: RETBleed: Mitigation: Enhanced IBRS Dec 13 14:17:50.664298 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 14:17:50.664309 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 14:17:50.664315 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 14:17:50.664320 kernel: SRBDS: Unknown: Dependent on hypervisor status Dec 13 14:17:50.664326 kernel: GDS: Unknown: Dependent on hypervisor status Dec 13 14:17:50.664332 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 14:17:50.664347 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 14:17:50.664355 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 14:17:50.664361 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 14:17:50.664369 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Dec 13 14:17:50.664378 kernel: Freeing SMP alternatives memory: 32K Dec 13 14:17:50.664383 kernel: pid_max: default: 131072 minimum: 1024 Dec 13 14:17:50.664389 kernel: LSM: Security Framework initializing Dec 13 14:17:50.664394 kernel: SELinux: Initializing. Dec 13 14:17:50.664400 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 14:17:50.664406 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 14:17:50.664413 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Dec 13 14:17:50.664428 kernel: Performance Events: Skylake events, core PMU driver. Dec 13 14:17:50.664434 kernel: core: CPUID marked event: 'cpu cycles' unavailable Dec 13 14:17:50.664440 kernel: core: CPUID marked event: 'instructions' unavailable Dec 13 14:17:50.664447 kernel: core: CPUID marked event: 'bus cycles' unavailable Dec 13 14:17:50.664453 kernel: core: CPUID marked event: 'cache references' unavailable Dec 13 14:17:50.664458 kernel: core: CPUID marked event: 'cache misses' unavailable Dec 13 14:17:50.664470 kernel: core: CPUID marked event: 'branch instructions' unavailable Dec 13 14:17:50.664478 kernel: core: CPUID marked event: 'branch misses' unavailable Dec 13 14:17:50.664484 kernel: ... version: 1 Dec 13 14:17:50.664490 kernel: ... bit width: 48 Dec 13 14:17:50.664495 kernel: ... generic registers: 4 Dec 13 14:17:50.664506 kernel: ... value mask: 0000ffffffffffff Dec 13 14:17:50.664512 kernel: ... max period: 000000007fffffff Dec 13 14:17:50.664518 kernel: ... fixed-purpose events: 0 Dec 13 14:17:50.664524 kernel: ... event mask: 000000000000000f Dec 13 14:17:50.664529 kernel: signal: max sigframe size: 1776 Dec 13 14:17:50.664535 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:17:50.664547 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 14:17:50.664554 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:17:50.664560 kernel: x86: Booting SMP configuration: Dec 13 14:17:50.664566 kernel: .... node #0, CPUs: #1 Dec 13 14:17:50.664572 kernel: Disabled fast string operations Dec 13 14:17:50.664582 kernel: smpboot: CPU 1 Converting physical 2 to logical package 1 Dec 13 14:17:50.664588 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Dec 13 14:17:50.664593 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:17:50.664599 kernel: smpboot: Max logical packages: 128 Dec 13 14:17:50.664605 kernel: smpboot: Total of 2 processors activated (13632.00 BogoMIPS) Dec 13 14:17:50.664618 kernel: devtmpfs: initialized Dec 13 14:17:50.664625 kernel: x86/mm: Memory block size: 128MB Dec 13 14:17:50.664630 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7feff000-0x7fefffff] (4096 bytes) Dec 13 14:17:50.664636 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:17:50.664647 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) Dec 13 14:17:50.664653 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:17:50.664659 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:17:50.664664 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:17:50.664672 kernel: audit: type=2000 audit(1734099469.063:1): state=initialized audit_enabled=0 res=1 Dec 13 14:17:50.664682 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:17:50.664688 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 14:17:50.664694 kernel: cpuidle: using governor menu Dec 13 14:17:50.664699 kernel: Simple Boot Flag at 0x36 set to 0x80 Dec 13 14:17:50.664705 kernel: ACPI: bus type PCI registered Dec 13 14:17:50.664711 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:17:50.664717 kernel: dca service started, version 1.12.1 Dec 13 14:17:50.664723 kernel: PCI: MMCONFIG for domain 0000 [bus 00-7f] at [mem 0xf0000000-0xf7ffffff] (base 0xf0000000) Dec 13 14:17:50.664729 kernel: PCI: MMCONFIG at [mem 0xf0000000-0xf7ffffff] reserved in E820 Dec 13 14:17:50.664736 kernel: PCI: Using configuration type 1 for base access Dec 13 14:17:50.664741 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 14:17:50.664748 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:17:50.664753 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:17:50.664759 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:17:50.664765 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:17:50.664771 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:17:50.664776 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:17:50.664782 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:17:50.664789 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:17:50.664794 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:17:50.664800 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 14:17:50.664806 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Dec 13 14:17:50.664812 kernel: ACPI: Interpreter enabled Dec 13 14:17:50.664817 kernel: ACPI: PM: (supports S0 S1 S5) Dec 13 14:17:50.664823 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 14:17:50.664829 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 14:17:50.664836 kernel: ACPI: Enabled 4 GPEs in block 00 to 0F Dec 13 14:17:50.664842 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-7f]) Dec 13 14:17:50.664925 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:17:50.664975 kernel: acpi PNP0A03:00: _OSC: platform does not support [AER LTR] Dec 13 14:17:50.665021 kernel: acpi PNP0A03:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] Dec 13 14:17:50.665029 kernel: PCI host bridge to bus 0000:00 Dec 13 14:17:50.665075 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 14:17:50.665120 kernel: pci_bus 0000:00: root bus resource [mem 0x000cc000-0x000cffff window] Dec 13 14:17:50.665204 kernel: pci_bus 0000:00: root bus resource [mem 0x000d0000-0x000d3fff window] Dec 13 14:17:50.665246 kernel: pci_bus 0000:00: root bus resource [mem 0x000d4000-0x000d7fff window] Dec 13 14:17:50.665286 kernel: pci_bus 0000:00: root bus resource [mem 0x000d8000-0x000dbfff window] Dec 13 14:17:50.665326 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 13 14:17:50.665366 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 14:17:50.665417 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xfeff window] Dec 13 14:17:50.665461 kernel: pci_bus 0000:00: root bus resource [bus 00-7f] Dec 13 14:17:50.665516 kernel: pci 0000:00:00.0: [8086:7190] type 00 class 0x060000 Dec 13 14:17:50.665567 kernel: pci 0000:00:01.0: [8086:7191] type 01 class 0x060400 Dec 13 14:17:50.665618 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100 Dec 13 14:17:50.665668 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x01018a Dec 13 14:17:50.665715 kernel: pci 0000:00:07.1: reg 0x20: [io 0x1060-0x106f] Dec 13 14:17:50.665763 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Dec 13 14:17:50.665809 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Dec 13 14:17:50.665854 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Dec 13 14:17:50.665899 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Dec 13 14:17:50.665948 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000 Dec 13 14:17:50.665995 kernel: pci 0000:00:07.3: quirk: [io 0x1000-0x103f] claimed by PIIX4 ACPI Dec 13 14:17:50.666041 kernel: pci 0000:00:07.3: quirk: [io 0x1040-0x104f] claimed by PIIX4 SMB Dec 13 14:17:50.666093 kernel: pci 0000:00:07.7: [15ad:0740] type 00 class 0x088000 Dec 13 14:17:50.666139 kernel: pci 0000:00:07.7: reg 0x10: [io 0x1080-0x10bf] Dec 13 14:17:50.666225 kernel: pci 0000:00:07.7: reg 0x14: [mem 0xfebfe000-0xfebfffff 64bit] Dec 13 14:17:50.666278 kernel: pci 0000:00:0f.0: [15ad:0405] type 00 class 0x030000 Dec 13 14:17:50.666325 kernel: pci 0000:00:0f.0: reg 0x10: [io 0x1070-0x107f] Dec 13 14:17:50.666370 kernel: pci 0000:00:0f.0: reg 0x14: [mem 0xe8000000-0xefffffff pref] Dec 13 14:17:50.666415 kernel: pci 0000:00:0f.0: reg 0x18: [mem 0xfe000000-0xfe7fffff] Dec 13 14:17:50.666462 kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x00007fff pref] Dec 13 14:17:50.666508 kernel: pci 0000:00:0f.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 14:17:50.666557 kernel: pci 0000:00:11.0: [15ad:0790] type 01 class 0x060401 Dec 13 14:17:50.666609 kernel: pci 0000:00:15.0: [15ad:07a0] type 01 class 0x060400 Dec 13 14:17:50.666656 kernel: pci 0000:00:15.0: PME# supported from D0 D3hot D3cold Dec 13 14:17:50.666705 kernel: pci 0000:00:15.1: [15ad:07a0] type 01 class 0x060400 Dec 13 14:17:50.666754 kernel: pci 0000:00:15.1: PME# supported from D0 D3hot D3cold Dec 13 14:17:50.666803 kernel: pci 0000:00:15.2: [15ad:07a0] type 01 class 0x060400 Dec 13 14:17:50.666849 kernel: pci 0000:00:15.2: PME# supported from D0 D3hot D3cold Dec 13 14:17:50.666897 kernel: pci 0000:00:15.3: [15ad:07a0] type 01 class 0x060400 Dec 13 14:17:50.666944 kernel: pci 0000:00:15.3: PME# supported from D0 D3hot D3cold Dec 13 14:17:50.666993 kernel: pci 0000:00:15.4: [15ad:07a0] type 01 class 0x060400 Dec 13 14:17:50.667042 kernel: pci 0000:00:15.4: PME# supported from D0 D3hot D3cold Dec 13 14:17:50.667092 kernel: pci 0000:00:15.5: [15ad:07a0] type 01 class 0x060400 Dec 13 14:17:50.667138 kernel: pci 0000:00:15.5: PME# supported from D0 D3hot D3cold Dec 13 14:17:50.667200 kernel: pci 0000:00:15.6: [15ad:07a0] type 01 class 0x060400 Dec 13 14:17:50.667247 kernel: pci 0000:00:15.6: PME# supported from D0 D3hot D3cold Dec 13 14:17:50.667296 kernel: pci 0000:00:15.7: [15ad:07a0] type 01 class 0x060400 Dec 13 14:17:50.667342 kernel: pci 0000:00:15.7: PME# supported from D0 D3hot D3cold Dec 13 14:17:50.667393 kernel: pci 0000:00:16.0: [15ad:07a0] type 01 class 0x060400 Dec 13 14:17:50.667443 kernel: pci 0000:00:16.0: PME# supported from D0 D3hot D3cold Dec 13 14:17:50.667493 kernel: pci 0000:00:16.1: [15ad:07a0] type 01 class 0x060400 Dec 13 14:17:50.667540 kernel: pci 0000:00:16.1: PME# supported from D0 D3hot D3cold Dec 13 14:17:50.667588 kernel: pci 0000:00:16.2: [15ad:07a0] type 01 class 0x060400 Dec 13 14:17:50.667646 kernel: pci 0000:00:16.2: PME# supported from D0 D3hot D3cold Dec 13 14:17:50.667697 kernel: pci 0000:00:16.3: [15ad:07a0] type 01 class 0x060400 Dec 13 14:17:50.667743 kernel: pci 0000:00:16.3: PME# supported from D0 D3hot D3cold Dec 13 14:17:50.667793 kernel: pci 0000:00:16.4: [15ad:07a0] type 01 class 0x060400 Dec 13 14:17:50.667839 kernel: pci 0000:00:16.4: PME# supported from D0 D3hot D3cold Dec 13 14:17:50.667890 kernel: pci 0000:00:16.5: [15ad:07a0] type 01 class 0x060400 Dec 13 14:17:50.667939 kernel: pci 0000:00:16.5: PME# supported from D0 D3hot D3cold Dec 13 14:17:50.667992 kernel: pci 0000:00:16.6: [15ad:07a0] type 01 class 0x060400 Dec 13 14:17:50.668040 kernel: pci 0000:00:16.6: PME# supported from D0 D3hot D3cold Dec 13 14:17:50.668090 kernel: pci 0000:00:16.7: [15ad:07a0] type 01 class 0x060400 Dec 13 14:17:50.668136 kernel: pci 0000:00:16.7: PME# supported from D0 D3hot D3cold Dec 13 14:17:50.668199 kernel: pci 0000:00:17.0: [15ad:07a0] type 01 class 0x060400 Dec 13 14:17:50.668249 kernel: pci 0000:00:17.0: PME# supported from D0 D3hot D3cold Dec 13 14:17:50.668301 kernel: pci 0000:00:17.1: [15ad:07a0] type 01 class 0x060400 Dec 13 14:17:50.668347 kernel: pci 0000:00:17.1: PME# supported from D0 D3hot D3cold Dec 13 14:17:50.668399 kernel: pci 0000:00:17.2: [15ad:07a0] type 01 class 0x060400 Dec 13 14:17:50.668446 kernel: pci 0000:00:17.2: PME# supported from D0 D3hot D3cold Dec 13 14:17:50.668495 kernel: pci 0000:00:17.3: [15ad:07a0] type 01 class 0x060400 Dec 13 14:17:50.668542 kernel: pci 0000:00:17.3: PME# supported from D0 D3hot D3cold Dec 13 14:17:50.668594 kernel: pci 0000:00:17.4: [15ad:07a0] type 01 class 0x060400 Dec 13 14:17:50.668639 kernel: pci 0000:00:17.4: PME# supported from D0 D3hot D3cold Dec 13 14:17:50.668690 kernel: pci 0000:00:17.5: [15ad:07a0] type 01 class 0x060400 Dec 13 14:17:50.668736 kernel: pci 0000:00:17.5: PME# supported from D0 D3hot D3cold Dec 13 14:17:50.668786 kernel: pci 0000:00:17.6: [15ad:07a0] type 01 class 0x060400 Dec 13 14:17:50.668831 kernel: pci 0000:00:17.6: PME# supported from D0 D3hot D3cold Dec 13 14:17:50.668885 kernel: pci 0000:00:17.7: [15ad:07a0] type 01 class 0x060400 Dec 13 14:17:50.668931 kernel: pci 0000:00:17.7: PME# supported from D0 D3hot D3cold Dec 13 14:17:50.668981 kernel: pci 0000:00:18.0: [15ad:07a0] type 01 class 0x060400 Dec 13 14:17:50.669027 kernel: pci 0000:00:18.0: PME# supported from D0 D3hot D3cold Dec 13 14:17:50.669076 kernel: pci 0000:00:18.1: [15ad:07a0] type 01 class 0x060400 Dec 13 14:17:50.669123 kernel: pci 0000:00:18.1: PME# supported from D0 D3hot D3cold Dec 13 14:17:50.678506 kernel: pci 0000:00:18.2: [15ad:07a0] type 01 class 0x060400 Dec 13 14:17:50.678572 kernel: pci 0000:00:18.2: PME# supported from D0 D3hot D3cold Dec 13 14:17:50.678626 kernel: pci 0000:00:18.3: [15ad:07a0] type 01 class 0x060400 Dec 13 14:17:50.678674 kernel: pci 0000:00:18.3: PME# supported from D0 D3hot D3cold Dec 13 14:17:50.678725 kernel: pci 0000:00:18.4: [15ad:07a0] type 01 class 0x060400 Dec 13 14:17:50.678772 kernel: pci 0000:00:18.4: PME# supported from D0 D3hot D3cold Dec 13 14:17:50.678828 kernel: pci 0000:00:18.5: [15ad:07a0] type 01 class 0x060400 Dec 13 14:17:50.678875 kernel: pci 0000:00:18.5: PME# supported from D0 D3hot D3cold Dec 13 14:17:50.678925 kernel: pci 0000:00:18.6: [15ad:07a0] type 01 class 0x060400 Dec 13 14:17:50.678971 kernel: pci 0000:00:18.6: PME# supported from D0 D3hot D3cold Dec 13 14:17:50.679021 kernel: pci 0000:00:18.7: [15ad:07a0] type 01 class 0x060400 Dec 13 14:17:50.679068 kernel: pci 0000:00:18.7: PME# supported from D0 D3hot D3cold Dec 13 14:17:50.679118 kernel: pci_bus 0000:01: extended config space not accessible Dec 13 14:17:50.679238 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Dec 13 14:17:50.679288 kernel: pci_bus 0000:02: extended config space not accessible Dec 13 14:17:50.679297 kernel: acpiphp: Slot [32] registered Dec 13 14:17:50.679303 kernel: acpiphp: Slot [33] registered Dec 13 14:17:50.679308 kernel: acpiphp: Slot [34] registered Dec 13 14:17:50.679314 kernel: acpiphp: Slot [35] registered Dec 13 14:17:50.679320 kernel: acpiphp: Slot [36] registered Dec 13 14:17:50.679325 kernel: acpiphp: Slot [37] registered Dec 13 14:17:50.679333 kernel: acpiphp: Slot [38] registered Dec 13 14:17:50.679338 kernel: acpiphp: Slot [39] registered Dec 13 14:17:50.679344 kernel: acpiphp: Slot [40] registered Dec 13 14:17:50.679350 kernel: acpiphp: Slot [41] registered Dec 13 14:17:50.679355 kernel: acpiphp: Slot [42] registered Dec 13 14:17:50.679361 kernel: acpiphp: Slot [43] registered Dec 13 14:17:50.679366 kernel: acpiphp: Slot [44] registered Dec 13 14:17:50.679372 kernel: acpiphp: Slot [45] registered Dec 13 14:17:50.679378 kernel: acpiphp: Slot [46] registered Dec 13 14:17:50.679384 kernel: acpiphp: Slot [47] registered Dec 13 14:17:50.679390 kernel: acpiphp: Slot [48] registered Dec 13 14:17:50.679396 kernel: acpiphp: Slot [49] registered Dec 13 14:17:50.679401 kernel: acpiphp: Slot [50] registered Dec 13 14:17:50.679407 kernel: acpiphp: Slot [51] registered Dec 13 14:17:50.679413 kernel: acpiphp: Slot [52] registered Dec 13 14:17:50.679418 kernel: acpiphp: Slot [53] registered Dec 13 14:17:50.679424 kernel: acpiphp: Slot [54] registered Dec 13 14:17:50.679429 kernel: acpiphp: Slot [55] registered Dec 13 14:17:50.679436 kernel: acpiphp: Slot [56] registered Dec 13 14:17:50.679442 kernel: acpiphp: Slot [57] registered Dec 13 14:17:50.679447 kernel: acpiphp: Slot [58] registered Dec 13 14:17:50.679454 kernel: acpiphp: Slot [59] registered Dec 13 14:17:50.679459 kernel: acpiphp: Slot [60] registered Dec 13 14:17:50.679465 kernel: acpiphp: Slot [61] registered Dec 13 14:17:50.679470 kernel: acpiphp: Slot [62] registered Dec 13 14:17:50.679476 kernel: acpiphp: Slot [63] registered Dec 13 14:17:50.679523 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] (subtractive decode) Dec 13 14:17:50.679569 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Dec 13 14:17:50.679615 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Dec 13 14:17:50.679661 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Dec 13 14:17:50.679706 kernel: pci 0000:00:11.0: bridge window [mem 0x000a0000-0x000bffff window] (subtractive decode) Dec 13 14:17:50.679752 kernel: pci 0000:00:11.0: bridge window [mem 0x000cc000-0x000cffff window] (subtractive decode) Dec 13 14:17:50.679797 kernel: pci 0000:00:11.0: bridge window [mem 0x000d0000-0x000d3fff window] (subtractive decode) Dec 13 14:17:50.679842 kernel: pci 0000:00:11.0: bridge window [mem 0x000d4000-0x000d7fff window] (subtractive decode) Dec 13 14:17:50.679886 kernel: pci 0000:00:11.0: bridge window [mem 0x000d8000-0x000dbfff window] (subtractive decode) Dec 13 14:17:50.679934 kernel: pci 0000:00:11.0: bridge window [mem 0xc0000000-0xfebfffff window] (subtractive decode) Dec 13 14:17:50.679979 kernel: pci 0000:00:11.0: bridge window [io 0x0000-0x0cf7 window] (subtractive decode) Dec 13 14:17:50.680024 kernel: pci 0000:00:11.0: bridge window [io 0x0d00-0xfeff window] (subtractive decode) Dec 13 14:17:50.680077 kernel: pci 0000:03:00.0: [15ad:07c0] type 00 class 0x010700 Dec 13 14:17:50.680125 kernel: pci 0000:03:00.0: reg 0x10: [io 0x4000-0x4007] Dec 13 14:17:50.680179 kernel: pci 0000:03:00.0: reg 0x14: [mem 0xfd5f8000-0xfd5fffff 64bit] Dec 13 14:17:50.680227 kernel: pci 0000:03:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Dec 13 14:17:50.680276 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Dec 13 14:17:50.680322 kernel: pci 0000:03:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Dec 13 14:17:50.680369 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Dec 13 14:17:50.680420 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Dec 13 14:17:50.680466 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Dec 13 14:17:50.680514 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Dec 13 14:17:50.680559 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Dec 13 14:17:50.680605 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Dec 13 14:17:50.680652 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Dec 13 14:17:50.680699 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Dec 13 14:17:50.680745 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Dec 13 14:17:50.680790 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Dec 13 14:17:50.680836 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Dec 13 14:17:50.680882 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Dec 13 14:17:50.680927 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Dec 13 14:17:50.680975 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Dec 13 14:17:50.681021 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Dec 13 14:17:50.681066 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Dec 13 14:17:50.681111 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Dec 13 14:17:50.683262 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Dec 13 14:17:50.683327 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Dec 13 14:17:50.683376 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Dec 13 14:17:50.683426 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Dec 13 14:17:50.683472 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Dec 13 14:17:50.683519 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Dec 13 14:17:50.683567 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Dec 13 14:17:50.683613 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Dec 13 14:17:50.683658 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Dec 13 14:17:50.683714 kernel: pci 0000:0b:00.0: [15ad:07b0] type 00 class 0x020000 Dec 13 14:17:50.683762 kernel: pci 0000:0b:00.0: reg 0x10: [mem 0xfd4fc000-0xfd4fcfff] Dec 13 14:17:50.683810 kernel: pci 0000:0b:00.0: reg 0x14: [mem 0xfd4fd000-0xfd4fdfff] Dec 13 14:17:50.683857 kernel: pci 0000:0b:00.0: reg 0x18: [mem 0xfd4fe000-0xfd4fffff] Dec 13 14:17:50.683904 kernel: pci 0000:0b:00.0: reg 0x1c: [io 0x5000-0x500f] Dec 13 14:17:50.683950 kernel: pci 0000:0b:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Dec 13 14:17:50.683996 kernel: pci 0000:0b:00.0: supports D1 D2 Dec 13 14:17:50.684045 kernel: pci 0000:0b:00.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 14:17:50.684093 kernel: pci 0000:0b:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Dec 13 14:17:50.684140 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Dec 13 14:17:50.684200 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Dec 13 14:17:50.684246 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Dec 13 14:17:50.684293 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Dec 13 14:17:50.684338 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Dec 13 14:17:50.684382 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Dec 13 14:17:50.684435 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Dec 13 14:17:50.684482 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Dec 13 14:17:50.684528 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Dec 13 14:17:50.684573 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Dec 13 14:17:50.684619 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Dec 13 14:17:50.684667 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Dec 13 14:17:50.684714 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Dec 13 14:17:50.684761 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Dec 13 14:17:50.684808 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Dec 13 14:17:50.684854 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Dec 13 14:17:50.684900 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Dec 13 14:17:50.684946 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Dec 13 14:17:50.684991 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Dec 13 14:17:50.685036 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Dec 13 14:17:50.685083 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Dec 13 14:17:50.685130 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Dec 13 14:17:50.691873 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Dec 13 14:17:50.691940 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Dec 13 14:17:50.691988 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Dec 13 14:17:50.692035 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Dec 13 14:17:50.692083 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Dec 13 14:17:50.692129 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Dec 13 14:17:50.692182 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Dec 13 14:17:50.692231 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Dec 13 14:17:50.692278 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Dec 13 14:17:50.692323 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Dec 13 14:17:50.692367 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Dec 13 14:17:50.692411 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Dec 13 14:17:50.692458 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Dec 13 14:17:50.692503 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Dec 13 14:17:50.692548 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Dec 13 14:17:50.692594 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Dec 13 14:17:50.692642 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Dec 13 14:17:50.692686 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Dec 13 14:17:50.692731 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Dec 13 14:17:50.692779 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Dec 13 14:17:50.692824 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Dec 13 14:17:50.692869 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Dec 13 14:17:50.692915 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Dec 13 14:17:50.692964 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Dec 13 14:17:50.693008 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Dec 13 14:17:50.693055 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Dec 13 14:17:50.693100 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Dec 13 14:17:50.693150 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Dec 13 14:17:50.693199 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Dec 13 14:17:50.693244 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Dec 13 14:17:50.693289 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Dec 13 14:17:50.693338 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Dec 13 14:17:50.693383 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Dec 13 14:17:50.693428 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Dec 13 14:17:50.693473 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Dec 13 14:17:50.693520 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Dec 13 14:17:50.693565 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Dec 13 14:17:50.693610 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Dec 13 14:17:50.693658 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Dec 13 14:17:50.693705 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Dec 13 14:17:50.693750 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Dec 13 14:17:50.693794 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Dec 13 14:17:50.693839 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Dec 13 14:17:50.693884 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Dec 13 14:17:50.693929 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Dec 13 14:17:50.693975 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Dec 13 14:17:50.694022 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Dec 13 14:17:50.694066 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Dec 13 14:17:50.694112 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Dec 13 14:17:50.694169 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Dec 13 14:17:50.694217 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Dec 13 14:17:50.694264 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Dec 13 14:17:50.694309 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Dec 13 14:17:50.694354 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Dec 13 14:17:50.694409 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Dec 13 14:17:50.694455 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Dec 13 14:17:50.694500 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Dec 13 14:17:50.694508 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 9 Dec 13 14:17:50.694514 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 0 Dec 13 14:17:50.694521 kernel: ACPI: PCI: Interrupt link LNKB disabled Dec 13 14:17:50.694526 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 14:17:50.694532 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 10 Dec 13 14:17:50.694538 kernel: iommu: Default domain type: Translated Dec 13 14:17:50.694545 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 14:17:50.694591 kernel: pci 0000:00:0f.0: vgaarb: setting as boot VGA device Dec 13 14:17:50.694636 kernel: pci 0000:00:0f.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 14:17:50.694681 kernel: pci 0000:00:0f.0: vgaarb: bridge control possible Dec 13 14:17:50.694689 kernel: vgaarb: loaded Dec 13 14:17:50.694695 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:17:50.694701 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:17:50.694707 kernel: PTP clock support registered Dec 13 14:17:50.694713 kernel: PCI: Using ACPI for IRQ routing Dec 13 14:17:50.694720 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 14:17:50.694726 kernel: e820: reserve RAM buffer [mem 0x0009ec00-0x0009ffff] Dec 13 14:17:50.694732 kernel: e820: reserve RAM buffer [mem 0x7fee0000-0x7fffffff] Dec 13 14:17:50.694737 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 Dec 13 14:17:50.694743 kernel: hpet0: 16 comparators, 64-bit 14.318180 MHz counter Dec 13 14:17:50.694749 kernel: clocksource: Switched to clocksource tsc-early Dec 13 14:17:50.694755 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:17:50.694761 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:17:50.694766 kernel: pnp: PnP ACPI init Dec 13 14:17:50.694817 kernel: system 00:00: [io 0x1000-0x103f] has been reserved Dec 13 14:17:50.694860 kernel: system 00:00: [io 0x1040-0x104f] has been reserved Dec 13 14:17:50.694901 kernel: system 00:00: [io 0x0cf0-0x0cf1] has been reserved Dec 13 14:17:50.694947 kernel: system 00:04: [mem 0xfed00000-0xfed003ff] has been reserved Dec 13 14:17:50.694993 kernel: pnp 00:06: [dma 2] Dec 13 14:17:50.695038 kernel: system 00:07: [io 0xfce0-0xfcff] has been reserved Dec 13 14:17:50.695082 kernel: system 00:07: [mem 0xf0000000-0xf7ffffff] has been reserved Dec 13 14:17:50.695122 kernel: system 00:07: [mem 0xfe800000-0xfe9fffff] has been reserved Dec 13 14:17:50.695129 kernel: pnp: PnP ACPI: found 8 devices Dec 13 14:17:50.695135 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 14:17:50.695141 kernel: NET: Registered PF_INET protocol family Dec 13 14:17:50.698918 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 14:17:50.698928 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Dec 13 14:17:50.698935 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:17:50.698943 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:17:50.698949 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 14:17:50.698954 kernel: TCP: Hash tables configured (established 16384 bind 16384) Dec 13 14:17:50.698960 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 14:17:50.698966 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 14:17:50.698972 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:17:50.698977 kernel: NET: Registered PF_XDP protocol family Dec 13 14:17:50.699041 kernel: pci 0000:00:15.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Dec 13 14:17:50.699093 kernel: pci 0000:00:15.3: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Dec 13 14:17:50.699150 kernel: pci 0000:00:15.4: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Dec 13 14:17:50.699200 kernel: pci 0000:00:15.5: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Dec 13 14:17:50.699247 kernel: pci 0000:00:15.6: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Dec 13 14:17:50.699294 kernel: pci 0000:00:15.7: bridge window [io 0x1000-0x0fff] to [bus 0a] add_size 1000 Dec 13 14:17:50.699340 kernel: pci 0000:00:16.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 0b] add_size 200000 add_align 100000 Dec 13 14:17:50.699390 kernel: pci 0000:00:16.3: bridge window [io 0x1000-0x0fff] to [bus 0e] add_size 1000 Dec 13 14:17:50.699436 kernel: pci 0000:00:16.4: bridge window [io 0x1000-0x0fff] to [bus 0f] add_size 1000 Dec 13 14:17:50.699482 kernel: pci 0000:00:16.5: bridge window [io 0x1000-0x0fff] to [bus 10] add_size 1000 Dec 13 14:17:50.699529 kernel: pci 0000:00:16.6: bridge window [io 0x1000-0x0fff] to [bus 11] add_size 1000 Dec 13 14:17:50.699574 kernel: pci 0000:00:16.7: bridge window [io 0x1000-0x0fff] to [bus 12] add_size 1000 Dec 13 14:17:50.699620 kernel: pci 0000:00:17.3: bridge window [io 0x1000-0x0fff] to [bus 16] add_size 1000 Dec 13 14:17:50.699669 kernel: pci 0000:00:17.4: bridge window [io 0x1000-0x0fff] to [bus 17] add_size 1000 Dec 13 14:17:50.699715 kernel: pci 0000:00:17.5: bridge window [io 0x1000-0x0fff] to [bus 18] add_size 1000 Dec 13 14:17:50.699761 kernel: pci 0000:00:17.6: bridge window [io 0x1000-0x0fff] to [bus 19] add_size 1000 Dec 13 14:17:50.699805 kernel: pci 0000:00:17.7: bridge window [io 0x1000-0x0fff] to [bus 1a] add_size 1000 Dec 13 14:17:50.699852 kernel: pci 0000:00:18.2: bridge window [io 0x1000-0x0fff] to [bus 1d] add_size 1000 Dec 13 14:17:50.699898 kernel: pci 0000:00:18.3: bridge window [io 0x1000-0x0fff] to [bus 1e] add_size 1000 Dec 13 14:17:50.699946 kernel: pci 0000:00:18.4: bridge window [io 0x1000-0x0fff] to [bus 1f] add_size 1000 Dec 13 14:17:50.699993 kernel: pci 0000:00:18.5: bridge window [io 0x1000-0x0fff] to [bus 20] add_size 1000 Dec 13 14:17:50.700040 kernel: pci 0000:00:18.6: bridge window [io 0x1000-0x0fff] to [bus 21] add_size 1000 Dec 13 14:17:50.700085 kernel: pci 0000:00:18.7: bridge window [io 0x1000-0x0fff] to [bus 22] add_size 1000 Dec 13 14:17:50.700131 kernel: pci 0000:00:15.0: BAR 15: assigned [mem 0xc0000000-0xc01fffff 64bit pref] Dec 13 14:17:50.702323 kernel: pci 0000:00:16.0: BAR 15: assigned [mem 0xc0200000-0xc03fffff 64bit pref] Dec 13 14:17:50.702381 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.702429 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.702477 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.702522 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.702569 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.702615 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.702661 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.702708 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.702756 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.702802 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.702848 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.702893 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.702940 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.702986 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.703032 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.703078 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.703126 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.703209 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.703256 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.703302 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.703347 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.703392 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.703438 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.703483 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.703532 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.703577 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.703623 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.703667 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.703713 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.703759 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.703804 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.703849 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.703896 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.703942 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.703988 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.704033 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.704079 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.704124 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.706045 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.706098 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.706167 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.706221 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.706267 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.706313 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.706358 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.706403 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.706449 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.706494 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.706539 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.706584 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.706633 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.706678 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.706724 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.706770 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.706816 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.706861 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.706905 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.706950 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.706995 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.707043 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.707088 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.707133 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.708209 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.708263 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.708311 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.708358 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.708408 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.708453 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.708501 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.708546 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.708591 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.708636 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.708681 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.708725 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.708771 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.708816 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.708861 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.708906 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.708953 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.708998 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.709043 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.709088 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.709132 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Dec 13 14:17:50.710210 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:17:50.710264 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Dec 13 14:17:50.710314 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] Dec 13 14:17:50.710362 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Dec 13 14:17:50.710411 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Dec 13 14:17:50.710457 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Dec 13 14:17:50.710506 kernel: pci 0000:03:00.0: BAR 6: assigned [mem 0xfd500000-0xfd50ffff pref] Dec 13 14:17:50.710552 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Dec 13 14:17:50.710599 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Dec 13 14:17:50.710644 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Dec 13 14:17:50.710689 kernel: pci 0000:00:15.0: bridge window [mem 0xc0000000-0xc01fffff 64bit pref] Dec 13 14:17:50.710737 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Dec 13 14:17:50.710784 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Dec 13 14:17:50.710829 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Dec 13 14:17:50.710875 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Dec 13 14:17:50.710941 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Dec 13 14:17:50.710993 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Dec 13 14:17:50.711039 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Dec 13 14:17:50.711085 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Dec 13 14:17:50.711130 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Dec 13 14:17:50.712219 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Dec 13 14:17:50.712272 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Dec 13 14:17:50.712324 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Dec 13 14:17:50.712371 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Dec 13 14:17:50.712417 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Dec 13 14:17:50.712463 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Dec 13 14:17:50.712508 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Dec 13 14:17:50.712554 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Dec 13 14:17:50.712601 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Dec 13 14:17:50.712646 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Dec 13 14:17:50.712691 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Dec 13 14:17:50.712736 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Dec 13 14:17:50.712781 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Dec 13 14:17:50.712826 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Dec 13 14:17:50.712876 kernel: pci 0000:0b:00.0: BAR 6: assigned [mem 0xfd400000-0xfd40ffff pref] Dec 13 14:17:50.712923 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Dec 13 14:17:50.712968 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Dec 13 14:17:50.713015 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Dec 13 14:17:50.713060 kernel: pci 0000:00:16.0: bridge window [mem 0xc0200000-0xc03fffff 64bit pref] Dec 13 14:17:50.713108 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Dec 13 14:17:50.714176 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Dec 13 14:17:50.714236 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Dec 13 14:17:50.714286 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Dec 13 14:17:50.714336 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Dec 13 14:17:50.714383 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Dec 13 14:17:50.714429 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Dec 13 14:17:50.714478 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Dec 13 14:17:50.714525 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Dec 13 14:17:50.714570 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Dec 13 14:17:50.714616 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Dec 13 14:17:50.714661 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Dec 13 14:17:50.714706 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Dec 13 14:17:50.714752 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Dec 13 14:17:50.714798 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Dec 13 14:17:50.714843 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Dec 13 14:17:50.714888 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Dec 13 14:17:50.714936 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Dec 13 14:17:50.714981 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Dec 13 14:17:50.715027 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Dec 13 14:17:50.715072 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Dec 13 14:17:50.715116 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Dec 13 14:17:50.716203 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Dec 13 14:17:50.716260 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Dec 13 14:17:50.716309 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Dec 13 14:17:50.716355 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Dec 13 14:17:50.716404 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Dec 13 14:17:50.716451 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Dec 13 14:17:50.716496 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Dec 13 14:17:50.716541 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Dec 13 14:17:50.716586 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Dec 13 14:17:50.716633 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Dec 13 14:17:50.716678 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Dec 13 14:17:50.716723 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Dec 13 14:17:50.716768 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Dec 13 14:17:50.716813 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Dec 13 14:17:50.716860 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Dec 13 14:17:50.716905 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Dec 13 14:17:50.716950 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Dec 13 14:17:50.716995 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Dec 13 14:17:50.717039 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Dec 13 14:17:50.717086 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Dec 13 14:17:50.717131 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Dec 13 14:17:50.718218 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Dec 13 14:17:50.718272 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Dec 13 14:17:50.718323 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Dec 13 14:17:50.718370 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Dec 13 14:17:50.718420 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Dec 13 14:17:50.718466 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Dec 13 14:17:50.718512 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Dec 13 14:17:50.718559 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Dec 13 14:17:50.718605 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Dec 13 14:17:50.718650 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Dec 13 14:17:50.718696 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Dec 13 14:17:50.718742 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Dec 13 14:17:50.718790 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Dec 13 14:17:50.718834 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Dec 13 14:17:50.718880 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Dec 13 14:17:50.718925 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Dec 13 14:17:50.718971 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Dec 13 14:17:50.719016 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Dec 13 14:17:50.719062 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Dec 13 14:17:50.719107 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Dec 13 14:17:50.719158 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Dec 13 14:17:50.719208 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Dec 13 14:17:50.719253 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Dec 13 14:17:50.719298 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Dec 13 14:17:50.719344 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Dec 13 14:17:50.719389 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Dec 13 14:17:50.719434 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Dec 13 14:17:50.719480 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Dec 13 14:17:50.719525 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Dec 13 14:17:50.719570 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Dec 13 14:17:50.719616 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Dec 13 14:17:50.719664 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Dec 13 14:17:50.719709 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Dec 13 14:17:50.719754 kernel: pci_bus 0000:00: resource 4 [mem 0x000a0000-0x000bffff window] Dec 13 14:17:50.719795 kernel: pci_bus 0000:00: resource 5 [mem 0x000cc000-0x000cffff window] Dec 13 14:17:50.719835 kernel: pci_bus 0000:00: resource 6 [mem 0x000d0000-0x000d3fff window] Dec 13 14:17:50.719875 kernel: pci_bus 0000:00: resource 7 [mem 0x000d4000-0x000d7fff window] Dec 13 14:17:50.719915 kernel: pci_bus 0000:00: resource 8 [mem 0x000d8000-0x000dbfff window] Dec 13 14:17:50.719962 kernel: pci_bus 0000:00: resource 9 [mem 0xc0000000-0xfebfffff window] Dec 13 14:17:50.720003 kernel: pci_bus 0000:00: resource 10 [io 0x0000-0x0cf7 window] Dec 13 14:17:50.720044 kernel: pci_bus 0000:00: resource 11 [io 0x0d00-0xfeff window] Dec 13 14:17:50.720088 kernel: pci_bus 0000:02: resource 0 [io 0x2000-0x3fff] Dec 13 14:17:50.720130 kernel: pci_bus 0000:02: resource 1 [mem 0xfd600000-0xfdffffff] Dec 13 14:17:50.723205 kernel: pci_bus 0000:02: resource 2 [mem 0xe7b00000-0xe7ffffff 64bit pref] Dec 13 14:17:50.723256 kernel: pci_bus 0000:02: resource 4 [mem 0x000a0000-0x000bffff window] Dec 13 14:17:50.723300 kernel: pci_bus 0000:02: resource 5 [mem 0x000cc000-0x000cffff window] Dec 13 14:17:50.723345 kernel: pci_bus 0000:02: resource 6 [mem 0x000d0000-0x000d3fff window] Dec 13 14:17:50.723386 kernel: pci_bus 0000:02: resource 7 [mem 0x000d4000-0x000d7fff window] Dec 13 14:17:50.723428 kernel: pci_bus 0000:02: resource 8 [mem 0x000d8000-0x000dbfff window] Dec 13 14:17:50.723469 kernel: pci_bus 0000:02: resource 9 [mem 0xc0000000-0xfebfffff window] Dec 13 14:17:50.723510 kernel: pci_bus 0000:02: resource 10 [io 0x0000-0x0cf7 window] Dec 13 14:17:50.723552 kernel: pci_bus 0000:02: resource 11 [io 0x0d00-0xfeff window] Dec 13 14:17:50.723599 kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x4fff] Dec 13 14:17:50.723644 kernel: pci_bus 0000:03: resource 1 [mem 0xfd500000-0xfd5fffff] Dec 13 14:17:50.723686 kernel: pci_bus 0000:03: resource 2 [mem 0xc0000000-0xc01fffff 64bit pref] Dec 13 14:17:50.723731 kernel: pci_bus 0000:04: resource 0 [io 0x8000-0x8fff] Dec 13 14:17:50.723774 kernel: pci_bus 0000:04: resource 1 [mem 0xfd100000-0xfd1fffff] Dec 13 14:17:50.723816 kernel: pci_bus 0000:04: resource 2 [mem 0xe7800000-0xe78fffff 64bit pref] Dec 13 14:17:50.723861 kernel: pci_bus 0000:05: resource 0 [io 0xc000-0xcfff] Dec 13 14:17:50.723903 kernel: pci_bus 0000:05: resource 1 [mem 0xfcd00000-0xfcdfffff] Dec 13 14:17:50.723946 kernel: pci_bus 0000:05: resource 2 [mem 0xe7400000-0xe74fffff 64bit pref] Dec 13 14:17:50.723994 kernel: pci_bus 0000:06: resource 1 [mem 0xfc900000-0xfc9fffff] Dec 13 14:17:50.724037 kernel: pci_bus 0000:06: resource 2 [mem 0xe7000000-0xe70fffff 64bit pref] Dec 13 14:17:50.724085 kernel: pci_bus 0000:07: resource 1 [mem 0xfc500000-0xfc5fffff] Dec 13 14:17:50.724136 kernel: pci_bus 0000:07: resource 2 [mem 0xe6c00000-0xe6cfffff 64bit pref] Dec 13 14:17:50.724227 kernel: pci_bus 0000:08: resource 1 [mem 0xfc100000-0xfc1fffff] Dec 13 14:17:50.724272 kernel: pci_bus 0000:08: resource 2 [mem 0xe6800000-0xe68fffff 64bit pref] Dec 13 14:17:50.724318 kernel: pci_bus 0000:09: resource 1 [mem 0xfbd00000-0xfbdfffff] Dec 13 14:17:50.724361 kernel: pci_bus 0000:09: resource 2 [mem 0xe6400000-0xe64fffff 64bit pref] Dec 13 14:17:50.724415 kernel: pci_bus 0000:0a: resource 1 [mem 0xfb900000-0xfb9fffff] Dec 13 14:17:50.724459 kernel: pci_bus 0000:0a: resource 2 [mem 0xe6000000-0xe60fffff 64bit pref] Dec 13 14:17:50.724505 kernel: pci_bus 0000:0b: resource 0 [io 0x5000-0x5fff] Dec 13 14:17:50.724550 kernel: pci_bus 0000:0b: resource 1 [mem 0xfd400000-0xfd4fffff] Dec 13 14:17:50.724592 kernel: pci_bus 0000:0b: resource 2 [mem 0xc0200000-0xc03fffff 64bit pref] Dec 13 14:17:50.724639 kernel: pci_bus 0000:0c: resource 0 [io 0x9000-0x9fff] Dec 13 14:17:50.724682 kernel: pci_bus 0000:0c: resource 1 [mem 0xfd000000-0xfd0fffff] Dec 13 14:17:50.724724 kernel: pci_bus 0000:0c: resource 2 [mem 0xe7700000-0xe77fffff 64bit pref] Dec 13 14:17:50.724769 kernel: pci_bus 0000:0d: resource 0 [io 0xd000-0xdfff] Dec 13 14:17:50.724814 kernel: pci_bus 0000:0d: resource 1 [mem 0xfcc00000-0xfccfffff] Dec 13 14:17:50.724856 kernel: pci_bus 0000:0d: resource 2 [mem 0xe7300000-0xe73fffff 64bit pref] Dec 13 14:17:50.724902 kernel: pci_bus 0000:0e: resource 1 [mem 0xfc800000-0xfc8fffff] Dec 13 14:17:50.724944 kernel: pci_bus 0000:0e: resource 2 [mem 0xe6f00000-0xe6ffffff 64bit pref] Dec 13 14:17:50.724990 kernel: pci_bus 0000:0f: resource 1 [mem 0xfc400000-0xfc4fffff] Dec 13 14:17:50.725033 kernel: pci_bus 0000:0f: resource 2 [mem 0xe6b00000-0xe6bfffff 64bit pref] Dec 13 14:17:50.725079 kernel: pci_bus 0000:10: resource 1 [mem 0xfc000000-0xfc0fffff] Dec 13 14:17:50.725124 kernel: pci_bus 0000:10: resource 2 [mem 0xe6700000-0xe67fffff 64bit pref] Dec 13 14:17:50.727201 kernel: pci_bus 0000:11: resource 1 [mem 0xfbc00000-0xfbcfffff] Dec 13 14:17:50.727253 kernel: pci_bus 0000:11: resource 2 [mem 0xe6300000-0xe63fffff 64bit pref] Dec 13 14:17:50.727304 kernel: pci_bus 0000:12: resource 1 [mem 0xfb800000-0xfb8fffff] Dec 13 14:17:50.727349 kernel: pci_bus 0000:12: resource 2 [mem 0xe5f00000-0xe5ffffff 64bit pref] Dec 13 14:17:50.727398 kernel: pci_bus 0000:13: resource 0 [io 0x6000-0x6fff] Dec 13 14:17:50.727445 kernel: pci_bus 0000:13: resource 1 [mem 0xfd300000-0xfd3fffff] Dec 13 14:17:50.727488 kernel: pci_bus 0000:13: resource 2 [mem 0xe7a00000-0xe7afffff 64bit pref] Dec 13 14:17:50.727533 kernel: pci_bus 0000:14: resource 0 [io 0xa000-0xafff] Dec 13 14:17:50.727576 kernel: pci_bus 0000:14: resource 1 [mem 0xfcf00000-0xfcffffff] Dec 13 14:17:50.727618 kernel: pci_bus 0000:14: resource 2 [mem 0xe7600000-0xe76fffff 64bit pref] Dec 13 14:17:50.727664 kernel: pci_bus 0000:15: resource 0 [io 0xe000-0xefff] Dec 13 14:17:50.727707 kernel: pci_bus 0000:15: resource 1 [mem 0xfcb00000-0xfcbfffff] Dec 13 14:17:50.727752 kernel: pci_bus 0000:15: resource 2 [mem 0xe7200000-0xe72fffff 64bit pref] Dec 13 14:17:50.727797 kernel: pci_bus 0000:16: resource 1 [mem 0xfc700000-0xfc7fffff] Dec 13 14:17:50.727840 kernel: pci_bus 0000:16: resource 2 [mem 0xe6e00000-0xe6efffff 64bit pref] Dec 13 14:17:50.727886 kernel: pci_bus 0000:17: resource 1 [mem 0xfc300000-0xfc3fffff] Dec 13 14:17:50.727949 kernel: pci_bus 0000:17: resource 2 [mem 0xe6a00000-0xe6afffff 64bit pref] Dec 13 14:17:50.728016 kernel: pci_bus 0000:18: resource 1 [mem 0xfbf00000-0xfbffffff] Dec 13 14:17:50.728063 kernel: pci_bus 0000:18: resource 2 [mem 0xe6600000-0xe66fffff 64bit pref] Dec 13 14:17:50.728114 kernel: pci_bus 0000:19: resource 1 [mem 0xfbb00000-0xfbbfffff] Dec 13 14:17:50.729187 kernel: pci_bus 0000:19: resource 2 [mem 0xe6200000-0xe62fffff 64bit pref] Dec 13 14:17:50.729253 kernel: pci_bus 0000:1a: resource 1 [mem 0xfb700000-0xfb7fffff] Dec 13 14:17:50.729305 kernel: pci_bus 0000:1a: resource 2 [mem 0xe5e00000-0xe5efffff 64bit pref] Dec 13 14:17:50.729357 kernel: pci_bus 0000:1b: resource 0 [io 0x7000-0x7fff] Dec 13 14:17:50.729409 kernel: pci_bus 0000:1b: resource 1 [mem 0xfd200000-0xfd2fffff] Dec 13 14:17:50.729457 kernel: pci_bus 0000:1b: resource 2 [mem 0xe7900000-0xe79fffff 64bit pref] Dec 13 14:17:50.729508 kernel: pci_bus 0000:1c: resource 0 [io 0xb000-0xbfff] Dec 13 14:17:50.729555 kernel: pci_bus 0000:1c: resource 1 [mem 0xfce00000-0xfcefffff] Dec 13 14:17:50.729602 kernel: pci_bus 0000:1c: resource 2 [mem 0xe7500000-0xe75fffff 64bit pref] Dec 13 14:17:50.729655 kernel: pci_bus 0000:1d: resource 1 [mem 0xfca00000-0xfcafffff] Dec 13 14:17:50.729705 kernel: pci_bus 0000:1d: resource 2 [mem 0xe7100000-0xe71fffff 64bit pref] Dec 13 14:17:50.729754 kernel: pci_bus 0000:1e: resource 1 [mem 0xfc600000-0xfc6fffff] Dec 13 14:17:50.729801 kernel: pci_bus 0000:1e: resource 2 [mem 0xe6d00000-0xe6dfffff 64bit pref] Dec 13 14:17:50.729853 kernel: pci_bus 0000:1f: resource 1 [mem 0xfc200000-0xfc2fffff] Dec 13 14:17:50.729900 kernel: pci_bus 0000:1f: resource 2 [mem 0xe6900000-0xe69fffff 64bit pref] Dec 13 14:17:50.729951 kernel: pci_bus 0000:20: resource 1 [mem 0xfbe00000-0xfbefffff] Dec 13 14:17:50.729998 kernel: pci_bus 0000:20: resource 2 [mem 0xe6500000-0xe65fffff 64bit pref] Dec 13 14:17:50.730049 kernel: pci_bus 0000:21: resource 1 [mem 0xfba00000-0xfbafffff] Dec 13 14:17:50.730096 kernel: pci_bus 0000:21: resource 2 [mem 0xe6100000-0xe61fffff 64bit pref] Dec 13 14:17:50.730156 kernel: pci_bus 0000:22: resource 1 [mem 0xfb600000-0xfb6fffff] Dec 13 14:17:50.730211 kernel: pci_bus 0000:22: resource 2 [mem 0xe5d00000-0xe5dfffff 64bit pref] Dec 13 14:17:50.730269 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 13 14:17:50.730278 kernel: PCI: CLS 32 bytes, default 64 Dec 13 14:17:50.730287 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 14:17:50.730293 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Dec 13 14:17:50.730300 kernel: clocksource: Switched to clocksource tsc Dec 13 14:17:50.730306 kernel: Initialise system trusted keyrings Dec 13 14:17:50.730312 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Dec 13 14:17:50.730318 kernel: Key type asymmetric registered Dec 13 14:17:50.730324 kernel: Asymmetric key parser 'x509' registered Dec 13 14:17:50.730330 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:17:50.730336 kernel: io scheduler mq-deadline registered Dec 13 14:17:50.730343 kernel: io scheduler kyber registered Dec 13 14:17:50.730349 kernel: io scheduler bfq registered Dec 13 14:17:50.730402 kernel: pcieport 0000:00:15.0: PME: Signaling with IRQ 24 Dec 13 14:17:50.730456 kernel: pcieport 0000:00:15.0: pciehp: Slot #160 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:17:50.730509 kernel: pcieport 0000:00:15.1: PME: Signaling with IRQ 25 Dec 13 14:17:50.730579 kernel: pcieport 0000:00:15.1: pciehp: Slot #161 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:17:50.730633 kernel: pcieport 0000:00:15.2: PME: Signaling with IRQ 26 Dec 13 14:17:50.730681 kernel: pcieport 0000:00:15.2: pciehp: Slot #162 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:17:50.730731 kernel: pcieport 0000:00:15.3: PME: Signaling with IRQ 27 Dec 13 14:17:50.730779 kernel: pcieport 0000:00:15.3: pciehp: Slot #163 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:17:50.730826 kernel: pcieport 0000:00:15.4: PME: Signaling with IRQ 28 Dec 13 14:17:50.730873 kernel: pcieport 0000:00:15.4: pciehp: Slot #164 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:17:50.730921 kernel: pcieport 0000:00:15.5: PME: Signaling with IRQ 29 Dec 13 14:17:50.730970 kernel: pcieport 0000:00:15.5: pciehp: Slot #165 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:17:50.731017 kernel: pcieport 0000:00:15.6: PME: Signaling with IRQ 30 Dec 13 14:17:50.731064 kernel: pcieport 0000:00:15.6: pciehp: Slot #166 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:17:50.731111 kernel: pcieport 0000:00:15.7: PME: Signaling with IRQ 31 Dec 13 14:17:50.731170 kernel: pcieport 0000:00:15.7: pciehp: Slot #167 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:17:50.731219 kernel: pcieport 0000:00:16.0: PME: Signaling with IRQ 32 Dec 13 14:17:50.731267 kernel: pcieport 0000:00:16.0: pciehp: Slot #192 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:17:50.731313 kernel: pcieport 0000:00:16.1: PME: Signaling with IRQ 33 Dec 13 14:17:50.731361 kernel: pcieport 0000:00:16.1: pciehp: Slot #193 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:17:50.731411 kernel: pcieport 0000:00:16.2: PME: Signaling with IRQ 34 Dec 13 14:17:50.731459 kernel: pcieport 0000:00:16.2: pciehp: Slot #194 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:17:50.731506 kernel: pcieport 0000:00:16.3: PME: Signaling with IRQ 35 Dec 13 14:17:50.731552 kernel: pcieport 0000:00:16.3: pciehp: Slot #195 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:17:50.731608 kernel: pcieport 0000:00:16.4: PME: Signaling with IRQ 36 Dec 13 14:17:50.731657 kernel: pcieport 0000:00:16.4: pciehp: Slot #196 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:17:50.731704 kernel: pcieport 0000:00:16.5: PME: Signaling with IRQ 37 Dec 13 14:17:50.731751 kernel: pcieport 0000:00:16.5: pciehp: Slot #197 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:17:50.731798 kernel: pcieport 0000:00:16.6: PME: Signaling with IRQ 38 Dec 13 14:17:50.731846 kernel: pcieport 0000:00:16.6: pciehp: Slot #198 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:17:50.731893 kernel: pcieport 0000:00:16.7: PME: Signaling with IRQ 39 Dec 13 14:17:50.731939 kernel: pcieport 0000:00:16.7: pciehp: Slot #199 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:17:50.731986 kernel: pcieport 0000:00:17.0: PME: Signaling with IRQ 40 Dec 13 14:17:50.732032 kernel: pcieport 0000:00:17.0: pciehp: Slot #224 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:17:50.732079 kernel: pcieport 0000:00:17.1: PME: Signaling with IRQ 41 Dec 13 14:17:50.732127 kernel: pcieport 0000:00:17.1: pciehp: Slot #225 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:17:50.732187 kernel: pcieport 0000:00:17.2: PME: Signaling with IRQ 42 Dec 13 14:17:50.732235 kernel: pcieport 0000:00:17.2: pciehp: Slot #226 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:17:50.732282 kernel: pcieport 0000:00:17.3: PME: Signaling with IRQ 43 Dec 13 14:17:50.732328 kernel: pcieport 0000:00:17.3: pciehp: Slot #227 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:17:50.732375 kernel: pcieport 0000:00:17.4: PME: Signaling with IRQ 44 Dec 13 14:17:50.732425 kernel: pcieport 0000:00:17.4: pciehp: Slot #228 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:17:50.732472 kernel: pcieport 0000:00:17.5: PME: Signaling with IRQ 45 Dec 13 14:17:50.732518 kernel: pcieport 0000:00:17.5: pciehp: Slot #229 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:17:50.732565 kernel: pcieport 0000:00:17.6: PME: Signaling with IRQ 46 Dec 13 14:17:50.732619 kernel: pcieport 0000:00:17.6: pciehp: Slot #230 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:17:50.732666 kernel: pcieport 0000:00:17.7: PME: Signaling with IRQ 47 Dec 13 14:17:50.732714 kernel: pcieport 0000:00:17.7: pciehp: Slot #231 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:17:50.732761 kernel: pcieport 0000:00:18.0: PME: Signaling with IRQ 48 Dec 13 14:17:50.732808 kernel: pcieport 0000:00:18.0: pciehp: Slot #256 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:17:50.732854 kernel: pcieport 0000:00:18.1: PME: Signaling with IRQ 49 Dec 13 14:17:50.732901 kernel: pcieport 0000:00:18.1: pciehp: Slot #257 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:17:50.732946 kernel: pcieport 0000:00:18.2: PME: Signaling with IRQ 50 Dec 13 14:17:50.732995 kernel: pcieport 0000:00:18.2: pciehp: Slot #258 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:17:50.733042 kernel: pcieport 0000:00:18.3: PME: Signaling with IRQ 51 Dec 13 14:17:50.733088 kernel: pcieport 0000:00:18.3: pciehp: Slot #259 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:17:50.733135 kernel: pcieport 0000:00:18.4: PME: Signaling with IRQ 52 Dec 13 14:17:50.733188 kernel: pcieport 0000:00:18.4: pciehp: Slot #260 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:17:50.733238 kernel: pcieport 0000:00:18.5: PME: Signaling with IRQ 53 Dec 13 14:17:50.733284 kernel: pcieport 0000:00:18.5: pciehp: Slot #261 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:17:50.733330 kernel: pcieport 0000:00:18.6: PME: Signaling with IRQ 54 Dec 13 14:17:50.733377 kernel: pcieport 0000:00:18.6: pciehp: Slot #262 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:17:50.733425 kernel: pcieport 0000:00:18.7: PME: Signaling with IRQ 55 Dec 13 14:17:50.733473 kernel: pcieport 0000:00:18.7: pciehp: Slot #263 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:17:50.733482 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 14:17:50.733489 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:17:50.733495 kernel: 00:05: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 14:17:50.733501 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBC,PNP0f13:MOUS] at 0x60,0x64 irq 1,12 Dec 13 14:17:50.733508 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 14:17:50.733514 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 14:17:50.733563 kernel: rtc_cmos 00:01: registered as rtc0 Dec 13 14:17:50.733608 kernel: rtc_cmos 00:01: setting system clock to 2024-12-13T14:17:50 UTC (1734099470) Dec 13 14:17:50.733651 kernel: rtc_cmos 00:01: alarms up to one month, y3k, 114 bytes nvram Dec 13 14:17:50.733659 kernel: fail to initialize ptp_kvm Dec 13 14:17:50.733665 kernel: intel_pstate: CPU model not supported Dec 13 14:17:50.733671 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:17:50.733681 kernel: Segment Routing with IPv6 Dec 13 14:17:50.733690 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:17:50.733699 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:17:50.733707 kernel: Key type dns_resolver registered Dec 13 14:17:50.733718 kernel: IPI shorthand broadcast: enabled Dec 13 14:17:50.733728 kernel: sched_clock: Marking stable (853507710, 238237772)->(1159169550, -67424068) Dec 13 14:17:50.733737 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 14:17:50.733743 kernel: registered taskstats version 1 Dec 13 14:17:50.733749 kernel: Loading compiled-in X.509 certificates Dec 13 14:17:50.733755 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 14:17:50.733761 kernel: Key type .fscrypt registered Dec 13 14:17:50.733767 kernel: Key type fscrypt-provisioning registered Dec 13 14:17:50.733774 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:17:50.733780 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:17:50.733786 kernel: ima: No architecture policies found Dec 13 14:17:50.733792 kernel: clk: Disabling unused clocks Dec 13 14:17:50.733799 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 14:17:50.733805 kernel: Write protecting the kernel read-only data: 28672k Dec 13 14:17:50.733811 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 14:17:50.733817 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 14:17:50.733823 kernel: Run /init as init process Dec 13 14:17:50.733831 kernel: with arguments: Dec 13 14:17:50.733837 kernel: /init Dec 13 14:17:50.733843 kernel: with environment: Dec 13 14:17:50.733849 kernel: HOME=/ Dec 13 14:17:50.733855 kernel: TERM=linux Dec 13 14:17:50.733860 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:17:50.733868 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:17:50.733876 systemd[1]: Detected virtualization vmware. Dec 13 14:17:50.733884 systemd[1]: Detected architecture x86-64. Dec 13 14:17:50.733890 systemd[1]: Running in initrd. Dec 13 14:17:50.733896 systemd[1]: No hostname configured, using default hostname. Dec 13 14:17:50.733902 systemd[1]: Hostname set to . Dec 13 14:17:50.733909 systemd[1]: Initializing machine ID from random generator. Dec 13 14:17:50.733915 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:17:50.733922 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:17:50.733928 systemd[1]: Reached target cryptsetup.target. Dec 13 14:17:50.733934 systemd[1]: Reached target paths.target. Dec 13 14:17:50.733941 systemd[1]: Reached target slices.target. Dec 13 14:17:50.733947 systemd[1]: Reached target swap.target. Dec 13 14:17:50.733953 systemd[1]: Reached target timers.target. Dec 13 14:17:50.733960 systemd[1]: Listening on iscsid.socket. Dec 13 14:17:50.733966 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:17:50.733972 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:17:50.733979 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:17:50.733986 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:17:50.733992 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:17:50.734000 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:17:50.734006 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:17:50.734013 systemd[1]: Reached target sockets.target. Dec 13 14:17:50.734019 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:17:50.734025 systemd[1]: Finished network-cleanup.service. Dec 13 14:17:50.734031 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:17:50.734038 systemd[1]: Starting systemd-journald.service... Dec 13 14:17:50.734045 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:17:50.734051 systemd[1]: Starting systemd-resolved.service... Dec 13 14:17:50.734058 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:17:50.734064 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:17:50.734070 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:17:50.734076 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:17:50.734083 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:17:50.734089 kernel: audit: type=1130 audit(1734099470.655:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:50.734095 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:17:50.734103 kernel: audit: type=1130 audit(1734099470.659:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:50.734109 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:17:50.734115 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:17:50.734121 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:17:50.734128 kernel: audit: type=1130 audit(1734099470.673:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:50.734134 systemd[1]: Started systemd-resolved.service. Dec 13 14:17:50.734140 systemd[1]: Reached target nss-lookup.target. Dec 13 14:17:50.734157 kernel: audit: type=1130 audit(1734099470.687:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:50.734165 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:17:50.734171 kernel: Bridge firewalling registered Dec 13 14:17:50.734177 kernel: SCSI subsystem initialized Dec 13 14:17:50.734186 systemd-journald[216]: Journal started Dec 13 14:17:50.734222 systemd-journald[216]: Runtime Journal (/run/log/journal/c2f80e50a9ec4c469387c3d6404382b5) is 4.8M, max 38.8M, 34.0M free. Dec 13 14:17:50.655000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:50.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:50.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:50.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:50.647653 systemd-modules-load[217]: Inserted module 'overlay' Dec 13 14:17:50.735737 systemd[1]: Started systemd-journald.service. Dec 13 14:17:50.735749 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:17:50.684013 systemd-resolved[218]: Positive Trust Anchors: Dec 13 14:17:50.684020 systemd-resolved[218]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:17:50.684039 systemd-resolved[218]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:17:50.686138 systemd-resolved[218]: Defaulting to hostname 'linux'. Dec 13 14:17:50.743193 kernel: audit: type=1130 audit(1734099470.735:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:50.743207 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:17:50.743215 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:17:50.743223 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:17:50.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:50.713942 systemd-modules-load[217]: Inserted module 'br_netfilter' Dec 13 14:17:50.743474 dracut-cmdline[233]: dracut-dracut-053 Dec 13 14:17:50.743474 dracut-cmdline[233]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Dec 13 14:17:50.743474 dracut-cmdline[233]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:17:50.746139 systemd-modules-load[217]: Inserted module 'dm_multipath' Dec 13 14:17:50.746484 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:17:50.746971 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:17:50.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:50.750160 kernel: audit: type=1130 audit(1734099470.745:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:50.753580 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:17:50.756583 kernel: iscsi: registered transport (tcp) Dec 13 14:17:50.756597 kernel: audit: type=1130 audit(1734099470.753:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:50.753000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:50.772359 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:17:50.772392 kernel: QLogic iSCSI HBA Driver Dec 13 14:17:50.788766 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:17:50.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:50.789387 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:17:50.792655 kernel: audit: type=1130 audit(1734099470.787:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:50.826166 kernel: raid6: avx2x4 gen() 48193 MB/s Dec 13 14:17:50.843158 kernel: raid6: avx2x4 xor() 21095 MB/s Dec 13 14:17:50.860159 kernel: raid6: avx2x2 gen() 53367 MB/s Dec 13 14:17:50.877190 kernel: raid6: avx2x2 xor() 31943 MB/s Dec 13 14:17:50.894162 kernel: raid6: avx2x1 gen() 44822 MB/s Dec 13 14:17:50.911162 kernel: raid6: avx2x1 xor() 27676 MB/s Dec 13 14:17:50.928161 kernel: raid6: sse2x4 gen() 21225 MB/s Dec 13 14:17:50.945155 kernel: raid6: sse2x4 xor() 11661 MB/s Dec 13 14:17:50.962162 kernel: raid6: sse2x2 gen() 21464 MB/s Dec 13 14:17:50.979156 kernel: raid6: sse2x2 xor() 13347 MB/s Dec 13 14:17:50.996156 kernel: raid6: sse2x1 gen() 18209 MB/s Dec 13 14:17:51.013362 kernel: raid6: sse2x1 xor() 8897 MB/s Dec 13 14:17:51.013380 kernel: raid6: using algorithm avx2x2 gen() 53367 MB/s Dec 13 14:17:51.013388 kernel: raid6: .... xor() 31943 MB/s, rmw enabled Dec 13 14:17:51.014517 kernel: raid6: using avx2x2 recovery algorithm Dec 13 14:17:51.023158 kernel: xor: automatically using best checksumming function avx Dec 13 14:17:51.083164 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 14:17:51.090163 kernel: audit: type=1130 audit(1734099471.086:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:51.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:51.088000 audit: BPF prog-id=7 op=LOAD Dec 13 14:17:51.088000 audit: BPF prog-id=8 op=LOAD Dec 13 14:17:51.087381 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:17:51.090067 systemd[1]: Starting systemd-udevd.service... Dec 13 14:17:51.097936 systemd-udevd[416]: Using default interface naming scheme 'v252'. Dec 13 14:17:51.100587 systemd[1]: Started systemd-udevd.service. Dec 13 14:17:51.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:51.105220 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:17:51.111205 dracut-pre-trigger[423]: rd.md=0: removing MD RAID activation Dec 13 14:17:51.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:51.127014 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:17:51.127543 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:17:51.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:51.188889 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:17:51.249283 kernel: VMware PVSCSI driver - version 1.0.7.0-k Dec 13 14:17:51.249315 kernel: vmw_pvscsi: using 64bit dma Dec 13 14:17:51.250349 kernel: vmw_pvscsi: max_id: 16 Dec 13 14:17:51.250376 kernel: vmw_pvscsi: setting ring_pages to 8 Dec 13 14:17:51.272199 kernel: vmw_pvscsi: enabling reqCallThreshold Dec 13 14:17:51.272234 kernel: vmw_pvscsi: driver-based request coalescing enabled Dec 13 14:17:51.272243 kernel: vmw_pvscsi: using MSI-X Dec 13 14:17:51.273504 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:17:51.280179 kernel: scsi host0: VMware PVSCSI storage adapter rev 2, req/cmp/msg rings: 8/8/1 pages, cmd_per_lun=254 Dec 13 14:17:51.283396 kernel: VMware vmxnet3 virtual NIC driver - version 1.6.0.0-k-NAPI Dec 13 14:17:51.283431 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 14:17:51.283444 kernel: AES CTR mode by8 optimization enabled Dec 13 14:17:51.287161 kernel: vmw_pvscsi 0000:03:00.0: VMware PVSCSI rev 2 host #0 Dec 13 14:17:51.289847 kernel: scsi 0:0:0:0: Direct-Access VMware Virtual disk 2.0 PQ: 0 ANSI: 6 Dec 13 14:17:51.294160 kernel: vmxnet3 0000:0b:00.0: # of Tx queues : 2, # of Rx queues : 2 Dec 13 14:17:51.300246 kernel: vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps Dec 13 14:17:51.301399 kernel: sd 0:0:0:0: [sda] 17805312 512-byte logical blocks: (9.12 GB/8.49 GiB) Dec 13 14:17:51.306373 kernel: sd 0:0:0:0: [sda] Write Protect is off Dec 13 14:17:51.306446 kernel: sd 0:0:0:0: [sda] Mode Sense: 31 00 00 00 Dec 13 14:17:51.306507 kernel: sd 0:0:0:0: [sda] Cache data unavailable Dec 13 14:17:51.306564 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through Dec 13 14:17:51.306622 kernel: libata version 3.00 loaded. Dec 13 14:17:51.306635 kernel: vmxnet3 0000:0b:00.0 ens192: renamed from eth0 Dec 13 14:17:51.306710 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:17:51.306722 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Dec 13 14:17:51.309089 kernel: ata_piix 0000:00:07.1: version 2.13 Dec 13 14:17:51.319794 kernel: scsi host1: ata_piix Dec 13 14:17:51.319887 kernel: scsi host2: ata_piix Dec 13 14:17:51.319956 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0x1060 irq 14 Dec 13 14:17:51.319965 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0x1068 irq 15 Dec 13 14:17:51.346163 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (462) Dec 13 14:17:51.349876 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:17:51.353220 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:17:51.354851 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:17:51.354985 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:17:51.355656 systemd[1]: Starting disk-uuid.service... Dec 13 14:17:51.357805 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:17:51.386167 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:17:51.391756 kernel: GPT:disk_guids don't match. Dec 13 14:17:51.391808 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 14:17:51.391820 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:17:51.483173 kernel: ata2.00: ATAPI: VMware Virtual IDE CDROM Drive, 00000001, max UDMA/33 Dec 13 14:17:51.491703 kernel: scsi 2:0:0:0: CD-ROM NECVMWar VMware IDE CDR10 1.00 PQ: 0 ANSI: 5 Dec 13 14:17:51.523269 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 1x/1x writer dvd-ram cd/rw xa/form2 cdda tray Dec 13 14:17:51.542085 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 14:17:51.542097 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Dec 13 14:17:52.398161 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:17:52.398416 disk-uuid[542]: The operation has completed successfully. Dec 13 14:17:52.442896 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:17:52.443184 systemd[1]: Finished disk-uuid.service. Dec 13 14:17:52.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:52.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:52.443947 systemd[1]: Starting verity-setup.service... Dec 13 14:17:52.455160 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 14:17:52.503058 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:17:52.503558 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:17:52.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:52.505286 systemd[1]: Finished verity-setup.service. Dec 13 14:17:52.559525 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:17:52.560110 systemd[1]: Starting afterburn-network-kargs.service... Dec 13 14:17:52.560314 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:17:52.560578 systemd[1]: Starting ignition-setup.service... Dec 13 14:17:52.576108 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:17:52.576129 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:17:52.576137 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:17:52.581160 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 14:17:52.586351 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:17:52.591183 systemd[1]: Finished ignition-setup.service. Dec 13 14:17:52.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:52.591739 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:17:52.639052 systemd[1]: Finished afterburn-network-kargs.service. Dec 13 14:17:52.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:52.639659 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:17:52.688514 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:17:52.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:52.687000 audit: BPF prog-id=9 op=LOAD Dec 13 14:17:52.689415 systemd[1]: Starting systemd-networkd.service... Dec 13 14:17:52.703251 systemd-networkd[736]: lo: Link UP Dec 13 14:17:52.703257 systemd-networkd[736]: lo: Gained carrier Dec 13 14:17:52.703539 systemd-networkd[736]: Enumeration completed Dec 13 14:17:52.703583 systemd[1]: Started systemd-networkd.service. Dec 13 14:17:52.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:52.703719 systemd[1]: Reached target network.target. Dec 13 14:17:52.708926 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Dec 13 14:17:52.709037 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Dec 13 14:17:52.704398 systemd[1]: Starting iscsiuio.service... Dec 13 14:17:52.704432 systemd-networkd[736]: ens192: Configuring with /etc/systemd/network/10-dracut-cmdline-99.network. Dec 13 14:17:52.706246 systemd-networkd[736]: ens192: Link UP Dec 13 14:17:52.706248 systemd-networkd[736]: ens192: Gained carrier Dec 13 14:17:52.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:52.709822 systemd[1]: Started iscsiuio.service. Dec 13 14:17:52.710442 systemd[1]: Starting iscsid.service... Dec 13 14:17:52.713047 iscsid[741]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:17:52.713047 iscsid[741]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:17:52.713047 iscsid[741]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:17:52.713047 iscsid[741]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:17:52.713047 iscsid[741]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:17:52.713047 iscsid[741]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:17:52.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:52.713678 systemd[1]: Started iscsid.service. Dec 13 14:17:52.714233 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:17:52.719371 ignition[607]: Ignition 2.14.0 Dec 13 14:17:52.719377 ignition[607]: Stage: fetch-offline Dec 13 14:17:52.719405 ignition[607]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:17:52.719423 ignition[607]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 14:17:52.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:52.721164 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:17:52.721305 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:17:52.721394 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:17:52.721482 systemd[1]: Reached target remote-fs.target. Dec 13 14:17:52.721976 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:17:52.723710 ignition[607]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 14:17:52.723773 ignition[607]: parsed url from cmdline: "" Dec 13 14:17:52.723775 ignition[607]: no config URL provided Dec 13 14:17:52.723778 ignition[607]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:17:52.723783 ignition[607]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:17:52.724135 ignition[607]: config successfully fetched Dec 13 14:17:52.724171 ignition[607]: parsing config with SHA512: 516847f3360bdb0becce23e90e3b8d827e5f69b18f9db40d01bfb2d39b7dd6674455eeb4bc38ba0aedfac80de2e33b9fe5da95337c41484cf2d836488efbf5cd Dec 13 14:17:52.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:52.726802 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:17:52.737782 unknown[607]: fetched base config from "system" Dec 13 14:17:52.737788 unknown[607]: fetched user config from "vmware" Dec 13 14:17:52.738094 ignition[607]: fetch-offline: fetch-offline passed Dec 13 14:17:52.738133 ignition[607]: Ignition finished successfully Dec 13 14:17:52.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:52.738665 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:17:52.738815 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 14:17:52.739287 systemd[1]: Starting ignition-kargs.service... Dec 13 14:17:52.744741 ignition[755]: Ignition 2.14.0 Dec 13 14:17:52.744748 ignition[755]: Stage: kargs Dec 13 14:17:52.744809 ignition[755]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:17:52.744821 ignition[755]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 14:17:52.746203 ignition[755]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 14:17:52.747641 ignition[755]: kargs: kargs passed Dec 13 14:17:52.747669 ignition[755]: Ignition finished successfully Dec 13 14:17:52.748649 systemd[1]: Finished ignition-kargs.service. Dec 13 14:17:52.749251 systemd[1]: Starting ignition-disks.service... Dec 13 14:17:52.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:52.754011 ignition[761]: Ignition 2.14.0 Dec 13 14:17:52.754020 ignition[761]: Stage: disks Dec 13 14:17:52.754085 ignition[761]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:17:52.754095 ignition[761]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 14:17:52.755355 ignition[761]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 14:17:52.756778 ignition[761]: disks: disks passed Dec 13 14:17:52.756807 ignition[761]: Ignition finished successfully Dec 13 14:17:52.757448 systemd[1]: Finished ignition-disks.service. Dec 13 14:17:52.757623 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:17:52.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:52.757733 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:17:52.757887 systemd[1]: Reached target local-fs.target. Dec 13 14:17:52.758049 systemd[1]: Reached target sysinit.target. Dec 13 14:17:52.758207 systemd[1]: Reached target basic.target. Dec 13 14:17:52.758841 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:17:52.772672 systemd-fsck[769]: ROOT: clean, 621/1628000 files, 124058/1617920 blocks Dec 13 14:17:52.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:52.773598 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:17:52.774170 systemd[1]: Mounting sysroot.mount... Dec 13 14:17:52.783419 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:17:52.783177 systemd[1]: Mounted sysroot.mount. Dec 13 14:17:52.783298 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:17:52.784267 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:17:52.784602 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 14:17:52.784622 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:17:52.784635 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:17:52.785957 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:17:52.786598 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:17:52.789310 initrd-setup-root[779]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:17:52.793282 initrd-setup-root[787]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:17:52.795615 initrd-setup-root[795]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:17:52.797511 initrd-setup-root[803]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:17:52.829723 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:17:52.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:52.830292 systemd[1]: Starting ignition-mount.service... Dec 13 14:17:52.830747 systemd[1]: Starting sysroot-boot.service... Dec 13 14:17:52.834302 bash[820]: umount: /sysroot/usr/share/oem: not mounted. Dec 13 14:17:52.841096 ignition[821]: INFO : Ignition 2.14.0 Dec 13 14:17:52.841501 ignition[821]: INFO : Stage: mount Dec 13 14:17:52.841501 ignition[821]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:17:52.841501 ignition[821]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 14:17:52.843297 ignition[821]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 14:17:52.848896 systemd[1]: Finished sysroot-boot.service. Dec 13 14:17:52.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:52.849807 ignition[821]: INFO : mount: mount passed Dec 13 14:17:52.849944 ignition[821]: INFO : Ignition finished successfully Dec 13 14:17:52.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:52.850453 systemd[1]: Finished ignition-mount.service. Dec 13 14:17:53.521788 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:17:53.536169 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (830) Dec 13 14:17:53.539823 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:17:53.539855 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:17:53.539868 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:17:53.546206 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 14:17:53.548004 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:17:53.548837 systemd[1]: Starting ignition-files.service... Dec 13 14:17:53.559554 ignition[850]: INFO : Ignition 2.14.0 Dec 13 14:17:53.559554 ignition[850]: INFO : Stage: files Dec 13 14:17:53.559981 ignition[850]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:17:53.559981 ignition[850]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 14:17:53.560914 ignition[850]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 14:17:53.564834 ignition[850]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:17:53.565428 ignition[850]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:17:53.565428 ignition[850]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:17:53.568711 ignition[850]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:17:53.568945 ignition[850]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:17:53.569632 unknown[850]: wrote ssh authorized keys file for user: core Dec 13 14:17:53.569876 ignition[850]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:17:53.570296 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 14:17:53.570490 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 14:17:54.007371 systemd-networkd[736]: ens192: Gained IPv6LL Dec 13 14:17:58.727449 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 13 14:17:58.810125 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 14:17:58.810416 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:17:58.810726 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:17:58.810924 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:17:58.811357 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:17:58.811557 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:17:58.812074 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:17:58.812252 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:17:58.812252 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:17:58.816583 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:17:58.816769 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:17:58.816769 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:17:58.816769 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:17:58.824479 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Dec 13 14:17:58.824658 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:17:58.827492 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2670021584" Dec 13 14:17:58.827713 ignition[850]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2670021584": device or resource busy Dec 13 14:17:58.827920 ignition[850]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2670021584", trying btrfs: device or resource busy Dec 13 14:17:58.828137 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2670021584" Dec 13 14:17:58.831159 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (852) Dec 13 14:17:58.832003 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2670021584" Dec 13 14:17:58.856257 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem2670021584" Dec 13 14:17:58.857518 systemd[1]: mnt-oem2670021584.mount: Deactivated successfully. Dec 13 14:17:58.858171 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem2670021584" Dec 13 14:17:58.858442 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Dec 13 14:17:58.858920 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:17:58.859280 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 Dec 13 14:17:59.332662 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Dec 13 14:17:59.522534 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:17:59.522902 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/network/00-vmware.network" Dec 13 14:17:59.522902 ignition[850]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/network/00-vmware.network" Dec 13 14:17:59.522902 ignition[850]: INFO : files: op(10): [started] processing unit "vmtoolsd.service" Dec 13 14:17:59.522902 ignition[850]: INFO : files: op(10): [finished] processing unit "vmtoolsd.service" Dec 13 14:17:59.522902 ignition[850]: INFO : files: op(11): [started] processing unit "prepare-helm.service" Dec 13 14:17:59.522902 ignition[850]: INFO : files: op(11): op(12): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:17:59.522902 ignition[850]: INFO : files: op(11): op(12): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:17:59.524295 ignition[850]: INFO : files: op(11): [finished] processing unit "prepare-helm.service" Dec 13 14:17:59.524295 ignition[850]: INFO : files: op(13): [started] processing unit "coreos-metadata.service" Dec 13 14:17:59.524295 ignition[850]: INFO : files: op(13): op(14): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 14:17:59.524295 ignition[850]: INFO : files: op(13): op(14): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 14:17:59.524295 ignition[850]: INFO : files: op(13): [finished] processing unit "coreos-metadata.service" Dec 13 14:17:59.524295 ignition[850]: INFO : files: op(15): [started] setting preset to enabled for "vmtoolsd.service" Dec 13 14:17:59.524295 ignition[850]: INFO : files: op(15): [finished] setting preset to enabled for "vmtoolsd.service" Dec 13 14:17:59.524295 ignition[850]: INFO : files: op(16): [started] setting preset to enabled for "prepare-helm.service" Dec 13 14:17:59.524295 ignition[850]: INFO : files: op(16): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 14:17:59.524295 ignition[850]: INFO : files: op(17): [started] setting preset to disabled for "coreos-metadata.service" Dec 13 14:17:59.524295 ignition[850]: INFO : files: op(17): op(18): [started] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 14:17:59.614413 ignition[850]: INFO : files: op(17): op(18): [finished] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 14:17:59.614413 ignition[850]: INFO : files: op(17): [finished] setting preset to disabled for "coreos-metadata.service" Dec 13 14:17:59.614860 ignition[850]: INFO : files: createResultFile: createFiles: op(19): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:17:59.614860 ignition[850]: INFO : files: createResultFile: createFiles: op(19): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:17:59.614860 ignition[850]: INFO : files: files passed Dec 13 14:17:59.614860 ignition[850]: INFO : Ignition finished successfully Dec 13 14:17:59.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.616898 systemd[1]: Finished ignition-files.service. Dec 13 14:17:59.623188 kernel: kauditd_printk_skb: 24 callbacks suppressed Dec 13 14:17:59.623204 kernel: audit: type=1130 audit(1734099479.615:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.617621 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:17:59.621243 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:17:59.621792 systemd[1]: Starting ignition-quench.service... Dec 13 14:17:59.624855 initrd-setup-root-after-ignition[877]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:17:59.631875 kernel: audit: type=1130 audit(1734099479.624:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.631892 kernel: audit: type=1131 audit(1734099479.624:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.631906 kernel: audit: type=1130 audit(1734099479.630:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.625201 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:17:59.625267 systemd[1]: Finished ignition-quench.service. Dec 13 14:17:59.625635 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:17:59.631824 systemd[1]: Reached target ignition-complete.target. Dec 13 14:17:59.635258 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:17:59.645207 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:17:59.645445 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:17:59.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.645743 systemd[1]: Reached target initrd-fs.target. Dec 13 14:17:59.651591 kernel: audit: type=1130 audit(1734099479.644:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.651609 kernel: audit: type=1131 audit(1734099479.644:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.644000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.651690 systemd[1]: Reached target initrd.target. Dec 13 14:17:59.651934 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:17:59.652638 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:17:59.662809 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:17:59.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.666365 kernel: audit: type=1130 audit(1734099479.661:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.663941 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:17:59.672802 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:17:59.673274 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:17:59.673664 systemd[1]: Stopped target timers.target. Dec 13 14:17:59.674008 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:17:59.674306 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:17:59.674754 systemd[1]: Stopped target initrd.target. Dec 13 14:17:59.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.678039 systemd[1]: Stopped target basic.target. Dec 13 14:17:59.678215 kernel: audit: type=1131 audit(1734099479.673:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.678445 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:17:59.678817 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:17:59.679186 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:17:59.679553 systemd[1]: Stopped target remote-fs.target. Dec 13 14:17:59.679902 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:17:59.680281 systemd[1]: Stopped target sysinit.target. Dec 13 14:17:59.680635 systemd[1]: Stopped target local-fs.target. Dec 13 14:17:59.680979 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:17:59.681341 systemd[1]: Stopped target swap.target. Dec 13 14:17:59.681644 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:17:59.681940 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:17:59.682370 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:17:59.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.685654 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:17:59.685767 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:17:59.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.686109 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:17:59.689143 kernel: audit: type=1131 audit(1734099479.681:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.689179 kernel: audit: type=1131 audit(1734099479.684:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.686242 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:17:59.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.689769 systemd[1]: Stopped target paths.target. Dec 13 14:17:59.690083 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:17:59.694212 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:17:59.694737 systemd[1]: Stopped target slices.target. Dec 13 14:17:59.695096 systemd[1]: Stopped target sockets.target. Dec 13 14:17:59.695685 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:17:59.695941 systemd[1]: Closed iscsid.socket. Dec 13 14:17:59.696306 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:17:59.696611 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:17:59.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.697087 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:17:59.697371 systemd[1]: Stopped ignition-files.service. Dec 13 14:17:59.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.698522 systemd[1]: Stopping ignition-mount.service... Dec 13 14:17:59.699051 systemd[1]: Stopping iscsiuio.service... Dec 13 14:17:59.699305 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:17:59.699587 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:17:59.700582 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:17:59.700870 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:17:59.701183 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:17:59.701634 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:17:59.701911 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:17:59.704177 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:17:59.704465 systemd[1]: Stopped iscsiuio.service. Dec 13 14:17:59.705701 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:17:59.705958 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:17:59.706240 ignition[890]: INFO : Ignition 2.14.0 Dec 13 14:17:59.706240 ignition[890]: INFO : Stage: umount Dec 13 14:17:59.706593 ignition[890]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:17:59.706593 ignition[890]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 14:17:59.707793 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:17:59.707993 systemd[1]: Closed iscsiuio.socket. Dec 13 14:17:59.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.703000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.705000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.708772 ignition[890]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 14:17:59.711814 ignition[890]: INFO : umount: umount passed Dec 13 14:17:59.711814 ignition[890]: INFO : Ignition finished successfully Dec 13 14:17:59.712435 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:17:59.712515 systemd[1]: Stopped ignition-mount.service. Dec 13 14:17:59.712714 systemd[1]: Stopped target network.target. Dec 13 14:17:59.712821 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:17:59.712853 systemd[1]: Stopped ignition-disks.service. Dec 13 14:17:59.712978 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:17:59.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.713005 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:17:59.713126 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:17:59.713164 systemd[1]: Stopped ignition-setup.service. Dec 13 14:17:59.713355 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:17:59.713518 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:17:59.718415 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:17:59.718531 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:17:59.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.720415 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:17:59.720599 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:17:59.720618 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:17:59.721129 systemd[1]: Stopping network-cleanup.service... Dec 13 14:17:59.721279 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:17:59.722000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:17:59.721314 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:17:59.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.721494 systemd[1]: afterburn-network-kargs.service: Deactivated successfully. Dec 13 14:17:59.721528 systemd[1]: Stopped afterburn-network-kargs.service. Dec 13 14:17:59.721688 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:17:59.721722 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:17:59.723092 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:17:59.723132 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:17:59.723625 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:17:59.724724 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:17:59.725130 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:17:59.725999 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:17:59.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.726698 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:17:59.726803 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:17:59.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.729000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:17:59.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.727722 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:17:59.727759 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:17:59.727899 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:17:59.727922 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:17:59.728045 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:17:59.728075 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:17:59.728333 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:17:59.728367 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:17:59.728516 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:17:59.728551 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:17:59.729892 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:17:59.730026 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:17:59.730063 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:17:59.730555 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:17:59.730651 systemd[1]: Stopped network-cleanup.service. Dec 13 14:17:59.733820 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:17:59.734099 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:17:59.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.733000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.811308 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:17:59.811544 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:17:59.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.811874 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:17:59.812092 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:17:59.812255 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:17:59.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:59.813011 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:17:59.819775 systemd[1]: Switching root. Dec 13 14:17:59.834275 iscsid[741]: iscsid shutting down. Dec 13 14:17:59.834433 systemd-journald[216]: Journal stopped Dec 13 14:18:02.718567 systemd-journald[216]: Received SIGTERM from PID 1 (systemd). Dec 13 14:18:02.718586 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:18:02.718594 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:18:02.718600 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:18:02.718606 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:18:02.718612 kernel: SELinux: policy capability open_perms=1 Dec 13 14:18:02.718619 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:18:02.718625 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:18:02.718631 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:18:02.718636 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:18:02.718642 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:18:02.718647 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:18:02.718654 systemd[1]: Successfully loaded SELinux policy in 132.646ms. Dec 13 14:18:02.718661 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.602ms. Dec 13 14:18:02.718669 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:18:02.718675 systemd[1]: Detected virtualization vmware. Dec 13 14:18:02.718683 systemd[1]: Detected architecture x86-64. Dec 13 14:18:02.718689 systemd[1]: Detected first boot. Dec 13 14:18:02.718696 systemd[1]: Initializing machine ID from random generator. Dec 13 14:18:02.718702 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:18:02.718708 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:18:02.718714 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:18:02.718721 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:18:02.718728 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:18:02.718736 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:18:02.718742 systemd[1]: Stopped iscsid.service. Dec 13 14:18:02.718748 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:18:02.718755 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:18:02.718762 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:18:02.718768 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:18:02.718775 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:18:02.718782 systemd[1]: Created slice system-getty.slice. Dec 13 14:18:02.718788 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:18:02.718795 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:18:02.718801 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:18:02.718808 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:18:02.718814 systemd[1]: Created slice user.slice. Dec 13 14:18:02.718821 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:18:02.718827 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:18:02.718834 systemd[1]: Set up automount boot.automount. Dec 13 14:18:02.718842 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:18:02.718849 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:18:02.718856 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:18:02.718863 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:18:02.718869 systemd[1]: Reached target integritysetup.target. Dec 13 14:18:02.718876 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:18:02.718883 systemd[1]: Reached target remote-fs.target. Dec 13 14:18:02.718889 systemd[1]: Reached target slices.target. Dec 13 14:18:02.718897 systemd[1]: Reached target swap.target. Dec 13 14:18:02.718904 systemd[1]: Reached target torcx.target. Dec 13 14:18:02.718911 systemd[1]: Reached target veritysetup.target. Dec 13 14:18:02.718917 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:18:02.718924 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:18:02.718931 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:18:02.718939 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:18:02.718945 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:18:02.718952 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:18:02.718959 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:18:02.718966 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:18:02.718972 systemd[1]: Mounting media.mount... Dec 13 14:18:02.718979 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:18:02.718987 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:18:02.718995 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:18:02.719002 systemd[1]: Mounting tmp.mount... Dec 13 14:18:02.719009 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:18:02.719016 systemd[1]: Starting ignition-delete-config.service... Dec 13 14:18:02.719023 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:18:02.719030 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:18:02.719037 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:18:02.719043 systemd[1]: Starting modprobe@drm.service... Dec 13 14:18:02.719051 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:18:02.719058 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:18:02.719065 systemd[1]: Starting modprobe@loop.service... Dec 13 14:18:02.719072 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:18:02.719078 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:18:02.719085 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:18:02.719092 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:18:02.719099 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:18:02.719106 systemd[1]: Stopped systemd-journald.service. Dec 13 14:18:02.719114 systemd[1]: Starting systemd-journald.service... Dec 13 14:18:02.719120 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:18:02.719127 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:18:02.719134 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:18:02.719141 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:18:02.719156 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:18:02.719163 systemd[1]: Stopped verity-setup.service. Dec 13 14:18:02.719170 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:18:02.719177 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:18:02.719185 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:18:02.719195 systemd-journald[1003]: Journal started Dec 13 14:18:02.719220 systemd-journald[1003]: Runtime Journal (/run/log/journal/96156e3680844379b9d46c923810cce3) is 4.8M, max 38.8M, 34.0M free. Dec 13 14:18:00.261000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:18:00.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:18:00.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:18:00.574000 audit: BPF prog-id=10 op=LOAD Dec 13 14:18:00.574000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:18:00.574000 audit: BPF prog-id=11 op=LOAD Dec 13 14:18:00.574000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:18:00.724000 audit[923]: AVC avc: denied { associate } for pid=923 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:18:00.724000 audit[923]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001178e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=906 pid=923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:00.724000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:18:00.726000 audit[923]: AVC avc: denied { associate } for pid=923 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:18:00.726000 audit[923]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001179b9 a2=1ed a3=0 items=2 ppid=906 pid=923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:00.726000 audit: CWD cwd="/" Dec 13 14:18:00.726000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:00.726000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:00.726000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:18:02.619000 audit: BPF prog-id=12 op=LOAD Dec 13 14:18:02.619000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:18:02.619000 audit: BPF prog-id=13 op=LOAD Dec 13 14:18:02.619000 audit: BPF prog-id=14 op=LOAD Dec 13 14:18:02.619000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:18:02.619000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:18:02.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:02.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:02.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:02.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:02.633000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:18:02.679000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:02.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:02.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:02.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:02.682000 audit: BPF prog-id=15 op=LOAD Dec 13 14:18:02.682000 audit: BPF prog-id=16 op=LOAD Dec 13 14:18:02.682000 audit: BPF prog-id=17 op=LOAD Dec 13 14:18:02.683000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:18:02.683000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:18:02.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:02.715000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:18:02.715000 audit[1003]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7fff5d421070 a2=4000 a3=7fff5d42110c items=0 ppid=1 pid=1003 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:02.715000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:18:00.723569 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-12-13T14:18:00Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:18:02.724064 systemd[1]: Started systemd-journald.service. Dec 13 14:18:02.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:02.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:02.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:02.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:02.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:02.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:02.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:02.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:02.618810 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:18:02.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:00.724349 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-12-13T14:18:00Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:18:02.621702 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:18:00.724361 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-12-13T14:18:00Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:18:02.721343 systemd[1]: Mounted media.mount. Dec 13 14:18:00.724384 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-12-13T14:18:00Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:18:02.721475 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:18:00.724391 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-12-13T14:18:00Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:18:02.721592 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:18:02.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:02.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:00.724417 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-12-13T14:18:00Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:18:02.721712 systemd[1]: Mounted tmp.mount. Dec 13 14:18:00.724427 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-12-13T14:18:00Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:18:02.723206 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:18:00.724573 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-12-13T14:18:00Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:18:02.723431 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:18:00.724594 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-12-13T14:18:00Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:18:02.723503 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:18:02.729693 jq[990]: true Dec 13 14:18:00.724602 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-12-13T14:18:00Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:18:02.723714 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:18:00.725246 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-12-13T14:18:00Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:18:02.723783 systemd[1]: Finished modprobe@drm.service. Dec 13 14:18:00.725272 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-12-13T14:18:00Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:18:02.723981 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:18:00.725283 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-12-13T14:18:00Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:18:02.724046 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:18:00.725291 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-12-13T14:18:00Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:18:02.724326 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:18:00.725305 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-12-13T14:18:00Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:18:02.725793 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:18:00.725318 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-12-13T14:18:00Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:18:02.726074 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:18:02.334838 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-12-13T14:18:02Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:18:02.726182 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:18:02.334987 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-12-13T14:18:02Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:18:02.728110 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:18:02.335049 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-12-13T14:18:02Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:18:02.335166 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-12-13T14:18:02Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:18:02.335201 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-12-13T14:18:02Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:18:02.731299 jq[1020]: true Dec 13 14:18:02.335242 /usr/lib/systemd/system-generators/torcx-generator[923]: time="2024-12-13T14:18:02Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:18:02.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:02.731472 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:18:02.731934 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:18:02.732144 systemd[1]: Reached target network-pre.target. Dec 13 14:18:02.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:02.738731 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:18:02.738884 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:18:02.741898 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:18:02.742650 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:18:02.742768 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:18:02.743400 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:18:02.747051 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:18:02.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:02.751477 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:18:02.752156 kernel: fuse: init (API version 7.34) Dec 13 14:18:02.752405 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:18:02.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:02.753748 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:18:02.753819 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:18:02.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:02.752000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:02.756603 systemd-journald[1003]: Time spent on flushing to /var/log/journal/96156e3680844379b9d46c923810cce3 is 40.928ms for 2002 entries. Dec 13 14:18:02.756603 systemd-journald[1003]: System Journal (/var/log/journal/96156e3680844379b9d46c923810cce3) is 8.0M, max 584.8M, 576.8M free. Dec 13 14:18:02.804321 systemd-journald[1003]: Received client request to flush runtime journal. Dec 13 14:18:02.804357 kernel: loop: module loaded Dec 13 14:18:02.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:02.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:02.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:02.755093 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:18:02.756869 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:18:02.767848 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:18:02.767919 systemd[1]: Finished modprobe@loop.service. Dec 13 14:18:02.768101 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:18:02.802760 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:18:02.803702 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:18:02.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:02.806166 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:18:02.844935 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:18:02.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:02.858866 ignition[1022]: Ignition 2.14.0 Dec 13 14:18:02.859096 ignition[1022]: deleting config from guestinfo properties Dec 13 14:18:02.861461 ignition[1022]: Successfully deleted config Dec 13 14:18:02.862252 systemd[1]: Finished ignition-delete-config.service. Dec 13 14:18:02.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ignition-delete-config comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:02.875408 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:18:02.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:02.876398 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:18:02.881834 udevadm[1054]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 14:18:03.201542 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:18:03.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.201000 audit: BPF prog-id=18 op=LOAD Dec 13 14:18:03.201000 audit: BPF prog-id=19 op=LOAD Dec 13 14:18:03.201000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:18:03.201000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:18:03.202575 systemd[1]: Starting systemd-udevd.service... Dec 13 14:18:03.213232 systemd-udevd[1055]: Using default interface naming scheme 'v252'. Dec 13 14:18:03.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.230000 audit: BPF prog-id=20 op=LOAD Dec 13 14:18:03.230509 systemd[1]: Started systemd-udevd.service. Dec 13 14:18:03.231641 systemd[1]: Starting systemd-networkd.service... Dec 13 14:18:03.237000 audit: BPF prog-id=21 op=LOAD Dec 13 14:18:03.237000 audit: BPF prog-id=22 op=LOAD Dec 13 14:18:03.237000 audit: BPF prog-id=23 op=LOAD Dec 13 14:18:03.239319 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:18:03.258782 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:18:03.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.260876 systemd[1]: Started systemd-userdbd.service. Dec 13 14:18:03.293160 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 14:18:03.297168 kernel: ACPI: button: Power Button [PWRF] Dec 13 14:18:03.318973 systemd-networkd[1063]: lo: Link UP Dec 13 14:18:03.318978 systemd-networkd[1063]: lo: Gained carrier Dec 13 14:18:03.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.319649 systemd-networkd[1063]: Enumeration completed Dec 13 14:18:03.319695 systemd[1]: Started systemd-networkd.service. Dec 13 14:18:03.319991 systemd-networkd[1063]: ens192: Configuring with /etc/systemd/network/00-vmware.network. Dec 13 14:18:03.322802 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Dec 13 14:18:03.322921 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Dec 13 14:18:03.322995 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens192: link becomes ready Dec 13 14:18:03.324049 systemd-networkd[1063]: ens192: Link UP Dec 13 14:18:03.324128 systemd-networkd[1063]: ens192: Gained carrier Dec 13 14:18:03.329180 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1058) Dec 13 14:18:03.380000 audit[1067]: AVC avc: denied { confidentiality } for pid=1067 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:18:03.380000 audit[1067]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=558a00167600 a1=337fc a2=7fe1fdf1ebc5 a3=5 items=110 ppid=1055 pid=1067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:03.380000 audit: CWD cwd="/" Dec 13 14:18:03.380000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=1 name=(null) inode=24931 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=2 name=(null) inode=24931 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=3 name=(null) inode=24932 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=4 name=(null) inode=24931 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=5 name=(null) inode=24933 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=6 name=(null) inode=24931 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=7 name=(null) inode=24934 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=8 name=(null) inode=24934 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=9 name=(null) inode=24935 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=10 name=(null) inode=24934 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=11 name=(null) inode=24936 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=12 name=(null) inode=24934 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=13 name=(null) inode=24937 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=14 name=(null) inode=24934 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=15 name=(null) inode=24938 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=16 name=(null) inode=24934 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=17 name=(null) inode=24939 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=18 name=(null) inode=24931 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=19 name=(null) inode=24940 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=20 name=(null) inode=24940 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=21 name=(null) inode=24941 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=22 name=(null) inode=24940 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=23 name=(null) inode=24942 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=24 name=(null) inode=24940 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=25 name=(null) inode=24943 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=26 name=(null) inode=24940 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=27 name=(null) inode=24944 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=28 name=(null) inode=24940 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=29 name=(null) inode=24945 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=30 name=(null) inode=24931 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=31 name=(null) inode=24946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=32 name=(null) inode=24946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=33 name=(null) inode=24947 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=34 name=(null) inode=24946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=35 name=(null) inode=24948 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=36 name=(null) inode=24946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=37 name=(null) inode=24949 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=38 name=(null) inode=24946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=39 name=(null) inode=24950 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=40 name=(null) inode=24946 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=41 name=(null) inode=24951 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=42 name=(null) inode=24931 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=43 name=(null) inode=24952 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=44 name=(null) inode=24952 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=45 name=(null) inode=24953 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.386299 kernel: vmw_vmci 0000:00:07.7: Found VMCI PCI device at 0x11080, irq 16 Dec 13 14:18:03.388400 kernel: vmw_vmci 0000:00:07.7: Using capabilities 0xc Dec 13 14:18:03.388478 kernel: Guest personality initialized and is active Dec 13 14:18:03.380000 audit: PATH item=46 name=(null) inode=24952 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=47 name=(null) inode=24954 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=48 name=(null) inode=24952 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=49 name=(null) inode=24955 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=50 name=(null) inode=24952 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=51 name=(null) inode=24956 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=52 name=(null) inode=24952 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=53 name=(null) inode=24957 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=55 name=(null) inode=24958 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=56 name=(null) inode=24958 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=57 name=(null) inode=24959 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=58 name=(null) inode=24958 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=59 name=(null) inode=24960 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=60 name=(null) inode=24958 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=61 name=(null) inode=24961 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=62 name=(null) inode=24961 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=63 name=(null) inode=24962 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=64 name=(null) inode=24961 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=65 name=(null) inode=24963 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=66 name=(null) inode=24961 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=67 name=(null) inode=24964 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=68 name=(null) inode=24961 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=69 name=(null) inode=24965 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=70 name=(null) inode=24961 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=71 name=(null) inode=24966 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=72 name=(null) inode=24958 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=73 name=(null) inode=24967 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=74 name=(null) inode=24967 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=75 name=(null) inode=24968 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=76 name=(null) inode=24967 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=77 name=(null) inode=24969 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=78 name=(null) inode=24967 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=79 name=(null) inode=24970 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=80 name=(null) inode=24967 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=81 name=(null) inode=24971 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=82 name=(null) inode=24967 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=83 name=(null) inode=24972 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=84 name=(null) inode=24958 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=85 name=(null) inode=24973 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=86 name=(null) inode=24973 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=87 name=(null) inode=24974 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=88 name=(null) inode=24973 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=89 name=(null) inode=24975 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=90 name=(null) inode=24973 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=91 name=(null) inode=24976 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=92 name=(null) inode=24973 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=93 name=(null) inode=24977 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=94 name=(null) inode=24973 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=95 name=(null) inode=24978 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=96 name=(null) inode=24958 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=97 name=(null) inode=24979 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=98 name=(null) inode=24979 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=99 name=(null) inode=24980 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=100 name=(null) inode=24979 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=101 name=(null) inode=24981 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=102 name=(null) inode=24979 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=103 name=(null) inode=24982 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=104 name=(null) inode=24979 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=105 name=(null) inode=24983 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.389814 kernel: VMCI host device registered (name=vmci, major=10, minor=125) Dec 13 14:18:03.389828 kernel: Initialized host personality Dec 13 14:18:03.380000 audit: PATH item=106 name=(null) inode=24979 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=107 name=(null) inode=24984 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PATH item=109 name=(null) inode=24985 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:18:03.380000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:18:03.387107 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:18:03.394163 kernel: piix4_smbus 0000:00:07.3: SMBus Host Controller not enabled! Dec 13 14:18:03.410165 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input3 Dec 13 14:18:03.416083 (udev-worker)[1058]: id: Truncating stdout of 'dmi_memory_id' up to 16384 byte. Dec 13 14:18:03.416233 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:18:03.429462 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:18:03.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.430361 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:18:03.448362 lvm[1088]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:18:03.473935 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:18:03.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.474163 systemd[1]: Reached target cryptsetup.target. Dec 13 14:18:03.475199 systemd[1]: Starting lvm2-activation.service... Dec 13 14:18:03.478093 lvm[1089]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:18:03.495765 systemd[1]: Finished lvm2-activation.service. Dec 13 14:18:03.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.495961 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:18:03.496090 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:18:03.496117 systemd[1]: Reached target local-fs.target. Dec 13 14:18:03.496248 systemd[1]: Reached target machines.target. Dec 13 14:18:03.497317 systemd[1]: Starting ldconfig.service... Dec 13 14:18:03.497873 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:18:03.497916 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:18:03.498779 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:18:03.499765 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:18:03.500867 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:18:03.502064 systemd[1]: Starting systemd-sysext.service... Dec 13 14:18:03.508203 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1091 (bootctl) Dec 13 14:18:03.508972 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:18:03.550611 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:18:03.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.552957 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:18:03.572819 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:18:03.572946 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:18:03.592181 kernel: loop0: detected capacity change from 0 to 210664 Dec 13 14:18:03.598322 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:18:03.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.624419 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:18:03.643164 kernel: loop1: detected capacity change from 0 to 210664 Dec 13 14:18:03.658658 (sd-sysext)[1103]: Using extensions 'kubernetes'. Dec 13 14:18:03.658869 (sd-sysext)[1103]: Merged extensions into '/usr'. Dec 13 14:18:03.671167 systemd-fsck[1100]: fsck.fat 4.2 (2021-01-31) Dec 13 14:18:03.671167 systemd-fsck[1100]: /dev/sda1: 789 files, 119291/258078 clusters Dec 13 14:18:03.670143 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:18:03.671289 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:18:03.672360 systemd[1]: Starting modprobe@loop.service... Dec 13 14:18:03.672484 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:18:03.672551 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:18:03.672979 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:18:03.673809 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:18:03.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.674155 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:18:03.674217 systemd[1]: Finished modprobe@loop.service. Dec 13 14:18:03.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.674467 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:18:03.675335 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:18:03.675576 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:18:03.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.675818 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:18:03.676620 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:18:03.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.716735 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:18:03.718322 systemd[1]: Mounting boot.mount... Dec 13 14:18:03.718455 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:18:03.719511 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:18:03.720184 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:18:03.724314 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:18:03.726336 systemd[1]: Finished systemd-sysext.service. Dec 13 14:18:03.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.727385 systemd[1]: Starting ensure-sysext.service... Dec 13 14:18:03.728388 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:18:03.730704 systemd[1]: Mounted boot.mount. Dec 13 14:18:03.736095 systemd[1]: Reloading. Dec 13 14:18:03.748986 systemd-tmpfiles[1111]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:18:03.756491 systemd-tmpfiles[1111]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:18:03.765352 systemd-tmpfiles[1111]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:18:03.785182 /usr/lib/systemd/system-generators/torcx-generator[1130]: time="2024-12-13T14:18:03Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:18:03.785372 /usr/lib/systemd/system-generators/torcx-generator[1130]: time="2024-12-13T14:18:03Z" level=info msg="torcx already run" Dec 13 14:18:03.848084 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:18:03.848097 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:18:03.859774 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:18:03.892000 audit: BPF prog-id=24 op=LOAD Dec 13 14:18:03.892000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:18:03.893000 audit: BPF prog-id=25 op=LOAD Dec 13 14:18:03.893000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:18:03.893000 audit: BPF prog-id=26 op=LOAD Dec 13 14:18:03.893000 audit: BPF prog-id=27 op=LOAD Dec 13 14:18:03.893000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:18:03.893000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:18:03.893000 audit: BPF prog-id=28 op=LOAD Dec 13 14:18:03.893000 audit: BPF prog-id=29 op=LOAD Dec 13 14:18:03.893000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:18:03.893000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:18:03.894000 audit: BPF prog-id=30 op=LOAD Dec 13 14:18:03.894000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:18:03.894000 audit: BPF prog-id=31 op=LOAD Dec 13 14:18:03.894000 audit: BPF prog-id=32 op=LOAD Dec 13 14:18:03.894000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:18:03.894000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:18:03.897394 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:18:03.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.903757 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:18:03.904580 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:18:03.905316 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:18:03.906432 systemd[1]: Starting modprobe@loop.service... Dec 13 14:18:03.906563 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:18:03.906636 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:18:03.906710 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:18:03.907155 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:18:03.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.907227 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:18:03.907640 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:18:03.907705 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:18:03.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.908001 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:18:03.908069 systemd[1]: Finished modprobe@loop.service. Dec 13 14:18:03.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.908355 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:18:03.908422 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:18:03.909323 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:18:03.910018 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:18:03.911094 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:18:03.911789 systemd[1]: Starting modprobe@loop.service... Dec 13 14:18:03.911914 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:18:03.911984 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:18:03.912053 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:18:03.912595 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:18:03.912662 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:18:03.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.913008 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:18:03.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.913076 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:18:03.913412 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:18:03.913471 systemd[1]: Finished modprobe@loop.service. Dec 13 14:18:03.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.913730 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:18:03.913786 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:18:03.915056 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:18:03.916419 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:18:03.917095 systemd[1]: Starting modprobe@drm.service... Dec 13 14:18:03.918745 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:18:03.919551 systemd[1]: Starting modprobe@loop.service... Dec 13 14:18:03.919689 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:18:03.919781 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:18:03.920569 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:18:03.920817 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:18:03.924450 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:18:03.924529 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:18:03.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.924836 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:18:03.924902 systemd[1]: Finished modprobe@drm.service. Dec 13 14:18:03.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.925303 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:18:03.925370 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:18:03.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.925700 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:18:03.925778 systemd[1]: Finished modprobe@loop.service. Dec 13 14:18:03.924000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.926068 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:18:03.926128 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:18:03.926928 systemd[1]: Finished ensure-sysext.service. Dec 13 14:18:03.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.935476 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:18:03.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.936389 systemd[1]: Starting audit-rules.service... Dec 13 14:18:03.937201 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:18:03.937000 audit: BPF prog-id=33 op=LOAD Dec 13 14:18:03.937970 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:18:03.938000 audit: BPF prog-id=34 op=LOAD Dec 13 14:18:03.939037 systemd[1]: Starting systemd-resolved.service... Dec 13 14:18:03.940043 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:18:03.941653 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:18:03.946000 audit[1207]: SYSTEM_BOOT pid=1207 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.948244 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:18:03.949965 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:18:03.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.950094 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:18:03.980810 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:18:03.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:18:03.994780 systemd-resolved[1205]: Positive Trust Anchors: Dec 13 14:18:03.994791 systemd-resolved[1205]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:18:03.994810 systemd-resolved[1205]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:18:03.996000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:18:03.996000 audit[1222]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffe771cbe0 a2=420 a3=0 items=0 ppid=1202 pid=1222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:18:03.996000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:18:03.997843 augenrules[1222]: No rules Dec 13 14:18:03.998245 systemd[1]: Finished audit-rules.service. Dec 13 14:18:03.999007 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:18:03.999144 systemd[1]: Reached target time-set.target. Dec 13 14:18:04.016318 systemd-resolved[1205]: Defaulting to hostname 'linux'. Dec 13 14:18:04.017365 systemd[1]: Started systemd-resolved.service. Dec 13 14:18:04.017528 systemd[1]: Reached target network.target. Dec 13 14:18:04.017619 systemd[1]: Reached target nss-lookup.target. Dec 13 14:18:04.019900 ldconfig[1090]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:18:04.035335 systemd[1]: Finished ldconfig.service. Dec 13 14:18:04.036444 systemd[1]: Starting systemd-update-done.service... Dec 13 14:18:04.040704 systemd[1]: Finished systemd-update-done.service. Dec 13 14:18:04.040860 systemd[1]: Reached target sysinit.target. Dec 13 14:18:04.041009 systemd[1]: Started motdgen.path. Dec 13 14:18:04.041117 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:18:04.041320 systemd[1]: Started logrotate.timer. Dec 13 14:18:04.041455 systemd[1]: Started mdadm.timer. Dec 13 14:18:04.041580 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:18:04.041680 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:18:04.041701 systemd[1]: Reached target paths.target. Dec 13 14:18:04.041789 systemd[1]: Reached target timers.target. Dec 13 14:18:04.042039 systemd[1]: Listening on dbus.socket. Dec 13 14:18:04.042851 systemd[1]: Starting docker.socket... Dec 13 14:18:04.050356 systemd[1]: Listening on sshd.socket. Dec 13 14:18:04.050503 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:18:04.050730 systemd[1]: Listening on docker.socket. Dec 13 14:18:04.050852 systemd[1]: Reached target sockets.target. Dec 13 14:18:04.050936 systemd[1]: Reached target basic.target. Dec 13 14:18:04.051040 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:18:04.051054 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:18:04.051670 systemd[1]: Starting containerd.service... Dec 13 14:18:04.052488 systemd[1]: Starting dbus.service... Dec 13 14:18:04.053289 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:18:04.055254 systemd[1]: Starting extend-filesystems.service... Dec 13 14:18:04.055384 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:18:04.056095 systemd[1]: Starting motdgen.service... Dec 13 14:18:04.056591 jq[1233]: false Dec 13 14:18:04.064366 systemd[1]: Starting prepare-helm.service... Dec 13 14:18:04.065350 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:18:04.066690 systemd[1]: Starting sshd-keygen.service... Dec 13 14:18:04.069758 systemd[1]: Starting systemd-logind.service... Dec 13 14:18:04.069889 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:18:04.069936 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:18:04.079172 jq[1243]: true Dec 13 14:18:04.070340 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:18:04.070717 systemd[1]: Starting update-engine.service... Dec 13 14:18:04.071597 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:18:04.072576 systemd[1]: Starting vmtoolsd.service... Dec 13 14:18:04.073786 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:18:04.073898 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:18:04.080180 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:18:04.080276 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:18:04.082100 jq[1249]: true Dec 13 14:19:13.880708 systemd-resolved[1205]: Clock change detected. Flushing caches. Dec 13 14:19:13.880775 systemd-timesyncd[1206]: Contacted time server 96.60.160.227:123 (0.flatcar.pool.ntp.org). Dec 13 14:19:13.880844 systemd-timesyncd[1206]: Initial clock synchronization to Fri 2024-12-13 14:19:13.880602 UTC. Dec 13 14:19:13.896498 systemd[1]: Started vmtoolsd.service. Dec 13 14:19:13.901899 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:19:13.901999 systemd[1]: Finished motdgen.service. Dec 13 14:19:13.907505 extend-filesystems[1234]: Found loop1 Dec 13 14:19:13.907505 extend-filesystems[1234]: Found sda Dec 13 14:19:13.907505 extend-filesystems[1234]: Found sda1 Dec 13 14:19:13.907505 extend-filesystems[1234]: Found sda2 Dec 13 14:19:13.907505 extend-filesystems[1234]: Found sda3 Dec 13 14:19:13.907505 extend-filesystems[1234]: Found usr Dec 13 14:19:13.910319 extend-filesystems[1234]: Found sda4 Dec 13 14:19:13.910319 extend-filesystems[1234]: Found sda6 Dec 13 14:19:13.910319 extend-filesystems[1234]: Found sda7 Dec 13 14:19:13.910319 extend-filesystems[1234]: Found sda9 Dec 13 14:19:13.910319 extend-filesystems[1234]: Checking size of /dev/sda9 Dec 13 14:19:13.911542 tar[1246]: linux-amd64/helm Dec 13 14:19:13.925908 extend-filesystems[1234]: Old size kept for /dev/sda9 Dec 13 14:19:13.925908 extend-filesystems[1234]: Found sr0 Dec 13 14:19:13.925840 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:19:13.927982 bash[1268]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:19:13.925984 systemd[1]: Finished extend-filesystems.service. Dec 13 14:19:13.930163 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:19:13.931267 systemd-logind[1241]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 14:19:13.931293 systemd-logind[1241]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 14:19:13.931662 systemd-logind[1241]: New seat seat0. Dec 13 14:19:13.938828 dbus-daemon[1232]: [system] SELinux support is enabled Dec 13 14:19:13.938896 systemd[1]: Started dbus.service. Dec 13 14:19:13.940141 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:19:13.940158 systemd[1]: Reached target system-config.target. Dec 13 14:19:13.940267 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:19:13.940278 systemd[1]: Reached target user-config.target. Dec 13 14:19:13.942728 systemd[1]: Started systemd-logind.service. Dec 13 14:19:13.950460 kernel: NET: Registered PF_VSOCK protocol family Dec 13 14:19:13.994141 update_engine[1242]: I1213 14:19:13.993511 1242 main.cc:92] Flatcar Update Engine starting Dec 13 14:19:13.995683 systemd[1]: Started update-engine.service. Dec 13 14:19:13.995810 update_engine[1242]: I1213 14:19:13.995694 1242 update_check_scheduler.cc:74] Next update check in 6m8s Dec 13 14:19:13.997098 systemd[1]: Started locksmithd.service. Dec 13 14:19:14.006234 env[1270]: time="2024-12-13T14:19:14.006207437Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:19:14.023091 env[1270]: time="2024-12-13T14:19:14.023066337Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:19:14.023181 env[1270]: time="2024-12-13T14:19:14.023147850Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:19:14.025825 env[1270]: time="2024-12-13T14:19:14.025801649Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:19:14.025825 env[1270]: time="2024-12-13T14:19:14.025820919Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:19:14.025952 env[1270]: time="2024-12-13T14:19:14.025935818Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:19:14.025952 env[1270]: time="2024-12-13T14:19:14.025947886Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:19:14.026000 env[1270]: time="2024-12-13T14:19:14.025955570Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:19:14.026000 env[1270]: time="2024-12-13T14:19:14.025961227Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:19:14.026031 env[1270]: time="2024-12-13T14:19:14.026001921Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:19:14.026154 env[1270]: time="2024-12-13T14:19:14.026140934Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:19:14.026220 env[1270]: time="2024-12-13T14:19:14.026205818Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:19:14.026220 env[1270]: time="2024-12-13T14:19:14.026217230Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:19:14.026265 env[1270]: time="2024-12-13T14:19:14.026244664Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:19:14.026265 env[1270]: time="2024-12-13T14:19:14.026252846Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:19:14.032123 env[1270]: time="2024-12-13T14:19:14.032099032Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:19:14.032123 env[1270]: time="2024-12-13T14:19:14.032123889Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:19:14.032210 env[1270]: time="2024-12-13T14:19:14.032133601Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:19:14.032210 env[1270]: time="2024-12-13T14:19:14.032153914Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:19:14.032210 env[1270]: time="2024-12-13T14:19:14.032163173Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:19:14.032210 env[1270]: time="2024-12-13T14:19:14.032170918Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:19:14.032210 env[1270]: time="2024-12-13T14:19:14.032177306Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:19:14.032210 env[1270]: time="2024-12-13T14:19:14.032184940Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:19:14.032210 env[1270]: time="2024-12-13T14:19:14.032191966Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:19:14.032210 env[1270]: time="2024-12-13T14:19:14.032199548Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:19:14.032210 env[1270]: time="2024-12-13T14:19:14.032207411Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:19:14.032350 env[1270]: time="2024-12-13T14:19:14.032216673Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:19:14.032350 env[1270]: time="2024-12-13T14:19:14.032277845Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:19:14.032350 env[1270]: time="2024-12-13T14:19:14.032325215Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:19:14.032569 env[1270]: time="2024-12-13T14:19:14.032554728Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:19:14.032597 env[1270]: time="2024-12-13T14:19:14.032579109Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:19:14.032597 env[1270]: time="2024-12-13T14:19:14.032589414Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:19:14.032634 env[1270]: time="2024-12-13T14:19:14.032618632Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:19:14.032634 env[1270]: time="2024-12-13T14:19:14.032626626Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:19:14.032675 env[1270]: time="2024-12-13T14:19:14.032634472Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:19:14.032675 env[1270]: time="2024-12-13T14:19:14.032640824Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:19:14.032675 env[1270]: time="2024-12-13T14:19:14.032647463Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:19:14.032675 env[1270]: time="2024-12-13T14:19:14.032654270Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:19:14.032675 env[1270]: time="2024-12-13T14:19:14.032661198Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:19:14.032675 env[1270]: time="2024-12-13T14:19:14.032667225Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:19:14.032765 env[1270]: time="2024-12-13T14:19:14.032676389Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:19:14.032765 env[1270]: time="2024-12-13T14:19:14.032742476Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:19:14.032765 env[1270]: time="2024-12-13T14:19:14.032751863Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:19:14.032765 env[1270]: time="2024-12-13T14:19:14.032758269Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:19:14.032828 env[1270]: time="2024-12-13T14:19:14.032766582Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:19:14.032828 env[1270]: time="2024-12-13T14:19:14.032775801Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:19:14.032828 env[1270]: time="2024-12-13T14:19:14.032782185Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:19:14.032828 env[1270]: time="2024-12-13T14:19:14.032793309Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:19:14.032828 env[1270]: time="2024-12-13T14:19:14.032815039Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:19:14.032955 env[1270]: time="2024-12-13T14:19:14.032924769Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:19:14.032955 env[1270]: time="2024-12-13T14:19:14.032957487Z" level=info msg="Connect containerd service" Dec 13 14:19:14.035413 env[1270]: time="2024-12-13T14:19:14.032979764Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:19:14.035413 env[1270]: time="2024-12-13T14:19:14.033340198Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:19:14.035413 env[1270]: time="2024-12-13T14:19:14.033471903Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:19:14.035413 env[1270]: time="2024-12-13T14:19:14.033500991Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:19:14.035413 env[1270]: time="2024-12-13T14:19:14.033859746Z" level=info msg="containerd successfully booted in 0.028402s" Dec 13 14:19:14.035413 env[1270]: time="2024-12-13T14:19:14.035096354Z" level=info msg="Start subscribing containerd event" Dec 13 14:19:14.035413 env[1270]: time="2024-12-13T14:19:14.035125274Z" level=info msg="Start recovering state" Dec 13 14:19:14.035413 env[1270]: time="2024-12-13T14:19:14.035161870Z" level=info msg="Start event monitor" Dec 13 14:19:14.035413 env[1270]: time="2024-12-13T14:19:14.035174110Z" level=info msg="Start snapshots syncer" Dec 13 14:19:14.035413 env[1270]: time="2024-12-13T14:19:14.035181123Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:19:14.035413 env[1270]: time="2024-12-13T14:19:14.035186129Z" level=info msg="Start streaming server" Dec 13 14:19:14.033561 systemd[1]: Started containerd.service. Dec 13 14:19:14.262380 tar[1246]: linux-amd64/LICENSE Dec 13 14:19:14.262471 tar[1246]: linux-amd64/README.md Dec 13 14:19:14.265187 systemd[1]: Finished prepare-helm.service. Dec 13 14:19:14.301616 locksmithd[1293]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:19:14.502008 sshd_keygen[1254]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:19:14.516013 systemd[1]: Finished sshd-keygen.service. Dec 13 14:19:14.517145 systemd[1]: Starting issuegen.service... Dec 13 14:19:14.520394 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:19:14.520486 systemd[1]: Finished issuegen.service. Dec 13 14:19:14.521393 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:19:14.524892 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:19:14.525832 systemd[1]: Started getty@tty1.service. Dec 13 14:19:14.526564 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:19:14.526752 systemd[1]: Reached target getty.target. Dec 13 14:19:14.871658 systemd-networkd[1063]: ens192: Gained IPv6LL Dec 13 14:19:14.872732 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:19:14.873124 systemd[1]: Reached target network-online.target. Dec 13 14:19:14.874674 systemd[1]: Starting kubelet.service... Dec 13 14:19:16.316336 systemd[1]: Started kubelet.service. Dec 13 14:19:16.316691 systemd[1]: Reached target multi-user.target. Dec 13 14:19:16.317731 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:19:16.322714 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:19:16.322804 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:19:16.322978 systemd[1]: Startup finished in 889ms (kernel) + 9.521s (initrd) + 6.466s (userspace) = 16.877s. Dec 13 14:19:16.351108 login[1358]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Dec 13 14:19:16.353029 login[1359]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 14:19:16.361137 systemd[1]: Created slice user-500.slice. Dec 13 14:19:16.361914 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:19:16.365493 systemd-logind[1241]: New session 2 of user core. Dec 13 14:19:16.367919 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:19:16.368886 systemd[1]: Starting user@500.service... Dec 13 14:19:16.371888 (systemd)[1367]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:19:16.419246 systemd[1367]: Queued start job for default target default.target. Dec 13 14:19:16.419768 systemd[1367]: Reached target paths.target. Dec 13 14:19:16.419785 systemd[1367]: Reached target sockets.target. Dec 13 14:19:16.419794 systemd[1367]: Reached target timers.target. Dec 13 14:19:16.419801 systemd[1367]: Reached target basic.target. Dec 13 14:19:16.419858 systemd[1]: Started user@500.service. Dec 13 14:19:16.420593 systemd[1]: Started session-2.scope. Dec 13 14:19:16.421359 systemd[1367]: Reached target default.target. Dec 13 14:19:16.421524 systemd[1367]: Startup finished in 46ms. Dec 13 14:19:16.918405 kubelet[1364]: E1213 14:19:16.918363 1364 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:19:16.919654 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:19:16.919751 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:19:17.351535 login[1358]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 14:19:17.354845 systemd-logind[1241]: New session 1 of user core. Dec 13 14:19:17.355425 systemd[1]: Started session-1.scope. Dec 13 14:19:27.170313 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:19:27.170501 systemd[1]: Stopped kubelet.service. Dec 13 14:19:27.171673 systemd[1]: Starting kubelet.service... Dec 13 14:19:27.439845 systemd[1]: Started kubelet.service. Dec 13 14:19:27.534336 kubelet[1396]: E1213 14:19:27.534308 1396 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:19:27.537203 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:19:27.537299 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:19:37.787952 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 14:19:37.788109 systemd[1]: Stopped kubelet.service. Dec 13 14:19:37.789330 systemd[1]: Starting kubelet.service... Dec 13 14:19:38.008844 systemd[1]: Started kubelet.service. Dec 13 14:19:38.039976 kubelet[1406]: E1213 14:19:38.039925 1406 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:19:38.041145 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:19:38.041216 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:19:48.291781 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 14:19:48.291933 systemd[1]: Stopped kubelet.service. Dec 13 14:19:48.293117 systemd[1]: Starting kubelet.service... Dec 13 14:19:48.623963 systemd[1]: Started kubelet.service. Dec 13 14:19:48.656720 kubelet[1416]: E1213 14:19:48.656697 1416 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:19:48.657866 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:19:48.657957 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:19:54.012593 systemd[1]: Created slice system-sshd.slice. Dec 13 14:19:54.013490 systemd[1]: Started sshd@0-139.178.70.104:22-147.75.109.163:59380.service. Dec 13 14:19:54.180382 sshd[1423]: Accepted publickey for core from 147.75.109.163 port 59380 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:19:54.181156 sshd[1423]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:19:54.184144 systemd[1]: Started session-3.scope. Dec 13 14:19:54.184424 systemd-logind[1241]: New session 3 of user core. Dec 13 14:19:54.231973 systemd[1]: Started sshd@1-139.178.70.104:22-147.75.109.163:59382.service. Dec 13 14:19:54.267022 sshd[1428]: Accepted publickey for core from 147.75.109.163 port 59382 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:19:54.268102 sshd[1428]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:19:54.271506 systemd[1]: Started session-4.scope. Dec 13 14:19:54.271873 systemd-logind[1241]: New session 4 of user core. Dec 13 14:19:54.322883 sshd[1428]: pam_unix(sshd:session): session closed for user core Dec 13 14:19:54.324461 systemd[1]: Started sshd@2-139.178.70.104:22-147.75.109.163:59384.service. Dec 13 14:19:54.325106 systemd[1]: sshd@1-139.178.70.104:22-147.75.109.163:59382.service: Deactivated successfully. Dec 13 14:19:54.325605 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:19:54.326007 systemd-logind[1241]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:19:54.326634 systemd-logind[1241]: Removed session 4. Dec 13 14:19:54.360161 sshd[1433]: Accepted publickey for core from 147.75.109.163 port 59384 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:19:54.360941 sshd[1433]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:19:54.363523 systemd-logind[1241]: New session 5 of user core. Dec 13 14:19:54.363990 systemd[1]: Started session-5.scope. Dec 13 14:19:54.410707 sshd[1433]: pam_unix(sshd:session): session closed for user core Dec 13 14:19:54.412897 systemd[1]: sshd@2-139.178.70.104:22-147.75.109.163:59384.service: Deactivated successfully. Dec 13 14:19:54.413307 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:19:54.413680 systemd-logind[1241]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:19:54.414333 systemd[1]: Started sshd@3-139.178.70.104:22-147.75.109.163:59398.service. Dec 13 14:19:54.414877 systemd-logind[1241]: Removed session 5. Dec 13 14:19:54.448853 sshd[1440]: Accepted publickey for core from 147.75.109.163 port 59398 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:19:54.449791 sshd[1440]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:19:54.452750 systemd-logind[1241]: New session 6 of user core. Dec 13 14:19:54.453551 systemd[1]: Started session-6.scope. Dec 13 14:19:54.504003 sshd[1440]: pam_unix(sshd:session): session closed for user core Dec 13 14:19:54.506899 systemd[1]: sshd@3-139.178.70.104:22-147.75.109.163:59398.service: Deactivated successfully. Dec 13 14:19:54.507365 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:19:54.507787 systemd-logind[1241]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:19:54.508634 systemd[1]: Started sshd@4-139.178.70.104:22-147.75.109.163:59410.service. Dec 13 14:19:54.509206 systemd-logind[1241]: Removed session 6. Dec 13 14:19:54.545481 sshd[1446]: Accepted publickey for core from 147.75.109.163 port 59410 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:19:54.545808 sshd[1446]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:19:54.548506 systemd-logind[1241]: New session 7 of user core. Dec 13 14:19:54.549310 systemd[1]: Started session-7.scope. Dec 13 14:19:54.635284 sudo[1449]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:19:54.635418 sudo[1449]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:19:54.641687 dbus-daemon[1232]: \xd0\xcd\\xb5\u0003V: received setenforce notice (enforcing=-1677308048) Dec 13 14:19:54.641819 sudo[1449]: pam_unix(sudo:session): session closed for user root Dec 13 14:19:54.646054 systemd[1]: Started sshd@5-139.178.70.104:22-147.75.109.163:59412.service. Dec 13 14:19:54.646717 sshd[1446]: pam_unix(sshd:session): session closed for user core Dec 13 14:19:54.648308 systemd[1]: sshd@4-139.178.70.104:22-147.75.109.163:59410.service: Deactivated successfully. Dec 13 14:19:54.648726 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:19:54.649167 systemd-logind[1241]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:19:54.649797 systemd-logind[1241]: Removed session 7. Dec 13 14:19:54.681899 sshd[1452]: Accepted publickey for core from 147.75.109.163 port 59412 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:19:54.682716 sshd[1452]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:19:54.685683 systemd[1]: Started session-8.scope. Dec 13 14:19:54.685877 systemd-logind[1241]: New session 8 of user core. Dec 13 14:19:54.734780 sudo[1457]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:19:54.734958 sudo[1457]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:19:54.736905 sudo[1457]: pam_unix(sudo:session): session closed for user root Dec 13 14:19:54.739992 sudo[1456]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:19:54.740122 sudo[1456]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:19:54.746266 systemd[1]: Stopping audit-rules.service... Dec 13 14:19:54.746000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:19:54.748130 kernel: kauditd_printk_skb: 284 callbacks suppressed Dec 13 14:19:54.748160 kernel: audit: type=1305 audit(1734099594.746:205): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:19:54.746000 audit[1460]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe84a2e6e0 a2=420 a3=0 items=0 ppid=1 pid=1460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:54.753695 kernel: audit: type=1300 audit(1734099594.746:205): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe84a2e6e0 a2=420 a3=0 items=0 ppid=1 pid=1460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:54.753723 kernel: audit: type=1327 audit(1734099594.746:205): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:19:54.746000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:19:54.754898 auditctl[1460]: No rules Dec 13 14:19:54.755118 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:19:54.755236 systemd[1]: Stopped audit-rules.service. Dec 13 14:19:54.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:54.756561 systemd[1]: Starting audit-rules.service... Dec 13 14:19:54.760465 kernel: audit: type=1131 audit(1734099594.754:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:54.769411 augenrules[1477]: No rules Dec 13 14:19:54.769871 systemd[1]: Finished audit-rules.service. Dec 13 14:19:54.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:54.770301 sudo[1456]: pam_unix(sudo:session): session closed for user root Dec 13 14:19:54.769000 audit[1456]: USER_END pid=1456 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:19:54.776095 kernel: audit: type=1130 audit(1734099594.769:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:54.776127 kernel: audit: type=1106 audit(1734099594.769:208): pid=1456 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:19:54.776309 sshd[1452]: pam_unix(sshd:session): session closed for user core Dec 13 14:19:54.779457 kernel: audit: type=1104 audit(1734099594.769:209): pid=1456 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:19:54.769000 audit[1456]: CRED_DISP pid=1456 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:19:54.778860 systemd[1]: Started sshd@6-139.178.70.104:22-147.75.109.163:59414.service. Dec 13 14:19:54.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.104:22-147.75.109.163:59414 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:54.782633 systemd[1]: sshd@5-139.178.70.104:22-147.75.109.163:59412.service: Deactivated successfully. Dec 13 14:19:54.782971 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 14:19:54.784464 kernel: audit: type=1130 audit(1734099594.776:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.104:22-147.75.109.163:59414 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:54.779000 audit[1452]: USER_END pid=1452 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:19:54.788669 kernel: audit: type=1106 audit(1734099594.779:211): pid=1452 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:19:54.788418 systemd-logind[1241]: Session 8 logged out. Waiting for processes to exit. Dec 13 14:19:54.779000 audit[1452]: CRED_DISP pid=1452 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:19:54.780000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.104:22-147.75.109.163:59412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:54.792112 systemd-logind[1241]: Removed session 8. Dec 13 14:19:54.792516 kernel: audit: type=1104 audit(1734099594.779:212): pid=1452 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:19:54.815000 audit[1482]: USER_ACCT pid=1482 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:19:54.815833 sshd[1482]: Accepted publickey for core from 147.75.109.163 port 59414 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:19:54.816957 sshd[1482]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:19:54.816000 audit[1482]: CRED_ACQ pid=1482 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:19:54.816000 audit[1482]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc452d7140 a2=3 a3=0 items=0 ppid=1 pid=1482 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:54.816000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:19:54.819675 systemd-logind[1241]: New session 9 of user core. Dec 13 14:19:54.820654 systemd[1]: Started session-9.scope. Dec 13 14:19:54.823000 audit[1482]: USER_START pid=1482 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:19:54.824000 audit[1485]: CRED_ACQ pid=1485 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:19:54.870134 sudo[1486]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:19:54.870274 sudo[1486]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:19:54.869000 audit[1486]: USER_ACCT pid=1486 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:19:54.869000 audit[1486]: CRED_REFR pid=1486 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:19:54.870000 audit[1486]: USER_START pid=1486 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:19:54.887523 systemd[1]: Starting docker.service... Dec 13 14:19:54.910375 env[1496]: time="2024-12-13T14:19:54.910348697Z" level=info msg="Starting up" Dec 13 14:19:54.911309 env[1496]: time="2024-12-13T14:19:54.911296500Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:19:54.911363 env[1496]: time="2024-12-13T14:19:54.911353238Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:19:54.911416 env[1496]: time="2024-12-13T14:19:54.911405575Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:19:54.911470 env[1496]: time="2024-12-13T14:19:54.911461888Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:19:54.912622 env[1496]: time="2024-12-13T14:19:54.912607380Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:19:54.912685 env[1496]: time="2024-12-13T14:19:54.912673214Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:19:54.912785 env[1496]: time="2024-12-13T14:19:54.912774823Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:19:54.912828 env[1496]: time="2024-12-13T14:19:54.912819170Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:19:54.929101 env[1496]: time="2024-12-13T14:19:54.929078536Z" level=info msg="Loading containers: start." Dec 13 14:19:54.990000 audit[1526]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1526 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:19:54.990000 audit[1526]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fffb6e225c0 a2=0 a3=7fffb6e225ac items=0 ppid=1496 pid=1526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:54.990000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 14:19:54.991000 audit[1528]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1528 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:19:54.991000 audit[1528]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc1060c3a0 a2=0 a3=7ffc1060c38c items=0 ppid=1496 pid=1528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:54.991000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 14:19:54.992000 audit[1530]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1530 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:19:54.992000 audit[1530]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc92773260 a2=0 a3=7ffc9277324c items=0 ppid=1496 pid=1530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:54.992000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:19:54.994000 audit[1532]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1532 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:19:54.994000 audit[1532]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffcdab3d1b0 a2=0 a3=7ffcdab3d19c items=0 ppid=1496 pid=1532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:54.994000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:19:54.996000 audit[1534]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1534 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:19:54.996000 audit[1534]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffb8fce360 a2=0 a3=7fffb8fce34c items=0 ppid=1496 pid=1534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:54.996000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 14:19:55.009000 audit[1539]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1539 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:19:55.009000 audit[1539]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffddcb579e0 a2=0 a3=7ffddcb579cc items=0 ppid=1496 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:55.009000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 14:19:55.012000 audit[1541]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1541 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:19:55.012000 audit[1541]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe9590b690 a2=0 a3=7ffe9590b67c items=0 ppid=1496 pid=1541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:55.012000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 14:19:55.014000 audit[1543]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1543 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:19:55.014000 audit[1543]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffc800eaa00 a2=0 a3=7ffc800ea9ec items=0 ppid=1496 pid=1543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:55.014000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 14:19:55.015000 audit[1545]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1545 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:19:55.015000 audit[1545]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffda4da9740 a2=0 a3=7ffda4da972c items=0 ppid=1496 pid=1545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:55.015000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:19:55.018000 audit[1549]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1549 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:19:55.018000 audit[1549]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fffa77f60f0 a2=0 a3=7fffa77f60dc items=0 ppid=1496 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:55.018000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:19:55.022000 audit[1550]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1550 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:19:55.022000 audit[1550]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe39101a20 a2=0 a3=7ffe39101a0c items=0 ppid=1496 pid=1550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:55.022000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:19:55.029467 kernel: Initializing XFRM netlink socket Dec 13 14:19:55.074035 env[1496]: time="2024-12-13T14:19:55.073971664Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 14:19:55.090000 audit[1558]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1558 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:19:55.090000 audit[1558]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffda20afb40 a2=0 a3=7ffda20afb2c items=0 ppid=1496 pid=1558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:55.090000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 14:19:55.099000 audit[1561]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1561 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:19:55.099000 audit[1561]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe0be4c540 a2=0 a3=7ffe0be4c52c items=0 ppid=1496 pid=1561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:55.099000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 14:19:55.101000 audit[1564]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1564 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:19:55.101000 audit[1564]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffef1922cd0 a2=0 a3=7ffef1922cbc items=0 ppid=1496 pid=1564 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:55.101000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 14:19:55.102000 audit[1566]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1566 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:19:55.102000 audit[1566]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffffd46cc90 a2=0 a3=7ffffd46cc7c items=0 ppid=1496 pid=1566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:55.102000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 14:19:55.104000 audit[1568]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1568 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:19:55.104000 audit[1568]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffed71796d0 a2=0 a3=7ffed71796bc items=0 ppid=1496 pid=1568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:55.104000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 14:19:55.105000 audit[1570]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1570 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:19:55.105000 audit[1570]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd3a8a5710 a2=0 a3=7ffd3a8a56fc items=0 ppid=1496 pid=1570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:55.105000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 14:19:55.106000 audit[1572]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1572 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:19:55.106000 audit[1572]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc21896540 a2=0 a3=7ffc2189652c items=0 ppid=1496 pid=1572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:55.106000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 14:19:55.112000 audit[1575]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1575 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:19:55.112000 audit[1575]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc5098dc30 a2=0 a3=7ffc5098dc1c items=0 ppid=1496 pid=1575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:55.112000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 14:19:55.114000 audit[1577]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1577 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:19:55.114000 audit[1577]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffd6af65930 a2=0 a3=7ffd6af6591c items=0 ppid=1496 pid=1577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:55.114000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:19:55.115000 audit[1579]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1579 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:19:55.115000 audit[1579]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe3a483d50 a2=0 a3=7ffe3a483d3c items=0 ppid=1496 pid=1579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:55.115000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:19:55.116000 audit[1581]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1581 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:19:55.116000 audit[1581]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcfa6a30e0 a2=0 a3=7ffcfa6a30cc items=0 ppid=1496 pid=1581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:55.116000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 14:19:55.117574 systemd-networkd[1063]: docker0: Link UP Dec 13 14:19:55.130000 audit[1585]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1585 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:19:55.130000 audit[1585]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc6f29d000 a2=0 a3=7ffc6f29cfec items=0 ppid=1496 pid=1585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:55.130000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:19:55.134000 audit[1586]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1586 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:19:55.134000 audit[1586]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff6144fd80 a2=0 a3=7fff6144fd6c items=0 ppid=1496 pid=1586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:19:55.134000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:19:55.135240 env[1496]: time="2024-12-13T14:19:55.135225428Z" level=info msg="Loading containers: done." Dec 13 14:19:55.142343 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1625944722-merged.mount: Deactivated successfully. Dec 13 14:19:55.160463 env[1496]: time="2024-12-13T14:19:55.160425591Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 14:19:55.160687 env[1496]: time="2024-12-13T14:19:55.160672279Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 14:19:55.160807 env[1496]: time="2024-12-13T14:19:55.160795290Z" level=info msg="Daemon has completed initialization" Dec 13 14:19:55.168597 systemd[1]: Started docker.service. Dec 13 14:19:55.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:55.175717 env[1496]: time="2024-12-13T14:19:55.175675813Z" level=info msg="API listen on /run/docker.sock" Dec 13 14:19:57.504824 env[1270]: time="2024-12-13T14:19:57.504792151Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.8\"" Dec 13 14:19:58.340894 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1951853613.mount: Deactivated successfully. Dec 13 14:19:58.756322 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Dec 13 14:19:58.756492 systemd[1]: Stopped kubelet.service. Dec 13 14:19:58.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:58.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:58.758231 systemd[1]: Starting kubelet.service... Dec 13 14:19:58.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:19:58.832136 systemd[1]: Started kubelet.service. Dec 13 14:19:58.888894 kubelet[1630]: E1213 14:19:58.888870 1630 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:19:58.889000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:19:58.890170 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:19:58.890248 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:19:59.450793 update_engine[1242]: I1213 14:19:59.450759 1242 update_attempter.cc:509] Updating boot flags... Dec 13 14:20:00.781393 env[1270]: time="2024-12-13T14:20:00.781361003Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:00.804478 env[1270]: time="2024-12-13T14:20:00.804458803Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:772392d372035bf92e430e758ad0446146d82b7192358c8651252e4fb49c43dd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:00.815404 env[1270]: time="2024-12-13T14:20:00.815379558Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:00.829219 env[1270]: time="2024-12-13T14:20:00.829199064Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:f0e1b3de0c2e98e6c6abd73edf9d3b8e4d44460656cde0ebb92e2d9206961fcb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:00.829764 env[1270]: time="2024-12-13T14:20:00.829742012Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.8\" returns image reference \"sha256:772392d372035bf92e430e758ad0446146d82b7192358c8651252e4fb49c43dd\"" Dec 13 14:20:00.838013 env[1270]: time="2024-12-13T14:20:00.837986561Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.8\"" Dec 13 14:20:03.438392 env[1270]: time="2024-12-13T14:20:03.438330519Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:03.438993 env[1270]: time="2024-12-13T14:20:03.438976308Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:85333d41dd3ce32d8344280c6d533d4c8f66252e4c28e332a2322ba3837f7bd6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:03.440021 env[1270]: time="2024-12-13T14:20:03.440007032Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:03.441042 env[1270]: time="2024-12-13T14:20:03.441026607Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:124f66b7e877eb5a80a40503057299bb60e6a5f2130905f4e3293dabf194c397,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:03.441572 env[1270]: time="2024-12-13T14:20:03.441554616Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.8\" returns image reference \"sha256:85333d41dd3ce32d8344280c6d533d4c8f66252e4c28e332a2322ba3837f7bd6\"" Dec 13 14:20:03.448500 env[1270]: time="2024-12-13T14:20:03.448470454Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.8\"" Dec 13 14:20:05.352857 env[1270]: time="2024-12-13T14:20:05.352817481Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:05.369460 env[1270]: time="2024-12-13T14:20:05.369426991Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:eb53b988d5e03f329b5fdba21cbbbae48e1619b199689e7448095b31843b2c43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:05.377826 env[1270]: time="2024-12-13T14:20:05.377801783Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:05.387773 env[1270]: time="2024-12-13T14:20:05.387750470Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c8bdeac2590c99c1a77e33995423ddb6633ff90a82a2aa455442e0a8079ef8c7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:05.388227 env[1270]: time="2024-12-13T14:20:05.388207793Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.8\" returns image reference \"sha256:eb53b988d5e03f329b5fdba21cbbbae48e1619b199689e7448095b31843b2c43\"" Dec 13 14:20:05.394741 env[1270]: time="2024-12-13T14:20:05.394722320Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\"" Dec 13 14:20:06.902176 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2700956407.mount: Deactivated successfully. Dec 13 14:20:07.391386 env[1270]: time="2024-12-13T14:20:07.391359560Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:07.396094 env[1270]: time="2024-12-13T14:20:07.396077244Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:07.401429 env[1270]: time="2024-12-13T14:20:07.401405509Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:07.402636 env[1270]: time="2024-12-13T14:20:07.402617773Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6d6be9417e22af78905000ac4fd134896bacd2188ea63c7cac8edd7a5d7e9b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:07.402948 env[1270]: time="2024-12-13T14:20:07.402930414Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\" returns image reference \"sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2\"" Dec 13 14:20:07.409051 env[1270]: time="2024-12-13T14:20:07.409025382Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 14:20:08.390234 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1965666228.mount: Deactivated successfully. Dec 13 14:20:09.006161 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Dec 13 14:20:09.006285 systemd[1]: Stopped kubelet.service. Dec 13 14:20:09.007386 systemd[1]: Starting kubelet.service... Dec 13 14:20:09.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:09.010965 kernel: kauditd_printk_skb: 88 callbacks suppressed Dec 13 14:20:09.011004 kernel: audit: type=1130 audit(1734099609.005:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:09.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:09.016458 kernel: audit: type=1131 audit(1734099609.005:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:09.070813 systemd[1]: Started kubelet.service. Dec 13 14:20:09.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:09.074462 kernel: audit: type=1130 audit(1734099609.070:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:09.107821 kubelet[1678]: E1213 14:20:09.107758 1678 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:20:09.108649 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:20:09.108724 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:20:09.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:20:09.112474 kernel: audit: type=1131 audit(1734099609.108:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:20:09.359486 env[1270]: time="2024-12-13T14:20:09.359413798Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:09.389327 env[1270]: time="2024-12-13T14:20:09.389306647Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:09.400141 env[1270]: time="2024-12-13T14:20:09.400122988Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:09.412036 env[1270]: time="2024-12-13T14:20:09.412020401Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:09.412528 env[1270]: time="2024-12-13T14:20:09.412511292Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 14:20:09.418270 env[1270]: time="2024-12-13T14:20:09.418254733Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Dec 13 14:20:10.116239 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3055974622.mount: Deactivated successfully. Dec 13 14:20:10.133333 env[1270]: time="2024-12-13T14:20:10.133301615Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:10.142521 env[1270]: time="2024-12-13T14:20:10.142494556Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:10.145224 env[1270]: time="2024-12-13T14:20:10.145206533Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:10.147305 env[1270]: time="2024-12-13T14:20:10.147286852Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:10.147545 env[1270]: time="2024-12-13T14:20:10.147524103Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Dec 13 14:20:10.154609 env[1270]: time="2024-12-13T14:20:10.154582222Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" Dec 13 14:20:10.713611 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1974310236.mount: Deactivated successfully. Dec 13 14:20:12.792268 env[1270]: time="2024-12-13T14:20:12.792226691Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:12.799166 env[1270]: time="2024-12-13T14:20:12.799142145Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:12.804018 env[1270]: time="2024-12-13T14:20:12.803999058Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:12.807238 env[1270]: time="2024-12-13T14:20:12.807220349Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:12.807836 env[1270]: time="2024-12-13T14:20:12.807815656Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899\"" Dec 13 14:20:14.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:14.728357 systemd[1]: Stopped kubelet.service. Dec 13 14:20:14.733394 kernel: audit: type=1130 audit(1734099614.727:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:14.733476 kernel: audit: type=1131 audit(1734099614.729:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:14.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:14.733962 systemd[1]: Starting kubelet.service... Dec 13 14:20:14.749361 systemd[1]: Reloading. Dec 13 14:20:14.807140 /usr/lib/systemd/system-generators/torcx-generator[1780]: time="2024-12-13T14:20:14Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:20:14.807350 /usr/lib/systemd/system-generators/torcx-generator[1780]: time="2024-12-13T14:20:14Z" level=info msg="torcx already run" Dec 13 14:20:14.865926 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:20:14.865937 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:20:14.877403 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:20:14.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.926609 kernel: audit: type=1400 audit(1734099614.916:257): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.926644 kernel: audit: type=1400 audit(1734099614.916:258): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.926662 kernel: audit: type=1400 audit(1734099614.919:259): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.926674 kernel: audit: type=1400 audit(1734099614.919:260): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.926688 kernel: audit: type=1400 audit(1734099614.919:261): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.933695 kernel: audit: type=1400 audit(1734099614.919:262): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.933726 kernel: audit: type=1400 audit(1734099614.919:263): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.933742 kernel: audit: type=1400 audit(1734099614.919:264): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.924000 audit: BPF prog-id=40 op=LOAD Dec 13 14:20:14.924000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:20:14.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.926000 audit: BPF prog-id=41 op=LOAD Dec 13 14:20:14.928000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:20:14.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.933000 audit: BPF prog-id=42 op=LOAD Dec 13 14:20:14.933000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:20:14.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.937000 audit: BPF prog-id=43 op=LOAD Dec 13 14:20:14.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.937000 audit: BPF prog-id=44 op=LOAD Dec 13 14:20:14.937000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:20:14.937000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:20:14.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit: BPF prog-id=45 op=LOAD Dec 13 14:20:14.940000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit: BPF prog-id=46 op=LOAD Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit: BPF prog-id=47 op=LOAD Dec 13 14:20:14.940000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:20:14.940000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit: BPF prog-id=48 op=LOAD Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit: BPF prog-id=49 op=LOAD Dec 13 14:20:14.940000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:20:14.940000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.941000 audit: BPF prog-id=50 op=LOAD Dec 13 14:20:14.941000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:20:14.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.941000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.941000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.941000 audit: BPF prog-id=51 op=LOAD Dec 13 14:20:14.941000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:20:14.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.942000 audit: BPF prog-id=52 op=LOAD Dec 13 14:20:14.942000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:20:14.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.943000 audit: BPF prog-id=53 op=LOAD Dec 13 14:20:14.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:14.943000 audit: BPF prog-id=54 op=LOAD Dec 13 14:20:14.943000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:20:14.943000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:20:14.955405 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 14:20:14.955462 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 14:20:14.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:20:14.955607 systemd[1]: Stopped kubelet.service. Dec 13 14:20:14.956946 systemd[1]: Starting kubelet.service... Dec 13 14:20:15.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:15.507814 systemd[1]: Started kubelet.service. Dec 13 14:20:15.649278 kubelet[1844]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:20:15.649278 kubelet[1844]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:20:15.649278 kubelet[1844]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:20:15.649529 kubelet[1844]: I1213 14:20:15.649314 1844 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:20:15.811404 kubelet[1844]: I1213 14:20:15.811349 1844 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 14:20:15.811507 kubelet[1844]: I1213 14:20:15.811500 1844 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:20:15.811740 kubelet[1844]: I1213 14:20:15.811731 1844 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 14:20:15.825954 kubelet[1844]: I1213 14:20:15.825942 1844 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:20:15.828958 kubelet[1844]: E1213 14:20:15.828942 1844 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://139.178.70.104:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:20:15.839146 kubelet[1844]: I1213 14:20:15.839131 1844 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:20:15.840940 kubelet[1844]: I1213 14:20:15.840919 1844 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:20:15.841050 kubelet[1844]: I1213 14:20:15.840939 1844 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:20:15.841495 kubelet[1844]: I1213 14:20:15.841482 1844 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:20:15.841495 kubelet[1844]: I1213 14:20:15.841495 1844 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:20:15.841567 kubelet[1844]: I1213 14:20:15.841557 1844 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:20:15.842222 kubelet[1844]: I1213 14:20:15.842212 1844 kubelet.go:400] "Attempting to sync node with API server" Dec 13 14:20:15.842222 kubelet[1844]: I1213 14:20:15.842223 1844 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:20:15.842280 kubelet[1844]: I1213 14:20:15.842235 1844 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:20:15.842280 kubelet[1844]: I1213 14:20:15.842243 1844 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:20:15.846607 kubelet[1844]: I1213 14:20:15.846158 1844 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:20:15.851281 kubelet[1844]: I1213 14:20:15.851264 1844 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:20:15.851281 kubelet[1844]: W1213 14:20:15.851297 1844 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:20:15.851915 kubelet[1844]: I1213 14:20:15.851606 1844 server.go:1264] "Started kubelet" Dec 13 14:20:15.851915 kubelet[1844]: W1213 14:20:15.851675 1844 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://139.178.70.104:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:20:15.851915 kubelet[1844]: E1213 14:20:15.851703 1844 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.70.104:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:20:15.851915 kubelet[1844]: W1213 14:20:15.851737 1844 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://139.178.70.104:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:20:15.851915 kubelet[1844]: E1213 14:20:15.851755 1844 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.70.104:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:20:15.858741 kubelet[1844]: I1213 14:20:15.858726 1844 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:20:15.859385 kubelet[1844]: I1213 14:20:15.859375 1844 server.go:455] "Adding debug handlers to kubelet server" Dec 13 14:20:15.860244 kubelet[1844]: I1213 14:20:15.860209 1844 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:20:15.860356 kubelet[1844]: I1213 14:20:15.860343 1844 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:20:15.860000 audit[1844]: AVC avc: denied { mac_admin } for pid=1844 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:15.860000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:20:15.860000 audit[1844]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a585a0 a1=c0008f4dc8 a2=c000a58570 a3=25 items=0 ppid=1 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:15.860000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:20:15.861418 kubelet[1844]: I1213 14:20:15.861393 1844 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:20:15.861492 kubelet[1844]: I1213 14:20:15.861483 1844 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:20:15.861566 kubelet[1844]: I1213 14:20:15.861559 1844 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:20:15.861000 audit[1844]: AVC avc: denied { mac_admin } for pid=1844 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:15.861000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:20:15.861000 audit[1844]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a0c5a0 a1=c0008f4de0 a2=c000a58630 a3=25 items=0 ppid=1 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:15.861000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:20:15.861990 kubelet[1844]: E1213 14:20:15.861934 1844 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://139.178.70.104:6443/api/v1/namespaces/default/events\": dial tcp 139.178.70.104:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.1810c269b7f9c771 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2024-12-13 14:20:15.851595633 +0000 UTC m=+0.340259174,LastTimestamp:2024-12-13 14:20:15.851595633 +0000 UTC m=+0.340259174,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Dec 13 14:20:15.863000 audit[1854]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1854 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:15.863000 audit[1854]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffea8c62210 a2=0 a3=7ffea8c621fc items=0 ppid=1844 pid=1854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:15.863000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:20:15.864000 audit[1855]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1855 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:15.864000 audit[1855]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff641efe40 a2=0 a3=7fff641efe2c items=0 ppid=1844 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:15.864000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:20:15.864650 kubelet[1844]: E1213 14:20:15.864637 1844 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:20:15.864883 kubelet[1844]: E1213 14:20:15.864870 1844 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:20:15.864918 kubelet[1844]: I1213 14:20:15.864891 1844 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:20:15.864946 kubelet[1844]: I1213 14:20:15.864936 1844 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 14:20:15.864976 kubelet[1844]: I1213 14:20:15.864960 1844 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:20:15.865134 kubelet[1844]: W1213 14:20:15.865112 1844 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://139.178.70.104:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:20:15.865169 kubelet[1844]: E1213 14:20:15.865137 1844 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.70.104:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:20:15.865441 kubelet[1844]: I1213 14:20:15.865427 1844 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:20:15.865482 kubelet[1844]: I1213 14:20:15.865475 1844 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:20:15.865719 kubelet[1844]: E1213 14:20:15.865701 1844 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.104:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.104:6443: connect: connection refused" interval="200ms" Dec 13 14:20:15.866168 kubelet[1844]: I1213 14:20:15.866156 1844 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:20:15.865000 audit[1857]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1857 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:15.865000 audit[1857]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff88d0b0c0 a2=0 a3=7fff88d0b0ac items=0 ppid=1844 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:15.865000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:20:15.867000 audit[1859]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1859 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:15.867000 audit[1859]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc7bc054d0 a2=0 a3=7ffc7bc054bc items=0 ppid=1844 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:15.867000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:20:15.874000 audit[1862]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1862 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:15.874000 audit[1862]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd200bf0d0 a2=0 a3=7ffd200bf0bc items=0 ppid=1844 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:15.874000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:20:15.875332 kubelet[1844]: I1213 14:20:15.875308 1844 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:20:15.875000 audit[1863]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1863 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:20:15.875000 audit[1863]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcc854b140 a2=0 a3=7ffcc854b12c items=0 ppid=1844 pid=1863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:15.875000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:20:15.876659 kubelet[1844]: I1213 14:20:15.876649 1844 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:20:15.876713 kubelet[1844]: I1213 14:20:15.876706 1844 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:20:15.876764 kubelet[1844]: I1213 14:20:15.876757 1844 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 14:20:15.876833 kubelet[1844]: E1213 14:20:15.876820 1844 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:20:15.877000 audit[1865]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1865 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:15.877000 audit[1865]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff932a3530 a2=0 a3=7fff932a351c items=0 ppid=1844 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:15.877000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:20:15.878000 audit[1866]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1866 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:15.878000 audit[1866]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd8d014e40 a2=0 a3=7ffd8d014e2c items=0 ppid=1844 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:15.878000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:20:15.878000 audit[1867]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1867 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:15.878000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdf0d78c90 a2=0 a3=7ffdf0d78c7c items=0 ppid=1844 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:15.878000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:20:15.879000 audit[1868]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1868 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:20:15.879000 audit[1868]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe0e6728c0 a2=0 a3=7ffe0e6728ac items=0 ppid=1844 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:15.879000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:20:15.882000 audit[1870]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1870 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:20:15.882000 audit[1870]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffcfbdb4700 a2=0 a3=7ffcfbdb46ec items=0 ppid=1844 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:15.882000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:20:15.885144 kubelet[1844]: W1213 14:20:15.885117 1844 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://139.178.70.104:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:20:15.885188 kubelet[1844]: E1213 14:20:15.885150 1844 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.70.104:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:20:15.885596 kubelet[1844]: I1213 14:20:15.885583 1844 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:20:15.885596 kubelet[1844]: I1213 14:20:15.885594 1844 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:20:15.885648 kubelet[1844]: I1213 14:20:15.885603 1844 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:20:15.885000 audit[1872]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1872 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:20:15.885000 audit[1872]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc646a21d0 a2=0 a3=7ffc646a21bc items=0 ppid=1844 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:15.885000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:20:15.886458 kubelet[1844]: I1213 14:20:15.886432 1844 policy_none.go:49] "None policy: Start" Dec 13 14:20:15.886742 kubelet[1844]: I1213 14:20:15.886735 1844 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:20:15.886798 kubelet[1844]: I1213 14:20:15.886793 1844 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:20:15.892091 systemd[1]: Created slice kubepods.slice. Dec 13 14:20:15.894495 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:20:15.896784 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:20:15.902886 kubelet[1844]: I1213 14:20:15.902871 1844 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:20:15.902000 audit[1844]: AVC avc: denied { mac_admin } for pid=1844 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:15.902000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:20:15.902000 audit[1844]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000214990 a1=c0006a3f80 a2=c000214960 a3=25 items=0 ppid=1 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:15.902000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:20:15.903063 kubelet[1844]: I1213 14:20:15.902907 1844 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:20:15.903063 kubelet[1844]: I1213 14:20:15.902968 1844 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:20:15.903063 kubelet[1844]: I1213 14:20:15.903030 1844 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:20:15.904836 kubelet[1844]: E1213 14:20:15.904820 1844 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Dec 13 14:20:15.965844 kubelet[1844]: I1213 14:20:15.965831 1844 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 14:20:15.966158 kubelet[1844]: E1213 14:20:15.966146 1844 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://139.178.70.104:6443/api/v1/nodes\": dial tcp 139.178.70.104:6443: connect: connection refused" node="localhost" Dec 13 14:20:15.977376 kubelet[1844]: I1213 14:20:15.977360 1844 topology_manager.go:215] "Topology Admit Handler" podUID="6c6dd06e45b23ea7ca8cd417d9cd3b2d" podNamespace="kube-system" podName="kube-apiserver-localhost" Dec 13 14:20:15.977960 kubelet[1844]: I1213 14:20:15.977945 1844 topology_manager.go:215] "Topology Admit Handler" podUID="8a50003978138b3ab9890682eff4eae8" podNamespace="kube-system" podName="kube-controller-manager-localhost" Dec 13 14:20:15.978717 kubelet[1844]: I1213 14:20:15.978700 1844 topology_manager.go:215] "Topology Admit Handler" podUID="b107a98bcf27297d642d248711a3fc70" podNamespace="kube-system" podName="kube-scheduler-localhost" Dec 13 14:20:15.981677 systemd[1]: Created slice kubepods-burstable-pod6c6dd06e45b23ea7ca8cd417d9cd3b2d.slice. Dec 13 14:20:15.991846 systemd[1]: Created slice kubepods-burstable-pod8a50003978138b3ab9890682eff4eae8.slice. Dec 13 14:20:15.997329 systemd[1]: Created slice kubepods-burstable-podb107a98bcf27297d642d248711a3fc70.slice. Dec 13 14:20:16.069341 kubelet[1844]: E1213 14:20:16.066924 1844 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.104:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.104:6443: connect: connection refused" interval="400ms" Dec 13 14:20:16.166559 kubelet[1844]: I1213 14:20:16.166536 1844 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:20:16.166559 kubelet[1844]: I1213 14:20:16.166559 1844 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:20:16.166667 kubelet[1844]: I1213 14:20:16.166571 1844 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:20:16.166667 kubelet[1844]: I1213 14:20:16.166580 1844 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/6c6dd06e45b23ea7ca8cd417d9cd3b2d-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"6c6dd06e45b23ea7ca8cd417d9cd3b2d\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:20:16.166667 kubelet[1844]: I1213 14:20:16.166589 1844 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/6c6dd06e45b23ea7ca8cd417d9cd3b2d-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"6c6dd06e45b23ea7ca8cd417d9cd3b2d\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:20:16.166667 kubelet[1844]: I1213 14:20:16.166597 1844 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/6c6dd06e45b23ea7ca8cd417d9cd3b2d-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"6c6dd06e45b23ea7ca8cd417d9cd3b2d\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:20:16.166667 kubelet[1844]: I1213 14:20:16.166607 1844 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:20:16.166765 kubelet[1844]: I1213 14:20:16.166618 1844 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:20:16.166765 kubelet[1844]: I1213 14:20:16.166626 1844 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b107a98bcf27297d642d248711a3fc70-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"b107a98bcf27297d642d248711a3fc70\") " pod="kube-system/kube-scheduler-localhost" Dec 13 14:20:16.167279 kubelet[1844]: I1213 14:20:16.167266 1844 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 14:20:16.167518 kubelet[1844]: E1213 14:20:16.167496 1844 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://139.178.70.104:6443/api/v1/nodes\": dial tcp 139.178.70.104:6443: connect: connection refused" node="localhost" Dec 13 14:20:16.291131 env[1270]: time="2024-12-13T14:20:16.291103743Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:6c6dd06e45b23ea7ca8cd417d9cd3b2d,Namespace:kube-system,Attempt:0,}" Dec 13 14:20:16.296867 env[1270]: time="2024-12-13T14:20:16.296838887Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:8a50003978138b3ab9890682eff4eae8,Namespace:kube-system,Attempt:0,}" Dec 13 14:20:16.299357 env[1270]: time="2024-12-13T14:20:16.299332422Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:b107a98bcf27297d642d248711a3fc70,Namespace:kube-system,Attempt:0,}" Dec 13 14:20:16.471536 kubelet[1844]: E1213 14:20:16.470873 1844 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.104:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.104:6443: connect: connection refused" interval="800ms" Dec 13 14:20:16.568942 kubelet[1844]: I1213 14:20:16.568921 1844 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 14:20:16.569204 kubelet[1844]: E1213 14:20:16.569156 1844 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://139.178.70.104:6443/api/v1/nodes\": dial tcp 139.178.70.104:6443: connect: connection refused" node="localhost" Dec 13 14:20:16.823436 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount930158272.mount: Deactivated successfully. Dec 13 14:20:16.826333 env[1270]: time="2024-12-13T14:20:16.826306608Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:16.827144 env[1270]: time="2024-12-13T14:20:16.827082039Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:16.827760 env[1270]: time="2024-12-13T14:20:16.827697983Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:16.828815 env[1270]: time="2024-12-13T14:20:16.828790682Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:16.829885 env[1270]: time="2024-12-13T14:20:16.829870563Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:16.831663 env[1270]: time="2024-12-13T14:20:16.831650384Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:16.832328 env[1270]: time="2024-12-13T14:20:16.832313369Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:16.833849 env[1270]: time="2024-12-13T14:20:16.833836630Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:16.834331 env[1270]: time="2024-12-13T14:20:16.834318922Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:16.834758 env[1270]: time="2024-12-13T14:20:16.834746232Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:16.835178 env[1270]: time="2024-12-13T14:20:16.835160320Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:16.835608 env[1270]: time="2024-12-13T14:20:16.835596624Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:16.852113 env[1270]: time="2024-12-13T14:20:16.843098058Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:20:16.852113 env[1270]: time="2024-12-13T14:20:16.843120221Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:20:16.852113 env[1270]: time="2024-12-13T14:20:16.843126964Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:20:16.852113 env[1270]: time="2024-12-13T14:20:16.843185981Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b7a7106a7c3ac960de67f7ee692d9d2b6d1ea6dcfc0f71ddef22f3bba3b646c7 pid=1885 runtime=io.containerd.runc.v2 Dec 13 14:20:16.852276 env[1270]: time="2024-12-13T14:20:16.846030163Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:20:16.852276 env[1270]: time="2024-12-13T14:20:16.846057007Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:20:16.852276 env[1270]: time="2024-12-13T14:20:16.846064481Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:20:16.852276 env[1270]: time="2024-12-13T14:20:16.846177552Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/14f7948a7085a2a4e805bf4ff91ff96dac634e46ff756796d4a2f8017ca520a2 pid=1899 runtime=io.containerd.runc.v2 Dec 13 14:20:16.865096 kubelet[1844]: W1213 14:20:16.865063 1844 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://139.178.70.104:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:20:16.867687 kubelet[1844]: E1213 14:20:16.865099 1844 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://139.178.70.104:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:20:16.867658 systemd[1]: Started cri-containerd-b7a7106a7c3ac960de67f7ee692d9d2b6d1ea6dcfc0f71ddef22f3bba3b646c7.scope. Dec 13 14:20:16.873321 systemd[1]: Started cri-containerd-14f7948a7085a2a4e805bf4ff91ff96dac634e46ff756796d4a2f8017ca520a2.scope. Dec 13 14:20:16.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.881000 audit: BPF prog-id=55 op=LOAD Dec 13 14:20:16.881000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.881000 audit[1911]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1885 pid=1911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:16.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237613731303661376333616339363064653637663765653639326439 Dec 13 14:20:16.881000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.881000 audit[1911]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1885 pid=1911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:16.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237613731303661376333616339363064653637663765653639326439 Dec 13 14:20:16.882000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.882000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.882000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.882000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.882000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.882000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.882000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.882000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.882000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.882000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.882000 audit: BPF prog-id=56 op=LOAD Dec 13 14:20:16.882000 audit[1911]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003cca10 items=0 ppid=1885 pid=1911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:16.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237613731303661376333616339363064653637663765653639326439 Dec 13 14:20:16.882000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.882000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.882000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.882000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.882000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.882000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.882000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.882000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.882000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.882000 audit: BPF prog-id=57 op=LOAD Dec 13 14:20:16.882000 audit[1911]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003cca58 items=0 ppid=1885 pid=1911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:16.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237613731303661376333616339363064653637663765653639326439 Dec 13 14:20:16.882000 audit: BPF prog-id=57 op=UNLOAD Dec 13 14:20:16.883000 audit: BPF prog-id=56 op=UNLOAD Dec 13 14:20:16.883000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.883000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.883000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.883000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.883000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.883000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.883000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.883000 audit[1911]: AVC avc: denied { perfmon } for pid=1911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.883000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.883000 audit[1911]: AVC avc: denied { bpf } for pid=1911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.883000 audit: BPF prog-id=58 op=LOAD Dec 13 14:20:16.883000 audit[1911]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003cce68 items=0 ppid=1885 pid=1911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:16.883000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237613731303661376333616339363064653637663765653639326439 Dec 13 14:20:16.884770 env[1270]: time="2024-12-13T14:20:16.884240579Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:20:16.884770 env[1270]: time="2024-12-13T14:20:16.884266168Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:20:16.884770 env[1270]: time="2024-12-13T14:20:16.884274431Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:20:16.884770 env[1270]: time="2024-12-13T14:20:16.884353084Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d1cd68a7b0059e69566878efcafc85b8af05bf128f99601613edcf7f9407dd92 pid=1948 runtime=io.containerd.runc.v2 Dec 13 14:20:16.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.885000 audit: BPF prog-id=59 op=LOAD Dec 13 14:20:16.886000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.886000 audit[1917]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1899 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:16.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134663739343861373038356132613465383035626634666639316666 Dec 13 14:20:16.890000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.890000 audit[1917]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1899 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:16.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134663739343861373038356132613465383035626634666639316666 Dec 13 14:20:16.890000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.890000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.890000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.890000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.890000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.890000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.890000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.890000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.890000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.890000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.890000 audit: BPF prog-id=60 op=LOAD Dec 13 14:20:16.890000 audit[1917]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003d0b90 items=0 ppid=1899 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:16.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134663739343861373038356132613465383035626634666639316666 Dec 13 14:20:16.890000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.890000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.890000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.890000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.890000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.890000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.890000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.890000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.890000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.890000 audit: BPF prog-id=61 op=LOAD Dec 13 14:20:16.890000 audit[1917]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003d0bd8 items=0 ppid=1899 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:16.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134663739343861373038356132613465383035626634666639316666 Dec 13 14:20:16.893000 audit: BPF prog-id=61 op=UNLOAD Dec 13 14:20:16.893000 audit: BPF prog-id=60 op=UNLOAD Dec 13 14:20:16.893000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.893000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.893000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.893000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.893000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.893000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.893000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.893000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.893000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.893000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.893000 audit: BPF prog-id=62 op=LOAD Dec 13 14:20:16.893000 audit[1917]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d0fe8 items=0 ppid=1899 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:16.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134663739343861373038356132613465383035626634666639316666 Dec 13 14:20:16.909607 systemd[1]: Started cri-containerd-d1cd68a7b0059e69566878efcafc85b8af05bf128f99601613edcf7f9407dd92.scope. Dec 13 14:20:16.920006 env[1270]: time="2024-12-13T14:20:16.919980422Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:8a50003978138b3ab9890682eff4eae8,Namespace:kube-system,Attempt:0,} returns sandbox id \"b7a7106a7c3ac960de67f7ee692d9d2b6d1ea6dcfc0f71ddef22f3bba3b646c7\"" Dec 13 14:20:16.922748 env[1270]: time="2024-12-13T14:20:16.922729203Z" level=info msg="CreateContainer within sandbox \"b7a7106a7c3ac960de67f7ee692d9d2b6d1ea6dcfc0f71ddef22f3bba3b646c7\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 14:20:16.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.925000 audit: BPF prog-id=63 op=LOAD Dec 13 14:20:16.926588 kubelet[1844]: W1213 14:20:16.926276 1844 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://139.178.70.104:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:20:16.926588 kubelet[1844]: E1213 14:20:16.926315 1844 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://139.178.70.104:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:20:16.926000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.926000 audit[1961]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1948 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:16.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431636436386137623030353965363935363638373865666361666338 Dec 13 14:20:16.926000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.926000 audit[1961]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1948 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:16.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431636436386137623030353965363935363638373865666361666338 Dec 13 14:20:16.926000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.926000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.926000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.926000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.926000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.926000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.926000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.926000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.926000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.926000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.926000 audit: BPF prog-id=64 op=LOAD Dec 13 14:20:16.926000 audit[1961]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000098520 items=0 ppid=1948 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:16.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431636436386137623030353965363935363638373865666361666338 Dec 13 14:20:16.927000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.927000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.927000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.927000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.927000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.927000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.927000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.927000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.927000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.927000 audit: BPF prog-id=65 op=LOAD Dec 13 14:20:16.927000 audit[1961]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000098568 items=0 ppid=1948 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:16.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431636436386137623030353965363935363638373865666361666338 Dec 13 14:20:16.927000 audit: BPF prog-id=65 op=UNLOAD Dec 13 14:20:16.927000 audit: BPF prog-id=64 op=UNLOAD Dec 13 14:20:16.927000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.927000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.927000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.927000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.927000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.927000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.927000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.927000 audit[1961]: AVC avc: denied { perfmon } for pid=1961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.927000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.927000 audit[1961]: AVC avc: denied { bpf } for pid=1961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.927000 audit: BPF prog-id=66 op=LOAD Dec 13 14:20:16.927000 audit[1961]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000098978 items=0 ppid=1948 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:16.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431636436386137623030353965363935363638373865666361666338 Dec 13 14:20:16.934040 env[1270]: time="2024-12-13T14:20:16.933525463Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:6c6dd06e45b23ea7ca8cd417d9cd3b2d,Namespace:kube-system,Attempt:0,} returns sandbox id \"14f7948a7085a2a4e805bf4ff91ff96dac634e46ff756796d4a2f8017ca520a2\"" Dec 13 14:20:16.934522 env[1270]: time="2024-12-13T14:20:16.934233922Z" level=info msg="CreateContainer within sandbox \"b7a7106a7c3ac960de67f7ee692d9d2b6d1ea6dcfc0f71ddef22f3bba3b646c7\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"66f928c9feab8ad188b161e284f257a85993c9413450d816c5fc1b2a4940aa9e\"" Dec 13 14:20:16.935269 env[1270]: time="2024-12-13T14:20:16.934917207Z" level=info msg="StartContainer for \"66f928c9feab8ad188b161e284f257a85993c9413450d816c5fc1b2a4940aa9e\"" Dec 13 14:20:16.936913 env[1270]: time="2024-12-13T14:20:16.936878834Z" level=info msg="CreateContainer within sandbox \"14f7948a7085a2a4e805bf4ff91ff96dac634e46ff756796d4a2f8017ca520a2\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 14:20:16.942041 env[1270]: time="2024-12-13T14:20:16.942020958Z" level=info msg="CreateContainer within sandbox \"14f7948a7085a2a4e805bf4ff91ff96dac634e46ff756796d4a2f8017ca520a2\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"707f2ae52c81e9dc26554a7f88d979526ed583a1539378a7673b78d05e586cab\"" Dec 13 14:20:16.942415 env[1270]: time="2024-12-13T14:20:16.942402660Z" level=info msg="StartContainer for \"707f2ae52c81e9dc26554a7f88d979526ed583a1539378a7673b78d05e586cab\"" Dec 13 14:20:16.951812 systemd[1]: Started cri-containerd-66f928c9feab8ad188b161e284f257a85993c9413450d816c5fc1b2a4940aa9e.scope. Dec 13 14:20:16.962163 systemd[1]: Started cri-containerd-707f2ae52c81e9dc26554a7f88d979526ed583a1539378a7673b78d05e586cab.scope. Dec 13 14:20:16.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.973000 audit: BPF prog-id=67 op=LOAD Dec 13 14:20:16.974000 audit[1996]: AVC avc: denied { bpf } for pid=1996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.974000 audit[1996]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1885 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:16.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636663932386339666561623861643138386231363165323834663235 Dec 13 14:20:16.974000 audit[1996]: AVC avc: denied { perfmon } for pid=1996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.974000 audit[1996]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1885 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:16.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636663932386339666561623861643138386231363165323834663235 Dec 13 14:20:16.974000 audit[1996]: AVC avc: denied { bpf } for pid=1996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.974000 audit[1996]: AVC avc: denied { bpf } for pid=1996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.974000 audit[1996]: AVC avc: denied { bpf } for pid=1996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.974000 audit[1996]: AVC avc: denied { perfmon } for pid=1996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.974000 audit[1996]: AVC avc: denied { perfmon } for pid=1996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.974000 audit[1996]: AVC avc: denied { perfmon } for pid=1996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.974000 audit[1996]: AVC avc: denied { perfmon } for pid=1996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.974000 audit[1996]: AVC avc: denied { perfmon } for pid=1996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.974000 audit[1996]: AVC avc: denied { bpf } for pid=1996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.974000 audit[1996]: AVC avc: denied { bpf } for pid=1996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.974000 audit: BPF prog-id=68 op=LOAD Dec 13 14:20:16.974000 audit[1996]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00021e920 items=0 ppid=1885 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:16.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636663932386339666561623861643138386231363165323834663235 Dec 13 14:20:16.974000 audit[1996]: AVC avc: denied { bpf } for pid=1996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.974000 audit[1996]: AVC avc: denied { bpf } for pid=1996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.974000 audit[1996]: AVC avc: denied { perfmon } for pid=1996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.974000 audit[1996]: AVC avc: denied { perfmon } for pid=1996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.974000 audit[1996]: AVC avc: denied { perfmon } for pid=1996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.974000 audit[1996]: AVC avc: denied { perfmon } for pid=1996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.974000 audit[1996]: AVC avc: denied { perfmon } for pid=1996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.974000 audit[1996]: AVC avc: denied { bpf } for pid=1996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.974000 audit[1996]: AVC avc: denied { bpf } for pid=1996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.974000 audit: BPF prog-id=69 op=LOAD Dec 13 14:20:16.974000 audit[1996]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00021e968 items=0 ppid=1885 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:16.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636663932386339666561623861643138386231363165323834663235 Dec 13 14:20:16.974000 audit: BPF prog-id=69 op=UNLOAD Dec 13 14:20:16.974000 audit: BPF prog-id=68 op=UNLOAD Dec 13 14:20:16.974000 audit[1996]: AVC avc: denied { bpf } for pid=1996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.974000 audit[1996]: AVC avc: denied { bpf } for pid=1996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.974000 audit[1996]: AVC avc: denied { bpf } for pid=1996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.974000 audit[1996]: AVC avc: denied { perfmon } for pid=1996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.974000 audit[1996]: AVC avc: denied { perfmon } for pid=1996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.974000 audit[1996]: AVC avc: denied { perfmon } for pid=1996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.974000 audit[1996]: AVC avc: denied { perfmon } for pid=1996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.974000 audit[1996]: AVC avc: denied { perfmon } for pid=1996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.974000 audit[1996]: AVC avc: denied { bpf } for pid=1996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.974000 audit[1996]: AVC avc: denied { bpf } for pid=1996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.974000 audit: BPF prog-id=70 op=LOAD Dec 13 14:20:16.974000 audit[1996]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00021ed78 items=0 ppid=1885 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:16.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636663932386339666561623861643138386231363165323834663235 Dec 13 14:20:16.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.986000 audit: BPF prog-id=71 op=LOAD Dec 13 14:20:16.987947 env[1270]: time="2024-12-13T14:20:16.987926602Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:b107a98bcf27297d642d248711a3fc70,Namespace:kube-system,Attempt:0,} returns sandbox id \"d1cd68a7b0059e69566878efcafc85b8af05bf128f99601613edcf7f9407dd92\"" Dec 13 14:20:16.987000 audit[2013]: AVC avc: denied { bpf } for pid=2013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.987000 audit[2013]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1899 pid=2013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:16.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730376632616535326338316539646332363535346137663838643937 Dec 13 14:20:16.987000 audit[2013]: AVC avc: denied { perfmon } for pid=2013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.987000 audit[2013]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1899 pid=2013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:16.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730376632616535326338316539646332363535346137663838643937 Dec 13 14:20:16.987000 audit[2013]: AVC avc: denied { bpf } for pid=2013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.987000 audit[2013]: AVC avc: denied { bpf } for pid=2013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.987000 audit[2013]: AVC avc: denied { bpf } for pid=2013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.987000 audit[2013]: AVC avc: denied { perfmon } for pid=2013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.987000 audit[2013]: AVC avc: denied { perfmon } for pid=2013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.987000 audit[2013]: AVC avc: denied { perfmon } for pid=2013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.987000 audit[2013]: AVC avc: denied { perfmon } for pid=2013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.987000 audit[2013]: AVC avc: denied { perfmon } for pid=2013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.987000 audit[2013]: AVC avc: denied { bpf } for pid=2013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.987000 audit[2013]: AVC avc: denied { bpf } for pid=2013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.987000 audit: BPF prog-id=72 op=LOAD Dec 13 14:20:16.987000 audit[2013]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a13a0 items=0 ppid=1899 pid=2013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:16.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730376632616535326338316539646332363535346137663838643937 Dec 13 14:20:16.987000 audit[2013]: AVC avc: denied { bpf } for pid=2013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.987000 audit[2013]: AVC avc: denied { bpf } for pid=2013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.987000 audit[2013]: AVC avc: denied { perfmon } for pid=2013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.987000 audit[2013]: AVC avc: denied { perfmon } for pid=2013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.987000 audit[2013]: AVC avc: denied { perfmon } for pid=2013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.987000 audit[2013]: AVC avc: denied { perfmon } for pid=2013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.987000 audit[2013]: AVC avc: denied { perfmon } for pid=2013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.987000 audit[2013]: AVC avc: denied { bpf } for pid=2013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.987000 audit[2013]: AVC avc: denied { bpf } for pid=2013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.987000 audit: BPF prog-id=73 op=LOAD Dec 13 14:20:16.987000 audit[2013]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a13e8 items=0 ppid=1899 pid=2013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:16.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730376632616535326338316539646332363535346137663838643937 Dec 13 14:20:16.987000 audit: BPF prog-id=73 op=UNLOAD Dec 13 14:20:16.987000 audit: BPF prog-id=72 op=UNLOAD Dec 13 14:20:16.987000 audit[2013]: AVC avc: denied { bpf } for pid=2013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.987000 audit[2013]: AVC avc: denied { bpf } for pid=2013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.987000 audit[2013]: AVC avc: denied { bpf } for pid=2013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.987000 audit[2013]: AVC avc: denied { perfmon } for pid=2013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.987000 audit[2013]: AVC avc: denied { perfmon } for pid=2013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.987000 audit[2013]: AVC avc: denied { perfmon } for pid=2013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.987000 audit[2013]: AVC avc: denied { perfmon } for pid=2013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.987000 audit[2013]: AVC avc: denied { perfmon } for pid=2013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.987000 audit[2013]: AVC avc: denied { bpf } for pid=2013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.987000 audit[2013]: AVC avc: denied { bpf } for pid=2013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:16.987000 audit: BPF prog-id=74 op=LOAD Dec 13 14:20:16.987000 audit[2013]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a17f8 items=0 ppid=1899 pid=2013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:16.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730376632616535326338316539646332363535346137663838643937 Dec 13 14:20:16.990546 env[1270]: time="2024-12-13T14:20:16.990527716Z" level=info msg="CreateContainer within sandbox \"d1cd68a7b0059e69566878efcafc85b8af05bf128f99601613edcf7f9407dd92\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 14:20:16.998614 env[1270]: time="2024-12-13T14:20:16.998594199Z" level=info msg="CreateContainer within sandbox \"d1cd68a7b0059e69566878efcafc85b8af05bf128f99601613edcf7f9407dd92\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"c0b1bbefbd37bc923ee774751d6ce316207adaaf092dc020edce56f28ec44dcb\"" Dec 13 14:20:16.999544 env[1270]: time="2024-12-13T14:20:16.999525415Z" level=info msg="StartContainer for \"c0b1bbefbd37bc923ee774751d6ce316207adaaf092dc020edce56f28ec44dcb\"" Dec 13 14:20:17.003656 env[1270]: time="2024-12-13T14:20:17.003641886Z" level=info msg="StartContainer for \"66f928c9feab8ad188b161e284f257a85993c9413450d816c5fc1b2a4940aa9e\" returns successfully" Dec 13 14:20:17.015172 systemd[1]: Started cri-containerd-c0b1bbefbd37bc923ee774751d6ce316207adaaf092dc020edce56f28ec44dcb.scope. Dec 13 14:20:17.026004 env[1270]: time="2024-12-13T14:20:17.025589539Z" level=info msg="StartContainer for \"707f2ae52c81e9dc26554a7f88d979526ed583a1539378a7673b78d05e586cab\" returns successfully" Dec 13 14:20:17.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.029000 audit: BPF prog-id=75 op=LOAD Dec 13 14:20:17.030000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.030000 audit[2059]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1948 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:17.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330623162626566626433376263393233656537373437353164366365 Dec 13 14:20:17.030000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.030000 audit[2059]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1948 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:17.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330623162626566626433376263393233656537373437353164366365 Dec 13 14:20:17.030000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.030000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.030000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.030000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.030000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.030000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.030000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.030000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.030000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.030000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.030000 audit: BPF prog-id=76 op=LOAD Dec 13 14:20:17.030000 audit[2059]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00021b1e0 items=0 ppid=1948 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:17.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330623162626566626433376263393233656537373437353164366365 Dec 13 14:20:17.030000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.030000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.030000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.030000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.030000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.030000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.030000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.030000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.030000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.030000 audit: BPF prog-id=77 op=LOAD Dec 13 14:20:17.030000 audit[2059]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00021b228 items=0 ppid=1948 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:17.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330623162626566626433376263393233656537373437353164366365 Dec 13 14:20:17.030000 audit: BPF prog-id=77 op=UNLOAD Dec 13 14:20:17.030000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:20:17.030000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.030000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.030000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.030000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.030000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.030000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.030000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.030000 audit[2059]: AVC avc: denied { perfmon } for pid=2059 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.030000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.030000 audit[2059]: AVC avc: denied { bpf } for pid=2059 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:17.030000 audit: BPF prog-id=78 op=LOAD Dec 13 14:20:17.030000 audit[2059]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00021b638 items=0 ppid=1948 pid=2059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:17.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330623162626566626433376263393233656537373437353164366365 Dec 13 14:20:17.051804 env[1270]: time="2024-12-13T14:20:17.051781267Z" level=info msg="StartContainer for \"c0b1bbefbd37bc923ee774751d6ce316207adaaf092dc020edce56f28ec44dcb\" returns successfully" Dec 13 14:20:17.098927 kubelet[1844]: W1213 14:20:17.098819 1844 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://139.178.70.104:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:20:17.098927 kubelet[1844]: E1213 14:20:17.098868 1844 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://139.178.70.104:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:20:17.112654 kubelet[1844]: W1213 14:20:17.111359 1844 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://139.178.70.104:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:20:17.112654 kubelet[1844]: E1213 14:20:17.111384 1844 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://139.178.70.104:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.104:6443: connect: connection refused Dec 13 14:20:17.274247 kubelet[1844]: E1213 14:20:17.273827 1844 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.104:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.104:6443: connect: connection refused" interval="1.6s" Dec 13 14:20:17.370129 kubelet[1844]: I1213 14:20:17.370076 1844 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 14:20:17.370431 kubelet[1844]: E1213 14:20:17.370419 1844 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://139.178.70.104:6443/api/v1/nodes\": dial tcp 139.178.70.104:6443: connect: connection refused" node="localhost" Dec 13 14:20:17.604000 audit[2022]: AVC avc: denied { watch } for pid=2022 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:20:17.604000 audit[2022]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00056e0c0 a2=fc6 a3=0 items=0 ppid=1885 pid=2022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 key=(null) Dec 13 14:20:17.604000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:20:17.604000 audit[2022]: AVC avc: denied { watch } for pid=2022 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:20:17.604000 audit[2022]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0010dc040 a2=fc6 a3=0 items=0 ppid=1885 pid=2022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 key=(null) Dec 13 14:20:17.604000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:20:18.457000 audit[2030]: AVC avc: denied { watch } for pid=2030 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:20:18.457000 audit[2030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c008b05680 a2=fc6 a3=0 items=0 ppid=1899 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c888 key=(null) Dec 13 14:20:18.457000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:20:18.457000 audit[2030]: AVC avc: denied { watch } for pid=2030 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:20:18.457000 audit[2030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c00365efa0 a2=fc6 a3=0 items=0 ppid=1899 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c888 key=(null) Dec 13 14:20:18.457000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:20:18.458000 audit[2030]: AVC avc: denied { watch } for pid=2030 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:20:18.458000 audit[2030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c008b057a0 a2=fc6 a3=0 items=0 ppid=1899 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c888 key=(null) Dec 13 14:20:18.458000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:20:18.464000 audit[2030]: AVC avc: denied { watch } for pid=2030 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:20:18.464000 audit[2030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c00365f300 a2=fc6 a3=0 items=0 ppid=1899 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c888 key=(null) Dec 13 14:20:18.464000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:20:18.464000 audit[2030]: AVC avc: denied { watch } for pid=2030 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:20:18.464000 audit[2030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c008b05b90 a2=fc6 a3=0 items=0 ppid=1899 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c888 key=(null) Dec 13 14:20:18.464000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:20:18.465000 audit[2030]: AVC avc: denied { watch } for pid=2030 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:20:18.465000 audit[2030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c008b05ec0 a2=fc6 a3=0 items=0 ppid=1899 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c888 key=(null) Dec 13 14:20:18.465000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:20:18.862008 kubelet[1844]: E1213 14:20:18.861989 1844 csi_plugin.go:308] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "localhost" not found Dec 13 14:20:18.875992 kubelet[1844]: E1213 14:20:18.875974 1844 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Dec 13 14:20:18.971951 kubelet[1844]: I1213 14:20:18.971935 1844 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 14:20:18.980537 kubelet[1844]: I1213 14:20:18.980515 1844 kubelet_node_status.go:76] "Successfully registered node" node="localhost" Dec 13 14:20:18.985830 kubelet[1844]: E1213 14:20:18.985812 1844 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:20:19.086566 kubelet[1844]: E1213 14:20:19.086543 1844 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:20:19.187606 kubelet[1844]: E1213 14:20:19.187547 1844 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:20:19.288349 kubelet[1844]: E1213 14:20:19.288322 1844 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:20:19.389051 kubelet[1844]: E1213 14:20:19.389022 1844 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:20:19.848413 kubelet[1844]: I1213 14:20:19.848391 1844 apiserver.go:52] "Watching apiserver" Dec 13 14:20:19.865046 kubelet[1844]: I1213 14:20:19.865025 1844 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 14:20:20.540962 systemd[1]: Reloading. Dec 13 14:20:20.599929 /usr/lib/systemd/system-generators/torcx-generator[2132]: time="2024-12-13T14:20:20Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:20:20.599946 /usr/lib/systemd/system-generators/torcx-generator[2132]: time="2024-12-13T14:20:20Z" level=info msg="torcx already run" Dec 13 14:20:20.655172 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:20:20.655183 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:20:20.666828 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:20:20.721475 kernel: kauditd_printk_skb: 580 callbacks suppressed Dec 13 14:20:20.721546 kernel: audit: type=1400 audit(1734099620.714:562): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.721566 kernel: audit: type=1400 audit(1734099620.714:563): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.726570 kernel: audit: type=1400 audit(1734099620.714:564): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.726617 kernel: audit: type=1400 audit(1734099620.714:565): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.729101 kernel: audit: type=1400 audit(1734099620.714:566): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.731639 kernel: audit: type=1400 audit(1734099620.714:567): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.734774 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:20:20.734806 kernel: audit: type=1400 audit(1734099620.714:568): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.734827 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 14:20:20.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.737971 kernel: audit: type=1400 audit(1734099620.714:569): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.717000 audit: BPF prog-id=79 op=LOAD Dec 13 14:20:20.717000 audit: BPF prog-id=75 op=UNLOAD Dec 13 14:20:20.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.718000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.718000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.720000 audit: BPF prog-id=80 op=LOAD Dec 13 14:20:20.720000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:20:20.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.722000 audit: BPF prog-id=81 op=LOAD Dec 13 14:20:20.722000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:20:20.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.725000 audit: BPF prog-id=82 op=LOAD Dec 13 14:20:20.725000 audit: BPF prog-id=42 op=UNLOAD Dec 13 14:20:20.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.725000 audit: BPF prog-id=83 op=LOAD Dec 13 14:20:20.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.727000 audit: BPF prog-id=84 op=LOAD Dec 13 14:20:20.727000 audit: BPF prog-id=43 op=UNLOAD Dec 13 14:20:20.727000 audit: BPF prog-id=44 op=UNLOAD Dec 13 14:20:20.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.736000 audit: BPF prog-id=85 op=LOAD Dec 13 14:20:20.736000 audit: BPF prog-id=59 op=UNLOAD Dec 13 14:20:20.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.737000 audit: BPF prog-id=86 op=LOAD Dec 13 14:20:20.737000 audit: BPF prog-id=45 op=UNLOAD Dec 13 14:20:20.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.737000 audit: BPF prog-id=87 op=LOAD Dec 13 14:20:20.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.737000 audit: BPF prog-id=89 op=LOAD Dec 13 14:20:20.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.738000 audit: BPF prog-id=91 op=LOAD Dec 13 14:20:20.738000 audit: BPF prog-id=50 op=UNLOAD Dec 13 14:20:20.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.738000 audit: BPF prog-id=92 op=LOAD Dec 13 14:20:20.738000 audit: BPF prog-id=51 op=UNLOAD Dec 13 14:20:20.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.739000 audit: BPF prog-id=93 op=LOAD Dec 13 14:20:20.739000 audit: BPF prog-id=67 op=UNLOAD Dec 13 14:20:20.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.740000 audit: BPF prog-id=94 op=LOAD Dec 13 14:20:20.740000 audit: BPF prog-id=71 op=UNLOAD Dec 13 14:20:20.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.740000 audit: BPF prog-id=95 op=LOAD Dec 13 14:20:20.740000 audit: BPF prog-id=63 op=UNLOAD Dec 13 14:20:20.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.741000 audit: BPF prog-id=96 op=LOAD Dec 13 14:20:20.741000 audit: BPF prog-id=52 op=UNLOAD Dec 13 14:20:20.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.741000 audit: BPF prog-id=97 op=LOAD Dec 13 14:20:20.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.741000 audit: BPF prog-id=98 op=LOAD Dec 13 14:20:20.741000 audit: BPF prog-id=53 op=UNLOAD Dec 13 14:20:20.741000 audit: BPF prog-id=54 op=UNLOAD Dec 13 14:20:20.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:20.742000 audit: BPF prog-id=99 op=LOAD Dec 13 14:20:20.742000 audit: BPF prog-id=55 op=UNLOAD Dec 13 14:20:20.752976 systemd[1]: Stopping kubelet.service... Dec 13 14:20:20.765680 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:20:20.765836 systemd[1]: Stopped kubelet.service. Dec 13 14:20:20.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:20.767318 systemd[1]: Starting kubelet.service... Dec 13 14:20:21.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:21.625427 systemd[1]: Started kubelet.service. Dec 13 14:20:21.701075 kubelet[2196]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:20:21.701075 kubelet[2196]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:20:21.701075 kubelet[2196]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:20:21.701339 kubelet[2196]: I1213 14:20:21.701101 2196 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:20:21.729929 kubelet[2196]: I1213 14:20:21.729902 2196 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 14:20:21.729929 kubelet[2196]: I1213 14:20:21.729921 2196 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:20:21.730046 kubelet[2196]: I1213 14:20:21.730042 2196 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 14:20:21.730847 kubelet[2196]: I1213 14:20:21.730831 2196 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 14:20:21.789064 kubelet[2196]: I1213 14:20:21.788430 2196 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:20:21.793486 kubelet[2196]: I1213 14:20:21.793469 2196 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:20:21.793762 kubelet[2196]: I1213 14:20:21.793738 2196 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:20:21.793939 kubelet[2196]: I1213 14:20:21.793815 2196 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:20:21.794038 kubelet[2196]: I1213 14:20:21.794029 2196 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:20:21.794086 kubelet[2196]: I1213 14:20:21.794079 2196 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:20:21.794153 kubelet[2196]: I1213 14:20:21.794146 2196 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:20:21.794257 kubelet[2196]: I1213 14:20:21.794251 2196 kubelet.go:400] "Attempting to sync node with API server" Dec 13 14:20:21.794645 kubelet[2196]: I1213 14:20:21.794637 2196 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:20:21.794756 kubelet[2196]: I1213 14:20:21.794748 2196 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:20:21.796301 kubelet[2196]: I1213 14:20:21.796293 2196 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:20:21.799936 kubelet[2196]: I1213 14:20:21.799915 2196 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:20:21.800027 kubelet[2196]: I1213 14:20:21.800020 2196 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:20:21.800373 kubelet[2196]: I1213 14:20:21.800243 2196 server.go:1264] "Started kubelet" Dec 13 14:20:21.801000 audit[2196]: AVC avc: denied { mac_admin } for pid=2196 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:21.801000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:20:21.801000 audit[2196]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b73740 a1=c000b6ee70 a2=c000b73710 a3=25 items=0 ppid=1 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:21.801000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:20:21.801000 audit[2196]: AVC avc: denied { mac_admin } for pid=2196 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:21.801000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:20:21.801000 audit[2196]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b70ae0 a1=c000b6ee88 a2=c000b737d0 a3=25 items=0 ppid=1 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:21.801000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:20:21.803809 kubelet[2196]: I1213 14:20:21.803354 2196 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:20:21.803809 kubelet[2196]: I1213 14:20:21.803512 2196 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:20:21.803809 kubelet[2196]: I1213 14:20:21.803532 2196 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:20:21.811211 kubelet[2196]: I1213 14:20:21.811182 2196 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:20:21.814840 kubelet[2196]: I1213 14:20:21.814816 2196 server.go:455] "Adding debug handlers to kubelet server" Dec 13 14:20:21.820611 kubelet[2196]: I1213 14:20:21.820586 2196 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:20:21.821384 kubelet[2196]: I1213 14:20:21.821331 2196 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:20:21.821647 kubelet[2196]: I1213 14:20:21.821637 2196 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:20:21.821704 kubelet[2196]: I1213 14:20:21.821697 2196 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:20:21.821785 kubelet[2196]: I1213 14:20:21.821776 2196 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 14:20:21.821868 kubelet[2196]: E1213 14:20:21.821851 2196 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:20:21.821997 kubelet[2196]: I1213 14:20:21.821984 2196 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:20:21.826343 kubelet[2196]: I1213 14:20:21.826328 2196 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:20:21.826554 kubelet[2196]: I1213 14:20:21.826544 2196 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 14:20:21.826696 kubelet[2196]: I1213 14:20:21.826689 2196 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:20:21.828716 kubelet[2196]: I1213 14:20:21.828613 2196 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:20:21.828716 kubelet[2196]: I1213 14:20:21.828694 2196 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:20:21.834466 kubelet[2196]: I1213 14:20:21.833685 2196 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:20:21.866183 kubelet[2196]: I1213 14:20:21.866158 2196 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:20:21.866293 kubelet[2196]: I1213 14:20:21.866284 2196 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:20:21.866351 kubelet[2196]: I1213 14:20:21.866345 2196 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:20:21.866512 kubelet[2196]: I1213 14:20:21.866503 2196 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 14:20:21.866566 kubelet[2196]: I1213 14:20:21.866552 2196 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 14:20:21.866610 kubelet[2196]: I1213 14:20:21.866603 2196 policy_none.go:49] "None policy: Start" Dec 13 14:20:21.866986 kubelet[2196]: I1213 14:20:21.866978 2196 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:20:21.867043 kubelet[2196]: I1213 14:20:21.867037 2196 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:20:21.867153 kubelet[2196]: I1213 14:20:21.867146 2196 state_mem.go:75] "Updated machine memory state" Dec 13 14:20:21.869554 kubelet[2196]: I1213 14:20:21.869545 2196 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:20:21.868000 audit[2196]: AVC avc: denied { mac_admin } for pid=2196 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:21.868000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:20:21.868000 audit[2196]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00113e0f0 a1=c000fc1080 a2=c00113e0c0 a3=25 items=0 ppid=1 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:21.868000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:20:21.869775 kubelet[2196]: I1213 14:20:21.869765 2196 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:20:21.869889 kubelet[2196]: I1213 14:20:21.869874 2196 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:20:21.872881 kubelet[2196]: I1213 14:20:21.872869 2196 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:20:21.932520 kubelet[2196]: I1213 14:20:21.932433 2196 topology_manager.go:215] "Topology Admit Handler" podUID="8a50003978138b3ab9890682eff4eae8" podNamespace="kube-system" podName="kube-controller-manager-localhost" Dec 13 14:20:21.932692 kubelet[2196]: I1213 14:20:21.932679 2196 topology_manager.go:215] "Topology Admit Handler" podUID="b107a98bcf27297d642d248711a3fc70" podNamespace="kube-system" podName="kube-scheduler-localhost" Dec 13 14:20:21.932812 kubelet[2196]: I1213 14:20:21.932794 2196 topology_manager.go:215] "Topology Admit Handler" podUID="6c6dd06e45b23ea7ca8cd417d9cd3b2d" podNamespace="kube-system" podName="kube-apiserver-localhost" Dec 13 14:20:21.959000 audit[2022]: AVC avc: denied { watch } for pid=2022 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:20:21.959000 audit[2022]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0010dd6e0 a2=fc6 a3=0 items=0 ppid=1885 pid=2022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 key=(null) Dec 13 14:20:21.959000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:20:21.959000 audit[2022]: AVC avc: denied { watch } for pid=2022 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:20:21.959000 audit[2022]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0010dd8a0 a2=fc6 a3=0 items=0 ppid=1885 pid=2022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 key=(null) Dec 13 14:20:21.959000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:20:21.959000 audit[2022]: AVC avc: denied { watch } for pid=2022 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:20:21.959000 audit[2022]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0010dda60 a2=fc6 a3=0 items=0 ppid=1885 pid=2022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 key=(null) Dec 13 14:20:21.959000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:20:21.959000 audit[2022]: AVC avc: denied { watch } for pid=2022 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:20:21.959000 audit[2022]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000be89c0 a2=fc6 a3=0 items=0 ppid=1885 pid=2022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 key=(null) Dec 13 14:20:21.959000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:20:22.033088 kubelet[2196]: I1213 14:20:22.033056 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:20:22.033226 kubelet[2196]: I1213 14:20:22.033214 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:20:22.033299 kubelet[2196]: I1213 14:20:22.033287 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b107a98bcf27297d642d248711a3fc70-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"b107a98bcf27297d642d248711a3fc70\") " pod="kube-system/kube-scheduler-localhost" Dec 13 14:20:22.033357 kubelet[2196]: I1213 14:20:22.033347 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/6c6dd06e45b23ea7ca8cd417d9cd3b2d-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"6c6dd06e45b23ea7ca8cd417d9cd3b2d\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:20:22.033421 kubelet[2196]: I1213 14:20:22.033411 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:20:22.033505 kubelet[2196]: I1213 14:20:22.033493 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:20:22.033566 kubelet[2196]: I1213 14:20:22.033551 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/6c6dd06e45b23ea7ca8cd417d9cd3b2d-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"6c6dd06e45b23ea7ca8cd417d9cd3b2d\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:20:22.033631 kubelet[2196]: I1213 14:20:22.033622 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/6c6dd06e45b23ea7ca8cd417d9cd3b2d-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"6c6dd06e45b23ea7ca8cd417d9cd3b2d\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:20:22.033687 kubelet[2196]: I1213 14:20:22.033676 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/8a50003978138b3ab9890682eff4eae8-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"8a50003978138b3ab9890682eff4eae8\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:20:22.042904 kubelet[2196]: I1213 14:20:22.042887 2196 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 14:20:22.050124 kubelet[2196]: I1213 14:20:22.049779 2196 kubelet_node_status.go:112] "Node was previously registered" node="localhost" Dec 13 14:20:22.050124 kubelet[2196]: I1213 14:20:22.049842 2196 kubelet_node_status.go:76] "Successfully registered node" node="localhost" Dec 13 14:20:22.797150 kubelet[2196]: I1213 14:20:22.797126 2196 apiserver.go:52] "Watching apiserver" Dec 13 14:20:22.826830 kubelet[2196]: I1213 14:20:22.826806 2196 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 14:20:22.897678 kubelet[2196]: E1213 14:20:22.897641 2196 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Dec 13 14:20:22.951098 kubelet[2196]: I1213 14:20:22.951044 2196 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=0.9510197 podStartE2EDuration="951.0197ms" podCreationTimestamp="2024-12-13 14:20:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:20:22.934061112 +0000 UTC m=+1.289080901" watchObservedRunningTime="2024-12-13 14:20:22.9510197 +0000 UTC m=+1.306039479" Dec 13 14:20:22.951262 kubelet[2196]: I1213 14:20:22.951139 2196 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=0.951133387 podStartE2EDuration="951.133387ms" podCreationTimestamp="2024-12-13 14:20:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:20:22.950773958 +0000 UTC m=+1.305793747" watchObservedRunningTime="2024-12-13 14:20:22.951133387 +0000 UTC m=+1.306153171" Dec 13 14:20:22.980847 kubelet[2196]: I1213 14:20:22.980812 2196 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=0.980786743 podStartE2EDuration="980.786743ms" podCreationTimestamp="2024-12-13 14:20:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:20:22.9663266 +0000 UTC m=+1.321346384" watchObservedRunningTime="2024-12-13 14:20:22.980786743 +0000 UTC m=+1.335806532" Dec 13 14:20:23.511000 audit[2022]: AVC avc: denied { watch } for pid=2022 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=8278 scontext=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 14:20:23.511000 audit[2022]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000df8c80 a2=fc6 a3=0 items=0 ppid=1885 pid=2022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 key=(null) Dec 13 14:20:23.511000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:20:26.200068 sudo[1486]: pam_unix(sudo:session): session closed for user root Dec 13 14:20:26.198000 audit[1486]: USER_END pid=1486 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:20:26.206179 kernel: kauditd_printk_skb: 313 callbacks suppressed Dec 13 14:20:26.206248 kernel: audit: type=1106 audit(1734099626.198:791): pid=1486 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:20:26.204000 audit[1486]: CRED_DISP pid=1486 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:20:26.211847 kernel: audit: type=1104 audit(1734099626.204:792): pid=1486 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:20:26.218394 sshd[1482]: pam_unix(sshd:session): session closed for user core Dec 13 14:20:26.218000 audit[1482]: USER_END pid=1482 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:20:26.220749 systemd-logind[1241]: Session 9 logged out. Waiting for processes to exit. Dec 13 14:20:26.222014 systemd[1]: sshd@6-139.178.70.104:22-147.75.109.163:59414.service: Deactivated successfully. Dec 13 14:20:26.222483 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 14:20:26.222574 systemd[1]: session-9.scope: Consumed 2.885s CPU time. Dec 13 14:20:26.218000 audit[1482]: CRED_DISP pid=1482 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:20:26.223776 systemd-logind[1241]: Removed session 9. Dec 13 14:20:26.226126 kernel: audit: type=1106 audit(1734099626.218:793): pid=1482 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:20:26.226183 kernel: audit: type=1104 audit(1734099626.218:794): pid=1482 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:20:26.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.104:22-147.75.109.163:59414 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:26.229109 kernel: audit: type=1131 audit(1734099626.220:795): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.104:22-147.75.109.163:59414 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:20:35.585327 kubelet[2196]: I1213 14:20:35.585300 2196 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 14:20:35.585841 env[1270]: time="2024-12-13T14:20:35.585813386Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:20:35.586097 kubelet[2196]: I1213 14:20:35.586088 2196 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 14:20:35.639688 kubelet[2196]: I1213 14:20:35.639654 2196 topology_manager.go:215] "Topology Admit Handler" podUID="a1004330-b7f5-48e5-a4cd-dca16ca1f609" podNamespace="kube-system" podName="kube-proxy-2bnnz" Dec 13 14:20:35.643604 systemd[1]: Created slice kubepods-besteffort-poda1004330_b7f5_48e5_a4cd_dca16ca1f609.slice. Dec 13 14:20:35.719486 kubelet[2196]: I1213 14:20:35.719412 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/a1004330-b7f5-48e5-a4cd-dca16ca1f609-kube-proxy\") pod \"kube-proxy-2bnnz\" (UID: \"a1004330-b7f5-48e5-a4cd-dca16ca1f609\") " pod="kube-system/kube-proxy-2bnnz" Dec 13 14:20:35.719663 kubelet[2196]: I1213 14:20:35.719652 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a1004330-b7f5-48e5-a4cd-dca16ca1f609-lib-modules\") pod \"kube-proxy-2bnnz\" (UID: \"a1004330-b7f5-48e5-a4cd-dca16ca1f609\") " pod="kube-system/kube-proxy-2bnnz" Dec 13 14:20:35.719785 kubelet[2196]: I1213 14:20:35.719774 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-snmkm\" (UniqueName: \"kubernetes.io/projected/a1004330-b7f5-48e5-a4cd-dca16ca1f609-kube-api-access-snmkm\") pod \"kube-proxy-2bnnz\" (UID: \"a1004330-b7f5-48e5-a4cd-dca16ca1f609\") " pod="kube-system/kube-proxy-2bnnz" Dec 13 14:20:35.719861 kubelet[2196]: I1213 14:20:35.719851 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a1004330-b7f5-48e5-a4cd-dca16ca1f609-xtables-lock\") pod \"kube-proxy-2bnnz\" (UID: \"a1004330-b7f5-48e5-a4cd-dca16ca1f609\") " pod="kube-system/kube-proxy-2bnnz" Dec 13 14:20:35.846873 kubelet[2196]: E1213 14:20:35.846804 2196 projected.go:294] Couldn't get configMap kube-system/kube-root-ca.crt: configmap "kube-root-ca.crt" not found Dec 13 14:20:35.846994 kubelet[2196]: E1213 14:20:35.846982 2196 projected.go:200] Error preparing data for projected volume kube-api-access-snmkm for pod kube-system/kube-proxy-2bnnz: configmap "kube-root-ca.crt" not found Dec 13 14:20:35.847171 kubelet[2196]: E1213 14:20:35.847159 2196 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/a1004330-b7f5-48e5-a4cd-dca16ca1f609-kube-api-access-snmkm podName:a1004330-b7f5-48e5-a4cd-dca16ca1f609 nodeName:}" failed. No retries permitted until 2024-12-13 14:20:36.347140568 +0000 UTC m=+14.702160354 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-snmkm" (UniqueName: "kubernetes.io/projected/a1004330-b7f5-48e5-a4cd-dca16ca1f609-kube-api-access-snmkm") pod "kube-proxy-2bnnz" (UID: "a1004330-b7f5-48e5-a4cd-dca16ca1f609") : configmap "kube-root-ca.crt" not found Dec 13 14:20:36.377436 kubelet[2196]: I1213 14:20:36.377408 2196 topology_manager.go:215] "Topology Admit Handler" podUID="11396592-4b36-4a4a-ad18-bf453ceaf7d0" podNamespace="tigera-operator" podName="tigera-operator-7bc55997bb-jmr6j" Dec 13 14:20:36.381834 systemd[1]: Created slice kubepods-besteffort-pod11396592_4b36_4a4a_ad18_bf453ceaf7d0.slice. Dec 13 14:20:36.424092 kubelet[2196]: I1213 14:20:36.424069 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wv6lc\" (UniqueName: \"kubernetes.io/projected/11396592-4b36-4a4a-ad18-bf453ceaf7d0-kube-api-access-wv6lc\") pod \"tigera-operator-7bc55997bb-jmr6j\" (UID: \"11396592-4b36-4a4a-ad18-bf453ceaf7d0\") " pod="tigera-operator/tigera-operator-7bc55997bb-jmr6j" Dec 13 14:20:36.424231 kubelet[2196]: I1213 14:20:36.424218 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/11396592-4b36-4a4a-ad18-bf453ceaf7d0-var-lib-calico\") pod \"tigera-operator-7bc55997bb-jmr6j\" (UID: \"11396592-4b36-4a4a-ad18-bf453ceaf7d0\") " pod="tigera-operator/tigera-operator-7bc55997bb-jmr6j" Dec 13 14:20:36.550468 env[1270]: time="2024-12-13T14:20:36.550310591Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2bnnz,Uid:a1004330-b7f5-48e5-a4cd-dca16ca1f609,Namespace:kube-system,Attempt:0,}" Dec 13 14:20:36.559850 env[1270]: time="2024-12-13T14:20:36.559686690Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:20:36.559850 env[1270]: time="2024-12-13T14:20:36.559717420Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:20:36.559850 env[1270]: time="2024-12-13T14:20:36.559728306Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:20:36.559992 env[1270]: time="2024-12-13T14:20:36.559867583Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/21e86c877c0b3a6198e87ad06d81b7effb8b1ec73e8b45512cd414351405eb68 pid=2278 runtime=io.containerd.runc.v2 Dec 13 14:20:36.575686 systemd[1]: Started cri-containerd-21e86c877c0b3a6198e87ad06d81b7effb8b1ec73e8b45512cd414351405eb68.scope. Dec 13 14:20:36.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.588635 kernel: audit: type=1400 audit(1734099636.581:796): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.588685 kernel: audit: type=1400 audit(1734099636.581:797): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.591342 kernel: audit: type=1400 audit(1734099636.581:798): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.594471 kernel: audit: type=1400 audit(1734099636.581:799): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.599600 kernel: audit: type=1400 audit(1734099636.581:800): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.599629 kernel: audit: type=1400 audit(1734099636.581:801): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.602293 kernel: audit: type=1400 audit(1734099636.581:802): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.609139 kernel: audit: type=1400 audit(1734099636.581:803): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.609165 kernel: audit: type=1400 audit(1734099636.581:804): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.611692 kernel: audit: type=1400 audit(1734099636.581:805): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.581000 audit: BPF prog-id=100 op=LOAD Dec 13 14:20:36.581000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.581000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2278 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:36.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231653836633837376330623361363139386538376164303664383162 Dec 13 14:20:36.581000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.581000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2278 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:36.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231653836633837376330623361363139386538376164303664383162 Dec 13 14:20:36.581000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.581000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.581000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.581000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.581000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.581000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.581000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.581000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.581000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.581000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.581000 audit: BPF prog-id=101 op=LOAD Dec 13 14:20:36.581000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000267ff0 items=0 ppid=2278 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:36.581000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231653836633837376330623361363139386538376164303664383162 Dec 13 14:20:36.585000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.585000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.585000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.585000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.585000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.585000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.585000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.585000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.585000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.585000 audit: BPF prog-id=102 op=LOAD Dec 13 14:20:36.585000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003ca038 items=0 ppid=2278 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:36.585000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231653836633837376330623361363139386538376164303664383162 Dec 13 14:20:36.585000 audit: BPF prog-id=102 op=UNLOAD Dec 13 14:20:36.585000 audit: BPF prog-id=101 op=UNLOAD Dec 13 14:20:36.585000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.585000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.585000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.585000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.585000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.585000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.585000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.613483 env[1270]: time="2024-12-13T14:20:36.613466407Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2bnnz,Uid:a1004330-b7f5-48e5-a4cd-dca16ca1f609,Namespace:kube-system,Attempt:0,} returns sandbox id \"21e86c877c0b3a6198e87ad06d81b7effb8b1ec73e8b45512cd414351405eb68\"" Dec 13 14:20:36.585000 audit[2287]: AVC avc: denied { perfmon } for pid=2287 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.585000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.585000 audit[2287]: AVC avc: denied { bpf } for pid=2287 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.585000 audit: BPF prog-id=103 op=LOAD Dec 13 14:20:36.585000 audit[2287]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003ca448 items=0 ppid=2278 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:36.585000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231653836633837376330623361363139386538376164303664383162 Dec 13 14:20:36.615016 env[1270]: time="2024-12-13T14:20:36.615000927Z" level=info msg="CreateContainer within sandbox \"21e86c877c0b3a6198e87ad06d81b7effb8b1ec73e8b45512cd414351405eb68\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:20:36.656597 env[1270]: time="2024-12-13T14:20:36.655072665Z" level=info msg="CreateContainer within sandbox \"21e86c877c0b3a6198e87ad06d81b7effb8b1ec73e8b45512cd414351405eb68\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"988b0218d427622103c88713a1aadcee45742ee7a38832bf6d114052c34cfd75\"" Dec 13 14:20:36.657835 env[1270]: time="2024-12-13T14:20:36.657586864Z" level=info msg="StartContainer for \"988b0218d427622103c88713a1aadcee45742ee7a38832bf6d114052c34cfd75\"" Dec 13 14:20:36.670739 systemd[1]: Started cri-containerd-988b0218d427622103c88713a1aadcee45742ee7a38832bf6d114052c34cfd75.scope. Dec 13 14:20:36.681000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.681000 audit[2317]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd612b250a8 items=0 ppid=2278 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:36.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938386230323138643432373632323130336338383731336131616164 Dec 13 14:20:36.681000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.681000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.681000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.681000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.681000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.681000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.681000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.681000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.681000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.681000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.681000 audit: BPF prog-id=104 op=LOAD Dec 13 14:20:36.681000 audit[2317]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001f8578 items=0 ppid=2278 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:36.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938386230323138643432373632323130336338383731336131616164 Dec 13 14:20:36.682000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.682000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.682000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.682000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.682000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.682000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.682000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.682000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.682000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.682000 audit: BPF prog-id=105 op=LOAD Dec 13 14:20:36.682000 audit[2317]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001f85c8 items=0 ppid=2278 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:36.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938386230323138643432373632323130336338383731336131616164 Dec 13 14:20:36.682000 audit: BPF prog-id=105 op=UNLOAD Dec 13 14:20:36.682000 audit: BPF prog-id=104 op=UNLOAD Dec 13 14:20:36.682000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.682000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.682000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.682000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.682000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.682000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.682000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.682000 audit[2317]: AVC avc: denied { perfmon } for pid=2317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.682000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.682000 audit[2317]: AVC avc: denied { bpf } for pid=2317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.682000 audit: BPF prog-id=106 op=LOAD Dec 13 14:20:36.682000 audit[2317]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001f8658 items=0 ppid=2278 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:36.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938386230323138643432373632323130336338383731336131616164 Dec 13 14:20:36.685305 env[1270]: time="2024-12-13T14:20:36.685281259Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7bc55997bb-jmr6j,Uid:11396592-4b36-4a4a-ad18-bf453ceaf7d0,Namespace:tigera-operator,Attempt:0,}" Dec 13 14:20:36.696869 env[1270]: time="2024-12-13T14:20:36.696752435Z" level=info msg="StartContainer for \"988b0218d427622103c88713a1aadcee45742ee7a38832bf6d114052c34cfd75\" returns successfully" Dec 13 14:20:36.715615 env[1270]: time="2024-12-13T14:20:36.715574949Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:20:36.716611 env[1270]: time="2024-12-13T14:20:36.716594251Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:20:36.716684 env[1270]: time="2024-12-13T14:20:36.716670215Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:20:36.717061 env[1270]: time="2024-12-13T14:20:36.716988535Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5fc4028b92cf21be692837cd1594bfe2a86b4f58c5a4edd3b5243798047a07bb pid=2352 runtime=io.containerd.runc.v2 Dec 13 14:20:36.724821 systemd[1]: Started cri-containerd-5fc4028b92cf21be692837cd1594bfe2a86b4f58c5a4edd3b5243798047a07bb.scope. Dec 13 14:20:36.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.734000 audit: BPF prog-id=107 op=LOAD Dec 13 14:20:36.735000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.735000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2352 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:36.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566633430323862393263663231626536393238333763643135393462 Dec 13 14:20:36.735000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.735000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2352 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:36.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566633430323862393263663231626536393238333763643135393462 Dec 13 14:20:36.735000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.735000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.735000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.735000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.735000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.735000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.735000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.735000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.735000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.735000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.735000 audit: BPF prog-id=108 op=LOAD Dec 13 14:20:36.735000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00032fd10 items=0 ppid=2352 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:36.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566633430323862393263663231626536393238333763643135393462 Dec 13 14:20:36.735000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.735000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.735000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.735000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.735000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.735000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.735000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.735000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.735000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.735000 audit: BPF prog-id=109 op=LOAD Dec 13 14:20:36.735000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00032fd58 items=0 ppid=2352 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:36.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566633430323862393263663231626536393238333763643135393462 Dec 13 14:20:36.735000 audit: BPF prog-id=109 op=UNLOAD Dec 13 14:20:36.735000 audit: BPF prog-id=108 op=UNLOAD Dec 13 14:20:36.735000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.735000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.735000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.735000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.735000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.735000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.735000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.735000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.735000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.735000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:36.735000 audit: BPF prog-id=110 op=LOAD Dec 13 14:20:36.735000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003b0168 items=0 ppid=2352 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:36.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566633430323862393263663231626536393238333763643135393462 Dec 13 14:20:36.759712 env[1270]: time="2024-12-13T14:20:36.759685740Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7bc55997bb-jmr6j,Uid:11396592-4b36-4a4a-ad18-bf453ceaf7d0,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"5fc4028b92cf21be692837cd1594bfe2a86b4f58c5a4edd3b5243798047a07bb\"" Dec 13 14:20:36.765175 env[1270]: time="2024-12-13T14:20:36.765149308Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 14:20:37.428823 systemd[1]: run-containerd-runc-k8s.io-21e86c877c0b3a6198e87ad06d81b7effb8b1ec73e8b45512cd414351405eb68-runc.73km2g.mount: Deactivated successfully. Dec 13 14:20:37.476000 audit[2414]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2414 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:37.476000 audit[2414]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcc8ed76c0 a2=0 a3=7ffcc8ed76ac items=0 ppid=2329 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.476000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:20:37.476000 audit[2415]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2415 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:37.476000 audit[2415]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe132835d0 a2=0 a3=7ffe132835bc items=0 ppid=2329 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.476000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:20:37.477000 audit[2416]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=2416 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:37.477000 audit[2416]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff90407260 a2=0 a3=7fff9040724c items=0 ppid=2329 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.477000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:20:37.478000 audit[2417]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2417 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:20:37.478000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc2e436e60 a2=0 a3=7ffc2e436e4c items=0 ppid=2329 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.478000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:20:37.478000 audit[2418]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2418 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:20:37.478000 audit[2418]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe7098e130 a2=0 a3=7ffe7098e11c items=0 ppid=2329 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.478000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:20:37.481000 audit[2419]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2419 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:20:37.481000 audit[2419]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffea7acf8c0 a2=0 a3=7ffea7acf8ac items=0 ppid=2329 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.481000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:20:37.581000 audit[2420]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2420 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:37.581000 audit[2420]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd2013f960 a2=0 a3=7ffd2013f94c items=0 ppid=2329 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.581000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:20:37.584000 audit[2422]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2422 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:37.584000 audit[2422]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffed174d8b0 a2=0 a3=7ffed174d89c items=0 ppid=2329 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.584000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:20:37.586000 audit[2425]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:37.586000 audit[2425]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffdb140d7e0 a2=0 a3=7ffdb140d7cc items=0 ppid=2329 pid=2425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.586000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:20:37.587000 audit[2426]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2426 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:37.587000 audit[2426]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff2b5fcf20 a2=0 a3=7fff2b5fcf0c items=0 ppid=2329 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.587000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:20:37.589000 audit[2428]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2428 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:37.589000 audit[2428]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd1589b480 a2=0 a3=7ffd1589b46c items=0 ppid=2329 pid=2428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.589000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:20:37.589000 audit[2429]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2429 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:37.589000 audit[2429]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc785888c0 a2=0 a3=7ffc785888ac items=0 ppid=2329 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.589000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:20:37.591000 audit[2431]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2431 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:37.591000 audit[2431]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdda95a740 a2=0 a3=7ffdda95a72c items=0 ppid=2329 pid=2431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.591000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:20:37.593000 audit[2434]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2434 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:37.593000 audit[2434]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcaab4ad50 a2=0 a3=7ffcaab4ad3c items=0 ppid=2329 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.593000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:20:37.594000 audit[2435]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2435 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:37.594000 audit[2435]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdfdb64980 a2=0 a3=7ffdfdb6496c items=0 ppid=2329 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.594000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:20:37.596000 audit[2437]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2437 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:37.596000 audit[2437]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdbe2faa60 a2=0 a3=7ffdbe2faa4c items=0 ppid=2329 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.596000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:20:37.597000 audit[2438]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2438 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:37.597000 audit[2438]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcd6ff7770 a2=0 a3=7ffcd6ff775c items=0 ppid=2329 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.597000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:20:37.599000 audit[2440]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2440 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:37.599000 audit[2440]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdd41bda10 a2=0 a3=7ffdd41bd9fc items=0 ppid=2329 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.599000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:20:37.601000 audit[2443]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2443 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:37.601000 audit[2443]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcbc4f25e0 a2=0 a3=7ffcbc4f25cc items=0 ppid=2329 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.601000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:20:37.604000 audit[2446]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2446 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:37.604000 audit[2446]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd2318e470 a2=0 a3=7ffd2318e45c items=0 ppid=2329 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.604000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:20:37.605000 audit[2447]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2447 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:37.605000 audit[2447]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe102be750 a2=0 a3=7ffe102be73c items=0 ppid=2329 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.605000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:20:37.607000 audit[2449]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2449 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:37.607000 audit[2449]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffe59b3d4a0 a2=0 a3=7ffe59b3d48c items=0 ppid=2329 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.607000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:20:37.609000 audit[2452]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2452 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:37.609000 audit[2452]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffff4311010 a2=0 a3=7ffff4310ffc items=0 ppid=2329 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.609000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:20:37.610000 audit[2453]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2453 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:37.610000 audit[2453]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe5ae79ab0 a2=0 a3=7ffe5ae79a9c items=0 ppid=2329 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.610000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:20:37.612000 audit[2455]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2455 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:20:37.612000 audit[2455]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe1a056670 a2=0 a3=7ffe1a05665c items=0 ppid=2329 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.612000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:20:37.660000 audit[2461]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2461 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:20:37.660000 audit[2461]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffef1355470 a2=0 a3=7ffef135545c items=0 ppid=2329 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.660000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:20:37.676000 audit[2461]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2461 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:20:37.676000 audit[2461]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffef1355470 a2=0 a3=7ffef135545c items=0 ppid=2329 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.676000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:20:37.677000 audit[2466]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2466 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:20:37.677000 audit[2466]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff4906db30 a2=0 a3=7fff4906db1c items=0 ppid=2329 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.677000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:20:37.679000 audit[2468]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2468 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:20:37.679000 audit[2468]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdd9645ea0 a2=0 a3=7ffdd9645e8c items=0 ppid=2329 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.679000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:20:37.682000 audit[2471]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2471 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:20:37.682000 audit[2471]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff396813c0 a2=0 a3=7fff396813ac items=0 ppid=2329 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.682000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:20:37.683000 audit[2472]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2472 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:20:37.683000 audit[2472]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe29b2ffa0 a2=0 a3=7ffe29b2ff8c items=0 ppid=2329 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.683000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:20:37.684000 audit[2474]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2474 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:20:37.684000 audit[2474]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffddf9f6670 a2=0 a3=7ffddf9f665c items=0 ppid=2329 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.684000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:20:37.685000 audit[2475]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2475 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:20:37.685000 audit[2475]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff661a5110 a2=0 a3=7fff661a50fc items=0 ppid=2329 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.685000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:20:37.687000 audit[2477]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2477 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:20:37.687000 audit[2477]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc6cde65b0 a2=0 a3=7ffc6cde659c items=0 ppid=2329 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.687000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:20:37.689000 audit[2480]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2480 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:20:37.689000 audit[2480]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe8b207ce0 a2=0 a3=7ffe8b207ccc items=0 ppid=2329 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.689000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:20:37.690000 audit[2481]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2481 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:20:37.690000 audit[2481]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd9bb3a110 a2=0 a3=7ffd9bb3a0fc items=0 ppid=2329 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.690000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:20:37.692000 audit[2483]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2483 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:20:37.692000 audit[2483]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff9903c2c0 a2=0 a3=7fff9903c2ac items=0 ppid=2329 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.692000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:20:37.693000 audit[2484]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2484 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:20:37.693000 audit[2484]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffbe550e20 a2=0 a3=7fffbe550e0c items=0 ppid=2329 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.693000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:20:37.695000 audit[2486]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2486 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:20:37.695000 audit[2486]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcb92b4120 a2=0 a3=7ffcb92b410c items=0 ppid=2329 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.695000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:20:37.697000 audit[2489]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2489 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:20:37.697000 audit[2489]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc2cfd79f0 a2=0 a3=7ffc2cfd79dc items=0 ppid=2329 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.697000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:20:37.699000 audit[2492]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2492 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:20:37.699000 audit[2492]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd679f5460 a2=0 a3=7ffd679f544c items=0 ppid=2329 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.699000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:20:37.700000 audit[2493]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2493 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:20:37.700000 audit[2493]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffebb157680 a2=0 a3=7ffebb15766c items=0 ppid=2329 pid=2493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.700000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:20:37.702000 audit[2495]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2495 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:20:37.702000 audit[2495]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffcdfad2910 a2=0 a3=7ffcdfad28fc items=0 ppid=2329 pid=2495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.702000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:20:37.704000 audit[2498]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2498 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:20:37.704000 audit[2498]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffdd129bc80 a2=0 a3=7ffdd129bc6c items=0 ppid=2329 pid=2498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.704000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:20:37.705000 audit[2499]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2499 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:20:37.705000 audit[2499]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe98637080 a2=0 a3=7ffe9863706c items=0 ppid=2329 pid=2499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.705000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:20:37.706000 audit[2501]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2501 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:20:37.706000 audit[2501]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff9a19ada0 a2=0 a3=7fff9a19ad8c items=0 ppid=2329 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.706000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:20:37.707000 audit[2502]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2502 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:20:37.707000 audit[2502]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe4e057f80 a2=0 a3=7ffe4e057f6c items=0 ppid=2329 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.707000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:20:37.708000 audit[2504]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2504 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:20:37.708000 audit[2504]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff3073e2d0 a2=0 a3=7fff3073e2bc items=0 ppid=2329 pid=2504 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.708000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:20:37.711000 audit[2507]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2507 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:20:37.711000 audit[2507]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff57ba2590 a2=0 a3=7fff57ba257c items=0 ppid=2329 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.711000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:20:37.712000 audit[2509]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2509 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:20:37.712000 audit[2509]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffd45cec2a0 a2=0 a3=7ffd45cec28c items=0 ppid=2329 pid=2509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.712000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:20:37.713000 audit[2509]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2509 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:20:37.713000 audit[2509]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd45cec2a0 a2=0 a3=7ffd45cec28c items=0 ppid=2329 pid=2509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:37.713000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:20:38.808691 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount873842609.mount: Deactivated successfully. Dec 13 14:20:39.307869 env[1270]: time="2024-12-13T14:20:39.307831506Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:39.308964 env[1270]: time="2024-12-13T14:20:39.308943764Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:39.310118 env[1270]: time="2024-12-13T14:20:39.310102063Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:39.311138 env[1270]: time="2024-12-13T14:20:39.311118728Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:39.311457 env[1270]: time="2024-12-13T14:20:39.311424764Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 14:20:39.314992 env[1270]: time="2024-12-13T14:20:39.314974156Z" level=info msg="CreateContainer within sandbox \"5fc4028b92cf21be692837cd1594bfe2a86b4f58c5a4edd3b5243798047a07bb\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 14:20:39.323298 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3703806566.mount: Deactivated successfully. Dec 13 14:20:39.329076 env[1270]: time="2024-12-13T14:20:39.328783124Z" level=info msg="CreateContainer within sandbox \"5fc4028b92cf21be692837cd1594bfe2a86b4f58c5a4edd3b5243798047a07bb\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"5cb53db445550deacfdf96146646735834a86734f3037fae4b17d93db06a5bd5\"" Dec 13 14:20:39.329266 env[1270]: time="2024-12-13T14:20:39.329245347Z" level=info msg="StartContainer for \"5cb53db445550deacfdf96146646735834a86734f3037fae4b17d93db06a5bd5\"" Dec 13 14:20:39.344475 systemd[1]: Started cri-containerd-5cb53db445550deacfdf96146646735834a86734f3037fae4b17d93db06a5bd5.scope. Dec 13 14:20:39.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.352000 audit: BPF prog-id=111 op=LOAD Dec 13 14:20:39.352000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.352000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2352 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:39.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563623533646234343535353064656163666466393631343636343637 Dec 13 14:20:39.353000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.353000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2352 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:39.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563623533646234343535353064656163666466393631343636343637 Dec 13 14:20:39.353000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.353000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.353000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.353000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.353000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.353000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.353000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.353000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.353000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.353000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.353000 audit: BPF prog-id=112 op=LOAD Dec 13 14:20:39.353000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000210f30 items=0 ppid=2352 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:39.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563623533646234343535353064656163666466393631343636343637 Dec 13 14:20:39.353000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.353000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.353000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.353000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.353000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.353000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.353000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.353000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.353000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.353000 audit: BPF prog-id=113 op=LOAD Dec 13 14:20:39.353000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000210f78 items=0 ppid=2352 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:39.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563623533646234343535353064656163666466393631343636343637 Dec 13 14:20:39.353000 audit: BPF prog-id=113 op=UNLOAD Dec 13 14:20:39.353000 audit: BPF prog-id=112 op=UNLOAD Dec 13 14:20:39.353000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.353000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.353000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.353000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.353000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.353000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.353000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.353000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.353000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.353000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:39.353000 audit: BPF prog-id=114 op=LOAD Dec 13 14:20:39.353000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000211388 items=0 ppid=2352 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:39.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563623533646234343535353064656163666466393631343636343637 Dec 13 14:20:39.367541 env[1270]: time="2024-12-13T14:20:39.367508547Z" level=info msg="StartContainer for \"5cb53db445550deacfdf96146646735834a86734f3037fae4b17d93db06a5bd5\" returns successfully" Dec 13 14:20:39.773561 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2110409437.mount: Deactivated successfully. Dec 13 14:20:39.905602 kubelet[2196]: I1213 14:20:39.905557 2196 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-2bnnz" podStartSLOduration=4.90554328 podStartE2EDuration="4.90554328s" podCreationTimestamp="2024-12-13 14:20:35 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:20:36.903753066 +0000 UTC m=+15.258772853" watchObservedRunningTime="2024-12-13 14:20:39.90554328 +0000 UTC m=+18.260563064" Dec 13 14:20:41.831249 kubelet[2196]: I1213 14:20:41.831204 2196 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7bc55997bb-jmr6j" podStartSLOduration=3.279585986 podStartE2EDuration="5.831176322s" podCreationTimestamp="2024-12-13 14:20:36 +0000 UTC" firstStartedPulling="2024-12-13 14:20:36.760633242 +0000 UTC m=+15.115653022" lastFinishedPulling="2024-12-13 14:20:39.312223577 +0000 UTC m=+17.667243358" observedRunningTime="2024-12-13 14:20:39.906230704 +0000 UTC m=+18.261250493" watchObservedRunningTime="2024-12-13 14:20:41.831176322 +0000 UTC m=+20.186196108" Dec 13 14:20:42.088000 audit[2548]: NETFILTER_CFG table=filter:89 family=2 entries=14 op=nft_register_rule pid=2548 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:20:42.092141 kernel: kauditd_printk_skb: 357 callbacks suppressed Dec 13 14:20:42.092194 kernel: audit: type=1325 audit(1734099642.088:907): table=filter:89 family=2 entries=14 op=nft_register_rule pid=2548 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:20:42.092232 kernel: audit: type=1300 audit(1734099642.088:907): arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffda35d87a0 a2=0 a3=7ffda35d878c items=0 ppid=2329 pid=2548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:42.088000 audit[2548]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffda35d87a0 a2=0 a3=7ffda35d878c items=0 ppid=2329 pid=2548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:42.096493 kernel: audit: type=1327 audit(1734099642.088:907): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:20:42.088000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:20:42.095000 audit[2548]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2548 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:20:42.100627 kernel: audit: type=1325 audit(1734099642.095:908): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2548 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:20:42.095000 audit[2548]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffda35d87a0 a2=0 a3=0 items=0 ppid=2329 pid=2548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:42.104439 kernel: audit: type=1300 audit(1734099642.095:908): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffda35d87a0 a2=0 a3=0 items=0 ppid=2329 pid=2548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:42.095000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:20:42.107460 kernel: audit: type=1327 audit(1734099642.095:908): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:20:42.106000 audit[2550]: NETFILTER_CFG table=filter:91 family=2 entries=15 op=nft_register_rule pid=2550 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:20:42.106000 audit[2550]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd278e0a00 a2=0 a3=7ffd278e09ec items=0 ppid=2329 pid=2550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:42.114370 kernel: audit: type=1325 audit(1734099642.106:909): table=filter:91 family=2 entries=15 op=nft_register_rule pid=2550 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:20:42.114462 kernel: audit: type=1300 audit(1734099642.106:909): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd278e0a00 a2=0 a3=7ffd278e09ec items=0 ppid=2329 pid=2550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:42.106000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:20:42.116491 kernel: audit: type=1327 audit(1734099642.106:909): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:20:42.115000 audit[2550]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2550 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:20:42.115000 audit[2550]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd278e0a00 a2=0 a3=0 items=0 ppid=2329 pid=2550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:42.115000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:20:42.119469 kernel: audit: type=1325 audit(1734099642.115:910): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2550 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:20:42.282822 kubelet[2196]: I1213 14:20:42.282791 2196 topology_manager.go:215] "Topology Admit Handler" podUID="5e78a8b2-3a67-4b56-9c15-989d8a267804" podNamespace="calico-system" podName="calico-typha-b494f887b-6dsdf" Dec 13 14:20:42.291304 systemd[1]: Created slice kubepods-besteffort-pod5e78a8b2_3a67_4b56_9c15_989d8a267804.slice. Dec 13 14:20:42.362712 kubelet[2196]: I1213 14:20:42.362646 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7cc9q\" (UniqueName: \"kubernetes.io/projected/5e78a8b2-3a67-4b56-9c15-989d8a267804-kube-api-access-7cc9q\") pod \"calico-typha-b494f887b-6dsdf\" (UID: \"5e78a8b2-3a67-4b56-9c15-989d8a267804\") " pod="calico-system/calico-typha-b494f887b-6dsdf" Dec 13 14:20:42.362864 kubelet[2196]: I1213 14:20:42.362854 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/5e78a8b2-3a67-4b56-9c15-989d8a267804-typha-certs\") pod \"calico-typha-b494f887b-6dsdf\" (UID: \"5e78a8b2-3a67-4b56-9c15-989d8a267804\") " pod="calico-system/calico-typha-b494f887b-6dsdf" Dec 13 14:20:42.362927 kubelet[2196]: I1213 14:20:42.362918 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5e78a8b2-3a67-4b56-9c15-989d8a267804-tigera-ca-bundle\") pod \"calico-typha-b494f887b-6dsdf\" (UID: \"5e78a8b2-3a67-4b56-9c15-989d8a267804\") " pod="calico-system/calico-typha-b494f887b-6dsdf" Dec 13 14:20:42.365664 kubelet[2196]: I1213 14:20:42.365645 2196 topology_manager.go:215] "Topology Admit Handler" podUID="4c6a9b9c-d79f-41e3-baac-ae29902849b9" podNamespace="calico-system" podName="calico-node-rnmtl" Dec 13 14:20:42.368997 systemd[1]: Created slice kubepods-besteffort-pod4c6a9b9c_d79f_41e3_baac_ae29902849b9.slice. Dec 13 14:20:42.463733 kubelet[2196]: I1213 14:20:42.463693 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4c6a9b9c-d79f-41e3-baac-ae29902849b9-tigera-ca-bundle\") pod \"calico-node-rnmtl\" (UID: \"4c6a9b9c-d79f-41e3-baac-ae29902849b9\") " pod="calico-system/calico-node-rnmtl" Dec 13 14:20:42.463898 kubelet[2196]: I1213 14:20:42.463885 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4c6a9b9c-d79f-41e3-baac-ae29902849b9-xtables-lock\") pod \"calico-node-rnmtl\" (UID: \"4c6a9b9c-d79f-41e3-baac-ae29902849b9\") " pod="calico-system/calico-node-rnmtl" Dec 13 14:20:42.463967 kubelet[2196]: I1213 14:20:42.463959 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/4c6a9b9c-d79f-41e3-baac-ae29902849b9-cni-net-dir\") pod \"calico-node-rnmtl\" (UID: \"4c6a9b9c-d79f-41e3-baac-ae29902849b9\") " pod="calico-system/calico-node-rnmtl" Dec 13 14:20:42.464054 kubelet[2196]: I1213 14:20:42.464043 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/4c6a9b9c-d79f-41e3-baac-ae29902849b9-flexvol-driver-host\") pod \"calico-node-rnmtl\" (UID: \"4c6a9b9c-d79f-41e3-baac-ae29902849b9\") " pod="calico-system/calico-node-rnmtl" Dec 13 14:20:42.464121 kubelet[2196]: I1213 14:20:42.464113 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/4c6a9b9c-d79f-41e3-baac-ae29902849b9-node-certs\") pod \"calico-node-rnmtl\" (UID: \"4c6a9b9c-d79f-41e3-baac-ae29902849b9\") " pod="calico-system/calico-node-rnmtl" Dec 13 14:20:42.464189 kubelet[2196]: I1213 14:20:42.464168 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/4c6a9b9c-d79f-41e3-baac-ae29902849b9-cni-log-dir\") pod \"calico-node-rnmtl\" (UID: \"4c6a9b9c-d79f-41e3-baac-ae29902849b9\") " pod="calico-system/calico-node-rnmtl" Dec 13 14:20:42.464259 kubelet[2196]: I1213 14:20:42.464244 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/4c6a9b9c-d79f-41e3-baac-ae29902849b9-var-lib-calico\") pod \"calico-node-rnmtl\" (UID: \"4c6a9b9c-d79f-41e3-baac-ae29902849b9\") " pod="calico-system/calico-node-rnmtl" Dec 13 14:20:42.464324 kubelet[2196]: I1213 14:20:42.464315 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/4c6a9b9c-d79f-41e3-baac-ae29902849b9-cni-bin-dir\") pod \"calico-node-rnmtl\" (UID: \"4c6a9b9c-d79f-41e3-baac-ae29902849b9\") " pod="calico-system/calico-node-rnmtl" Dec 13 14:20:42.464388 kubelet[2196]: I1213 14:20:42.464380 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ztbqk\" (UniqueName: \"kubernetes.io/projected/4c6a9b9c-d79f-41e3-baac-ae29902849b9-kube-api-access-ztbqk\") pod \"calico-node-rnmtl\" (UID: \"4c6a9b9c-d79f-41e3-baac-ae29902849b9\") " pod="calico-system/calico-node-rnmtl" Dec 13 14:20:42.464473 kubelet[2196]: I1213 14:20:42.464462 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4c6a9b9c-d79f-41e3-baac-ae29902849b9-lib-modules\") pod \"calico-node-rnmtl\" (UID: \"4c6a9b9c-d79f-41e3-baac-ae29902849b9\") " pod="calico-system/calico-node-rnmtl" Dec 13 14:20:42.464543 kubelet[2196]: I1213 14:20:42.464526 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/4c6a9b9c-d79f-41e3-baac-ae29902849b9-var-run-calico\") pod \"calico-node-rnmtl\" (UID: \"4c6a9b9c-d79f-41e3-baac-ae29902849b9\") " pod="calico-system/calico-node-rnmtl" Dec 13 14:20:42.464651 kubelet[2196]: I1213 14:20:42.464641 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/4c6a9b9c-d79f-41e3-baac-ae29902849b9-policysync\") pod \"calico-node-rnmtl\" (UID: \"4c6a9b9c-d79f-41e3-baac-ae29902849b9\") " pod="calico-system/calico-node-rnmtl" Dec 13 14:20:42.485460 kubelet[2196]: I1213 14:20:42.485423 2196 topology_manager.go:215] "Topology Admit Handler" podUID="ea4acfc8-bc78-49a6-862f-fde7fb7796eb" podNamespace="calico-system" podName="csi-node-driver-l59ps" Dec 13 14:20:42.485632 kubelet[2196]: E1213 14:20:42.485616 2196 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-l59ps" podUID="ea4acfc8-bc78-49a6-862f-fde7fb7796eb" Dec 13 14:20:42.565807 kubelet[2196]: I1213 14:20:42.565750 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/ea4acfc8-bc78-49a6-862f-fde7fb7796eb-socket-dir\") pod \"csi-node-driver-l59ps\" (UID: \"ea4acfc8-bc78-49a6-862f-fde7fb7796eb\") " pod="calico-system/csi-node-driver-l59ps" Dec 13 14:20:42.565940 kubelet[2196]: I1213 14:20:42.565915 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xhzlj\" (UniqueName: \"kubernetes.io/projected/ea4acfc8-bc78-49a6-862f-fde7fb7796eb-kube-api-access-xhzlj\") pod \"csi-node-driver-l59ps\" (UID: \"ea4acfc8-bc78-49a6-862f-fde7fb7796eb\") " pod="calico-system/csi-node-driver-l59ps" Dec 13 14:20:42.566044 kubelet[2196]: I1213 14:20:42.566034 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/ea4acfc8-bc78-49a6-862f-fde7fb7796eb-varrun\") pod \"csi-node-driver-l59ps\" (UID: \"ea4acfc8-bc78-49a6-862f-fde7fb7796eb\") " pod="calico-system/csi-node-driver-l59ps" Dec 13 14:20:42.566107 kubelet[2196]: I1213 14:20:42.566099 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/ea4acfc8-bc78-49a6-862f-fde7fb7796eb-registration-dir\") pod \"csi-node-driver-l59ps\" (UID: \"ea4acfc8-bc78-49a6-862f-fde7fb7796eb\") " pod="calico-system/csi-node-driver-l59ps" Dec 13 14:20:42.566175 kubelet[2196]: I1213 14:20:42.566167 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/ea4acfc8-bc78-49a6-862f-fde7fb7796eb-kubelet-dir\") pod \"csi-node-driver-l59ps\" (UID: \"ea4acfc8-bc78-49a6-862f-fde7fb7796eb\") " pod="calico-system/csi-node-driver-l59ps" Dec 13 14:20:42.566780 kubelet[2196]: E1213 14:20:42.566765 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:42.566780 kubelet[2196]: W1213 14:20:42.566777 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:42.566850 kubelet[2196]: E1213 14:20:42.566787 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:42.567357 kubelet[2196]: E1213 14:20:42.567346 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:42.567357 kubelet[2196]: W1213 14:20:42.567354 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:42.567427 kubelet[2196]: E1213 14:20:42.567370 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:42.567514 kubelet[2196]: E1213 14:20:42.567503 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:42.567514 kubelet[2196]: W1213 14:20:42.567513 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:42.567577 kubelet[2196]: E1213 14:20:42.567521 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:42.567640 kubelet[2196]: E1213 14:20:42.567629 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:42.567640 kubelet[2196]: W1213 14:20:42.567638 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:42.567722 kubelet[2196]: E1213 14:20:42.567643 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:42.567998 kubelet[2196]: E1213 14:20:42.567977 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:42.567998 kubelet[2196]: W1213 14:20:42.567988 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:42.567998 kubelet[2196]: E1213 14:20:42.567995 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:42.572353 kubelet[2196]: E1213 14:20:42.572337 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:42.572353 kubelet[2196]: W1213 14:20:42.572347 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:42.572443 kubelet[2196]: E1213 14:20:42.572357 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:42.576394 kubelet[2196]: E1213 14:20:42.576373 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:42.576394 kubelet[2196]: W1213 14:20:42.576383 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:42.576495 kubelet[2196]: E1213 14:20:42.576397 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:42.599497 env[1270]: time="2024-12-13T14:20:42.599468128Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-b494f887b-6dsdf,Uid:5e78a8b2-3a67-4b56-9c15-989d8a267804,Namespace:calico-system,Attempt:0,}" Dec 13 14:20:42.609030 env[1270]: time="2024-12-13T14:20:42.608981000Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:20:42.609139 env[1270]: time="2024-12-13T14:20:42.609013913Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:20:42.609212 env[1270]: time="2024-12-13T14:20:42.609191087Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:20:42.609381 env[1270]: time="2024-12-13T14:20:42.609354560Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/11130c8dbd518f940f7d96f4621029e81e559b536c21b899e0c9947b40a64288 pid=2569 runtime=io.containerd.runc.v2 Dec 13 14:20:42.616319 systemd[1]: Started cri-containerd-11130c8dbd518f940f7d96f4621029e81e559b536c21b899e0c9947b40a64288.scope. Dec 13 14:20:42.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.631000 audit: BPF prog-id=115 op=LOAD Dec 13 14:20:42.631000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.631000 audit[2578]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=2569 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:42.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131313330633864626435313866393430663764393666343632313032 Dec 13 14:20:42.631000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.631000 audit[2578]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=2569 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:42.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131313330633864626435313866393430663764393666343632313032 Dec 13 14:20:42.632000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.632000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.632000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.632000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.632000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.632000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.632000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.632000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.632000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.632000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.632000 audit: BPF prog-id=116 op=LOAD Dec 13 14:20:42.632000 audit[2578]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c00021b530 items=0 ppid=2569 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:42.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131313330633864626435313866393430663764393666343632313032 Dec 13 14:20:42.632000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.632000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.632000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.632000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.632000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.632000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.632000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.632000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.632000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.632000 audit: BPF prog-id=117 op=LOAD Dec 13 14:20:42.632000 audit[2578]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c00021b578 items=0 ppid=2569 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:42.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131313330633864626435313866393430663764393666343632313032 Dec 13 14:20:42.632000 audit: BPF prog-id=117 op=UNLOAD Dec 13 14:20:42.632000 audit: BPF prog-id=116 op=UNLOAD Dec 13 14:20:42.633000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.633000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.633000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.633000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.633000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.633000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.633000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.633000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.633000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.633000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.633000 audit: BPF prog-id=118 op=LOAD Dec 13 14:20:42.633000 audit[2578]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c00021b988 items=0 ppid=2569 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:42.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131313330633864626435313866393430663764393666343632313032 Dec 13 14:20:42.666553 kubelet[2196]: E1213 14:20:42.666464 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:42.666553 kubelet[2196]: W1213 14:20:42.666475 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:42.666553 kubelet[2196]: E1213 14:20:42.666486 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:42.666812 kubelet[2196]: E1213 14:20:42.666735 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:42.666812 kubelet[2196]: W1213 14:20:42.666741 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:42.666812 kubelet[2196]: E1213 14:20:42.666752 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:42.666995 kubelet[2196]: E1213 14:20:42.666920 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:42.666995 kubelet[2196]: W1213 14:20:42.666926 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:42.666995 kubelet[2196]: E1213 14:20:42.666934 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:42.667151 kubelet[2196]: E1213 14:20:42.667109 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:42.667151 kubelet[2196]: W1213 14:20:42.667115 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:42.667151 kubelet[2196]: E1213 14:20:42.667125 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:42.667232 kubelet[2196]: E1213 14:20:42.667215 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:42.667232 kubelet[2196]: W1213 14:20:42.667222 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:42.667275 kubelet[2196]: E1213 14:20:42.667231 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:42.667377 kubelet[2196]: E1213 14:20:42.667368 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:42.667377 kubelet[2196]: W1213 14:20:42.667375 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:42.667437 kubelet[2196]: E1213 14:20:42.667383 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:42.667470 kubelet[2196]: E1213 14:20:42.667466 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:42.667494 kubelet[2196]: W1213 14:20:42.667470 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:42.667494 kubelet[2196]: E1213 14:20:42.667476 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:42.667687 kubelet[2196]: E1213 14:20:42.667626 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:42.667687 kubelet[2196]: W1213 14:20:42.667632 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:42.667687 kubelet[2196]: E1213 14:20:42.667639 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:42.667870 kubelet[2196]: E1213 14:20:42.667843 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:42.667870 kubelet[2196]: W1213 14:20:42.667849 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:42.667870 kubelet[2196]: E1213 14:20:42.667860 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:42.668029 kubelet[2196]: E1213 14:20:42.668020 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:42.668029 kubelet[2196]: W1213 14:20:42.668026 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:42.668029 kubelet[2196]: E1213 14:20:42.668034 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:42.668216 kubelet[2196]: E1213 14:20:42.668175 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:42.668216 kubelet[2196]: W1213 14:20:42.668182 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:42.668216 kubelet[2196]: E1213 14:20:42.668195 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:42.668571 kubelet[2196]: E1213 14:20:42.668359 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:42.668571 kubelet[2196]: W1213 14:20:42.668365 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:42.668726 kubelet[2196]: E1213 14:20:42.668645 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:42.669638 kubelet[2196]: E1213 14:20:42.669420 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:42.669638 kubelet[2196]: W1213 14:20:42.669433 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:42.669638 kubelet[2196]: E1213 14:20:42.669582 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:42.670519 kubelet[2196]: E1213 14:20:42.670500 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:42.670519 kubelet[2196]: W1213 14:20:42.670508 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:42.672661 kubelet[2196]: E1213 14:20:42.670828 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:42.672661 kubelet[2196]: W1213 14:20:42.670836 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:42.672661 kubelet[2196]: E1213 14:20:42.670923 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:42.672661 kubelet[2196]: W1213 14:20:42.670928 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:42.672661 kubelet[2196]: E1213 14:20:42.671065 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:42.672661 kubelet[2196]: W1213 14:20:42.671070 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:42.672661 kubelet[2196]: E1213 14:20:42.671149 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:42.672661 kubelet[2196]: W1213 14:20:42.671156 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:42.672661 kubelet[2196]: E1213 14:20:42.671160 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:42.672661 kubelet[2196]: E1213 14:20:42.671162 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:42.672947 env[1270]: time="2024-12-13T14:20:42.671343137Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-rnmtl,Uid:4c6a9b9c-d79f-41e3-baac-ae29902849b9,Namespace:calico-system,Attempt:0,}" Dec 13 14:20:42.672976 kubelet[2196]: E1213 14:20:42.671177 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:42.672976 kubelet[2196]: E1213 14:20:42.671194 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:42.672976 kubelet[2196]: E1213 14:20:42.671240 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:42.672976 kubelet[2196]: W1213 14:20:42.671248 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:42.672976 kubelet[2196]: E1213 14:20:42.671253 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:42.672976 kubelet[2196]: E1213 14:20:42.671358 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:42.672976 kubelet[2196]: W1213 14:20:42.671362 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:42.672976 kubelet[2196]: E1213 14:20:42.671368 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:42.672976 kubelet[2196]: E1213 14:20:42.671622 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:42.672976 kubelet[2196]: W1213 14:20:42.671628 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:42.673163 kubelet[2196]: E1213 14:20:42.671633 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:42.673163 kubelet[2196]: E1213 14:20:42.671155 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:42.673163 kubelet[2196]: E1213 14:20:42.671727 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:42.673163 kubelet[2196]: W1213 14:20:42.671733 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:42.673163 kubelet[2196]: E1213 14:20:42.671738 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:42.673163 kubelet[2196]: E1213 14:20:42.671817 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:42.673163 kubelet[2196]: W1213 14:20:42.671822 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:42.673163 kubelet[2196]: E1213 14:20:42.671827 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:42.673163 kubelet[2196]: E1213 14:20:42.671927 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:42.673163 kubelet[2196]: W1213 14:20:42.671934 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:42.673335 kubelet[2196]: E1213 14:20:42.671940 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:42.677386 kubelet[2196]: E1213 14:20:42.677371 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:42.677386 kubelet[2196]: W1213 14:20:42.677382 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:42.677503 kubelet[2196]: E1213 14:20:42.677400 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:42.682199 env[1270]: time="2024-12-13T14:20:42.682166793Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-b494f887b-6dsdf,Uid:5e78a8b2-3a67-4b56-9c15-989d8a267804,Namespace:calico-system,Attempt:0,} returns sandbox id \"11130c8dbd518f940f7d96f4621029e81e559b536c21b899e0c9947b40a64288\"" Dec 13 14:20:42.687417 kubelet[2196]: E1213 14:20:42.687401 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:42.687417 kubelet[2196]: W1213 14:20:42.687412 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:42.687521 kubelet[2196]: E1213 14:20:42.687423 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:42.688173 env[1270]: time="2024-12-13T14:20:42.688149435Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 14:20:42.689135 env[1270]: time="2024-12-13T14:20:42.688966024Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:20:42.689135 env[1270]: time="2024-12-13T14:20:42.688993843Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:20:42.689135 env[1270]: time="2024-12-13T14:20:42.689018505Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:20:42.689135 env[1270]: time="2024-12-13T14:20:42.689118430Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cfdd1f12ec9dd891f9a6bd409e83f7f58429b30446fcd76df4b6333ac8136419 pid=2634 runtime=io.containerd.runc.v2 Dec 13 14:20:42.698122 systemd[1]: Started cri-containerd-cfdd1f12ec9dd891f9a6bd409e83f7f58429b30446fcd76df4b6333ac8136419.scope. Dec 13 14:20:42.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit: BPF prog-id=119 op=LOAD Dec 13 14:20:42.729000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[2646]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2634 pid=2646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:42.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366646431663132656339646438393166396136626434303965383366 Dec 13 14:20:42.729000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[2646]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2634 pid=2646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:42.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366646431663132656339646438393166396136626434303965383366 Dec 13 14:20:42.729000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit: BPF prog-id=120 op=LOAD Dec 13 14:20:42.729000 audit[2646]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00025bcf0 items=0 ppid=2634 pid=2646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:42.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366646431663132656339646438393166396136626434303965383366 Dec 13 14:20:42.729000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit: BPF prog-id=121 op=LOAD Dec 13 14:20:42.729000 audit[2646]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00025bd38 items=0 ppid=2634 pid=2646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:42.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366646431663132656339646438393166396136626434303965383366 Dec 13 14:20:42.729000 audit: BPF prog-id=121 op=UNLOAD Dec 13 14:20:42.729000 audit: BPF prog-id=120 op=UNLOAD Dec 13 14:20:42.729000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[2646]: AVC avc: denied { perfmon } for pid=2646 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit[2646]: AVC avc: denied { bpf } for pid=2646 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:42.729000 audit: BPF prog-id=122 op=LOAD Dec 13 14:20:42.729000 audit[2646]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003c4148 items=0 ppid=2634 pid=2646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:42.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366646431663132656339646438393166396136626434303965383366 Dec 13 14:20:42.743752 env[1270]: time="2024-12-13T14:20:42.743726411Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-rnmtl,Uid:4c6a9b9c-d79f-41e3-baac-ae29902849b9,Namespace:calico-system,Attempt:0,} returns sandbox id \"cfdd1f12ec9dd891f9a6bd409e83f7f58429b30446fcd76df4b6333ac8136419\"" Dec 13 14:20:43.122000 audit[2670]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2670 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:20:43.122000 audit[2670]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffc827d4b00 a2=0 a3=7ffc827d4aec items=0 ppid=2329 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:43.122000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:20:43.128000 audit[2670]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2670 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:20:43.128000 audit[2670]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc827d4b00 a2=0 a3=0 items=0 ppid=2329 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:43.128000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:20:44.168456 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3950894291.mount: Deactivated successfully. Dec 13 14:20:44.822550 kubelet[2196]: E1213 14:20:44.822513 2196 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-l59ps" podUID="ea4acfc8-bc78-49a6-862f-fde7fb7796eb" Dec 13 14:20:45.487633 env[1270]: time="2024-12-13T14:20:45.487598076Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:45.491627 env[1270]: time="2024-12-13T14:20:45.491523461Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:45.492848 env[1270]: time="2024-12-13T14:20:45.492809693Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:45.493224 env[1270]: time="2024-12-13T14:20:45.493205816Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 14:20:45.493891 env[1270]: time="2024-12-13T14:20:45.493877492Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:45.495654 env[1270]: time="2024-12-13T14:20:45.495092253Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:20:45.502896 env[1270]: time="2024-12-13T14:20:45.502862504Z" level=info msg="CreateContainer within sandbox \"11130c8dbd518f940f7d96f4621029e81e559b536c21b899e0c9947b40a64288\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 14:20:45.508523 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2951728178.mount: Deactivated successfully. Dec 13 14:20:45.524011 env[1270]: time="2024-12-13T14:20:45.523982872Z" level=info msg="CreateContainer within sandbox \"11130c8dbd518f940f7d96f4621029e81e559b536c21b899e0c9947b40a64288\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"5d03aa4aa30811f0c3e60bc1e29027379ef5525dba197d0fa60e7fea28464b1e\"" Dec 13 14:20:45.524340 env[1270]: time="2024-12-13T14:20:45.524327643Z" level=info msg="StartContainer for \"5d03aa4aa30811f0c3e60bc1e29027379ef5525dba197d0fa60e7fea28464b1e\"" Dec 13 14:20:45.539544 systemd[1]: Started cri-containerd-5d03aa4aa30811f0c3e60bc1e29027379ef5525dba197d0fa60e7fea28464b1e.scope. Dec 13 14:20:45.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.549000 audit: BPF prog-id=123 op=LOAD Dec 13 14:20:45.549000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.549000 audit[2681]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2569 pid=2681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:45.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564303361613461613330383131663063336536306263316532393032 Dec 13 14:20:45.550000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.550000 audit[2681]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2569 pid=2681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:45.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564303361613461613330383131663063336536306263316532393032 Dec 13 14:20:45.550000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.550000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.550000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.550000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.550000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.550000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.550000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.550000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.550000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.550000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.550000 audit: BPF prog-id=124 op=LOAD Dec 13 14:20:45.550000 audit[2681]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000fbdc0 items=0 ppid=2569 pid=2681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:45.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564303361613461613330383131663063336536306263316532393032 Dec 13 14:20:45.550000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.550000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.550000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.550000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.550000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.550000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.550000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.550000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.550000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.550000 audit: BPF prog-id=125 op=LOAD Dec 13 14:20:45.550000 audit[2681]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000fbe08 items=0 ppid=2569 pid=2681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:45.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564303361613461613330383131663063336536306263316532393032 Dec 13 14:20:45.550000 audit: BPF prog-id=125 op=UNLOAD Dec 13 14:20:45.550000 audit: BPF prog-id=124 op=UNLOAD Dec 13 14:20:45.550000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.550000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.550000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.550000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.550000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.550000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.550000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.550000 audit[2681]: AVC avc: denied { perfmon } for pid=2681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.550000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.550000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:45.550000 audit: BPF prog-id=126 op=LOAD Dec 13 14:20:45.550000 audit[2681]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e6218 items=0 ppid=2569 pid=2681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:45.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564303361613461613330383131663063336536306263316532393032 Dec 13 14:20:45.571864 env[1270]: time="2024-12-13T14:20:45.571839983Z" level=info msg="StartContainer for \"5d03aa4aa30811f0c3e60bc1e29027379ef5525dba197d0fa60e7fea28464b1e\" returns successfully" Dec 13 14:20:45.902956 kubelet[2196]: I1213 14:20:45.902689 2196 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-b494f887b-6dsdf" podStartSLOduration=1.096631913 podStartE2EDuration="3.902677861s" podCreationTimestamp="2024-12-13 14:20:42 +0000 UTC" firstStartedPulling="2024-12-13 14:20:42.687957807 +0000 UTC m=+21.042977587" lastFinishedPulling="2024-12-13 14:20:45.494003755 +0000 UTC m=+23.849023535" observedRunningTime="2024-12-13 14:20:45.902115011 +0000 UTC m=+24.257134802" watchObservedRunningTime="2024-12-13 14:20:45.902677861 +0000 UTC m=+24.257697642" Dec 13 14:20:45.916000 audit[2712]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2712 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:20:45.916000 audit[2712]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffcd2783230 a2=0 a3=7ffcd278321c items=0 ppid=2329 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:45.916000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:20:45.920000 audit[2712]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2712 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:20:45.920000 audit[2712]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffcd2783230 a2=0 a3=7ffcd278321c items=0 ppid=2329 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:45.920000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:20:45.967837 kubelet[2196]: E1213 14:20:45.967755 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:45.967837 kubelet[2196]: W1213 14:20:45.967768 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:45.967837 kubelet[2196]: E1213 14:20:45.967779 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:45.968066 kubelet[2196]: E1213 14:20:45.968002 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:45.968066 kubelet[2196]: W1213 14:20:45.968009 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:45.968066 kubelet[2196]: E1213 14:20:45.968014 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:45.968238 kubelet[2196]: E1213 14:20:45.968175 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:45.968238 kubelet[2196]: W1213 14:20:45.968181 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:45.968238 kubelet[2196]: E1213 14:20:45.968187 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:45.968415 kubelet[2196]: E1213 14:20:45.968341 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:45.968415 kubelet[2196]: W1213 14:20:45.968348 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:45.968415 kubelet[2196]: E1213 14:20:45.968354 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:45.968594 kubelet[2196]: E1213 14:20:45.968534 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:45.968594 kubelet[2196]: W1213 14:20:45.968540 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:45.968594 kubelet[2196]: E1213 14:20:45.968545 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:45.968757 kubelet[2196]: E1213 14:20:45.968702 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:45.968757 kubelet[2196]: W1213 14:20:45.968708 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:45.968757 kubelet[2196]: E1213 14:20:45.968714 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:45.968909 kubelet[2196]: E1213 14:20:45.968853 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:45.968909 kubelet[2196]: W1213 14:20:45.968859 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:45.968909 kubelet[2196]: E1213 14:20:45.968864 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:45.969078 kubelet[2196]: E1213 14:20:45.969007 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:45.969078 kubelet[2196]: W1213 14:20:45.969013 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:45.969078 kubelet[2196]: E1213 14:20:45.969018 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:45.969247 kubelet[2196]: E1213 14:20:45.969184 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:45.969247 kubelet[2196]: W1213 14:20:45.969190 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:45.969247 kubelet[2196]: E1213 14:20:45.969196 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:45.969406 kubelet[2196]: E1213 14:20:45.969356 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:45.969406 kubelet[2196]: W1213 14:20:45.969362 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:45.969406 kubelet[2196]: E1213 14:20:45.969367 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:45.969606 kubelet[2196]: E1213 14:20:45.969545 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:45.969606 kubelet[2196]: W1213 14:20:45.969551 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:45.969606 kubelet[2196]: E1213 14:20:45.969556 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:45.969775 kubelet[2196]: E1213 14:20:45.969712 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:45.969775 kubelet[2196]: W1213 14:20:45.969718 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:45.969775 kubelet[2196]: E1213 14:20:45.969723 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:45.970016 kubelet[2196]: E1213 14:20:45.969956 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:45.970016 kubelet[2196]: W1213 14:20:45.969963 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:45.970016 kubelet[2196]: E1213 14:20:45.969969 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:45.970165 kubelet[2196]: E1213 14:20:45.970116 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:45.970165 kubelet[2196]: W1213 14:20:45.970122 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:45.970165 kubelet[2196]: E1213 14:20:45.970127 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:45.970304 kubelet[2196]: E1213 14:20:45.970269 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:45.970304 kubelet[2196]: W1213 14:20:45.970275 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:45.970304 kubelet[2196]: E1213 14:20:45.970280 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:45.986507 kubelet[2196]: E1213 14:20:45.986492 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:45.986507 kubelet[2196]: W1213 14:20:45.986503 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:45.986649 kubelet[2196]: E1213 14:20:45.986513 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:45.986672 kubelet[2196]: E1213 14:20:45.986657 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:45.986672 kubelet[2196]: W1213 14:20:45.986662 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:45.986672 kubelet[2196]: E1213 14:20:45.986667 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:45.986768 kubelet[2196]: E1213 14:20:45.986756 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:45.986825 kubelet[2196]: W1213 14:20:45.986765 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:45.986825 kubelet[2196]: E1213 14:20:45.986778 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:45.986923 kubelet[2196]: E1213 14:20:45.986911 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:45.986923 kubelet[2196]: W1213 14:20:45.986919 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:45.986981 kubelet[2196]: E1213 14:20:45.986928 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:45.987019 kubelet[2196]: E1213 14:20:45.987010 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:45.987019 kubelet[2196]: W1213 14:20:45.987016 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:45.987092 kubelet[2196]: E1213 14:20:45.987023 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:45.987121 kubelet[2196]: E1213 14:20:45.987099 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:45.987121 kubelet[2196]: W1213 14:20:45.987103 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:45.987121 kubelet[2196]: E1213 14:20:45.987113 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:45.987219 kubelet[2196]: E1213 14:20:45.987209 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:45.987219 kubelet[2196]: W1213 14:20:45.987216 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:45.987270 kubelet[2196]: E1213 14:20:45.987223 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:45.987492 kubelet[2196]: E1213 14:20:45.987481 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:45.987492 kubelet[2196]: W1213 14:20:45.987490 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:45.987553 kubelet[2196]: E1213 14:20:45.987500 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:45.987619 kubelet[2196]: E1213 14:20:45.987607 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:45.987619 kubelet[2196]: W1213 14:20:45.987614 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:45.987676 kubelet[2196]: E1213 14:20:45.987622 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:45.987708 kubelet[2196]: E1213 14:20:45.987698 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:45.987708 kubelet[2196]: W1213 14:20:45.987704 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:45.987762 kubelet[2196]: E1213 14:20:45.987708 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:45.987802 kubelet[2196]: E1213 14:20:45.987792 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:45.987802 kubelet[2196]: W1213 14:20:45.987799 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:45.987858 kubelet[2196]: E1213 14:20:45.987834 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:45.987896 kubelet[2196]: E1213 14:20:45.987885 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:45.987896 kubelet[2196]: W1213 14:20:45.987892 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:45.987951 kubelet[2196]: E1213 14:20:45.987898 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:45.987983 kubelet[2196]: E1213 14:20:45.987970 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:45.987983 kubelet[2196]: W1213 14:20:45.987976 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:45.988040 kubelet[2196]: E1213 14:20:45.987983 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:45.988071 kubelet[2196]: E1213 14:20:45.988060 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:45.988071 kubelet[2196]: W1213 14:20:45.988067 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:45.988127 kubelet[2196]: E1213 14:20:45.988075 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:45.988168 kubelet[2196]: E1213 14:20:45.988157 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:45.988168 kubelet[2196]: W1213 14:20:45.988164 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:45.988220 kubelet[2196]: E1213 14:20:45.988174 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:45.988340 kubelet[2196]: E1213 14:20:45.988328 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:45.988340 kubelet[2196]: W1213 14:20:45.988336 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:45.988340 kubelet[2196]: E1213 14:20:45.988343 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:45.988441 kubelet[2196]: E1213 14:20:45.988432 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:45.988441 kubelet[2196]: W1213 14:20:45.988439 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:45.988509 kubelet[2196]: E1213 14:20:45.988459 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:45.988644 kubelet[2196]: E1213 14:20:45.988635 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:45.988644 kubelet[2196]: W1213 14:20:45.988641 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:45.988709 kubelet[2196]: E1213 14:20:45.988647 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:46.822921 kubelet[2196]: E1213 14:20:46.822894 2196 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-l59ps" podUID="ea4acfc8-bc78-49a6-862f-fde7fb7796eb" Dec 13 14:20:46.976705 kubelet[2196]: E1213 14:20:46.976682 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:46.976705 kubelet[2196]: W1213 14:20:46.976698 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:46.976705 kubelet[2196]: E1213 14:20:46.976710 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:46.976983 kubelet[2196]: E1213 14:20:46.976901 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:46.976983 kubelet[2196]: W1213 14:20:46.976906 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:46.976983 kubelet[2196]: E1213 14:20:46.976912 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:46.977045 kubelet[2196]: E1213 14:20:46.977005 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:46.977045 kubelet[2196]: W1213 14:20:46.977010 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:46.977045 kubelet[2196]: E1213 14:20:46.977015 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:46.977240 kubelet[2196]: E1213 14:20:46.977178 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:46.977240 kubelet[2196]: W1213 14:20:46.977238 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:46.977295 kubelet[2196]: E1213 14:20:46.977243 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:46.977342 kubelet[2196]: E1213 14:20:46.977330 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:46.977342 kubelet[2196]: W1213 14:20:46.977338 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:46.977398 kubelet[2196]: E1213 14:20:46.977343 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:46.977425 kubelet[2196]: E1213 14:20:46.977413 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:46.977425 kubelet[2196]: W1213 14:20:46.977418 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:46.977425 kubelet[2196]: E1213 14:20:46.977422 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:46.977511 kubelet[2196]: E1213 14:20:46.977502 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:46.977511 kubelet[2196]: W1213 14:20:46.977508 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:46.977565 kubelet[2196]: E1213 14:20:46.977555 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:46.977653 kubelet[2196]: E1213 14:20:46.977641 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:46.977653 kubelet[2196]: W1213 14:20:46.977649 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:46.977653 kubelet[2196]: E1213 14:20:46.977654 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:46.977741 kubelet[2196]: E1213 14:20:46.977731 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:46.977741 kubelet[2196]: W1213 14:20:46.977737 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:46.977789 kubelet[2196]: E1213 14:20:46.977744 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:46.977823 kubelet[2196]: E1213 14:20:46.977813 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:46.977823 kubelet[2196]: W1213 14:20:46.977819 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:46.977823 kubelet[2196]: E1213 14:20:46.977823 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:46.977901 kubelet[2196]: E1213 14:20:46.977891 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:46.977901 kubelet[2196]: W1213 14:20:46.977897 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:46.977951 kubelet[2196]: E1213 14:20:46.977902 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:46.977979 kubelet[2196]: E1213 14:20:46.977968 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:46.977979 kubelet[2196]: W1213 14:20:46.977972 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:46.977979 kubelet[2196]: E1213 14:20:46.977976 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:46.978059 kubelet[2196]: E1213 14:20:46.978046 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:46.978059 kubelet[2196]: W1213 14:20:46.978055 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:46.978059 kubelet[2196]: E1213 14:20:46.978060 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:46.978141 kubelet[2196]: E1213 14:20:46.978130 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:46.978141 kubelet[2196]: W1213 14:20:46.978134 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:46.978141 kubelet[2196]: E1213 14:20:46.978138 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:46.978216 kubelet[2196]: E1213 14:20:46.978205 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:46.978216 kubelet[2196]: W1213 14:20:46.978213 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:46.978216 kubelet[2196]: E1213 14:20:46.978217 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:46.994216 kubelet[2196]: E1213 14:20:46.993568 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:46.994216 kubelet[2196]: W1213 14:20:46.993580 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:46.994216 kubelet[2196]: E1213 14:20:46.993592 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:46.994216 kubelet[2196]: E1213 14:20:46.993697 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:46.994216 kubelet[2196]: W1213 14:20:46.993701 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:46.994216 kubelet[2196]: E1213 14:20:46.993709 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:46.994216 kubelet[2196]: E1213 14:20:46.993797 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:46.994216 kubelet[2196]: W1213 14:20:46.993801 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:46.994216 kubelet[2196]: E1213 14:20:46.993806 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:46.994216 kubelet[2196]: E1213 14:20:46.993905 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:46.994479 kubelet[2196]: W1213 14:20:46.993911 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:46.994479 kubelet[2196]: E1213 14:20:46.993916 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:46.994479 kubelet[2196]: E1213 14:20:46.993997 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:46.994479 kubelet[2196]: W1213 14:20:46.994002 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:46.994479 kubelet[2196]: E1213 14:20:46.994011 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:46.994479 kubelet[2196]: E1213 14:20:46.994080 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:46.994479 kubelet[2196]: W1213 14:20:46.994084 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:46.994479 kubelet[2196]: E1213 14:20:46.994088 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:46.994479 kubelet[2196]: E1213 14:20:46.994180 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:46.994479 kubelet[2196]: W1213 14:20:46.994184 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:46.994677 kubelet[2196]: E1213 14:20:46.994188 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:46.996464 kubelet[2196]: E1213 14:20:46.995192 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:46.996464 kubelet[2196]: W1213 14:20:46.995202 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:46.996464 kubelet[2196]: E1213 14:20:46.995214 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:46.996464 kubelet[2196]: E1213 14:20:46.995289 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:46.996464 kubelet[2196]: W1213 14:20:46.995294 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:46.996464 kubelet[2196]: E1213 14:20:46.995302 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:46.996464 kubelet[2196]: E1213 14:20:46.995369 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:46.996464 kubelet[2196]: W1213 14:20:46.995373 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:46.996464 kubelet[2196]: E1213 14:20:46.995380 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:46.996464 kubelet[2196]: E1213 14:20:46.995476 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:46.996672 kubelet[2196]: W1213 14:20:46.995481 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:46.996672 kubelet[2196]: E1213 14:20:46.995489 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:46.996672 kubelet[2196]: E1213 14:20:46.995760 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:46.996672 kubelet[2196]: W1213 14:20:46.995764 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:46.996672 kubelet[2196]: E1213 14:20:46.995770 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:46.996672 kubelet[2196]: E1213 14:20:46.996123 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:46.996672 kubelet[2196]: W1213 14:20:46.996133 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:46.996672 kubelet[2196]: E1213 14:20:46.996144 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:46.996672 kubelet[2196]: E1213 14:20:46.996227 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:46.996672 kubelet[2196]: W1213 14:20:46.996232 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:46.996846 kubelet[2196]: E1213 14:20:46.996241 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:46.996846 kubelet[2196]: E1213 14:20:46.996315 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:46.996846 kubelet[2196]: W1213 14:20:46.996319 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:46.996846 kubelet[2196]: E1213 14:20:46.996324 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:46.996846 kubelet[2196]: E1213 14:20:46.996402 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:46.996846 kubelet[2196]: W1213 14:20:46.996406 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:46.996846 kubelet[2196]: E1213 14:20:46.996411 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:46.996846 kubelet[2196]: E1213 14:20:46.996562 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:46.996846 kubelet[2196]: W1213 14:20:46.996567 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:46.996846 kubelet[2196]: E1213 14:20:46.996572 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:46.998592 kubelet[2196]: E1213 14:20:46.996890 2196 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:20:46.998592 kubelet[2196]: W1213 14:20:46.996895 2196 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:20:46.998592 kubelet[2196]: E1213 14:20:46.996900 2196 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:20:47.198018 env[1270]: time="2024-12-13T14:20:47.197929514Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:47.206978 env[1270]: time="2024-12-13T14:20:47.206952889Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:47.214057 env[1270]: time="2024-12-13T14:20:47.214038516Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:47.223838 env[1270]: time="2024-12-13T14:20:47.223807432Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:47.224472 env[1270]: time="2024-12-13T14:20:47.224260469Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 14:20:47.227255 env[1270]: time="2024-12-13T14:20:47.227219430Z" level=info msg="CreateContainer within sandbox \"cfdd1f12ec9dd891f9a6bd409e83f7f58429b30446fcd76df4b6333ac8136419\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:20:47.253649 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1775725479.mount: Deactivated successfully. Dec 13 14:20:47.260877 env[1270]: time="2024-12-13T14:20:47.260850842Z" level=info msg="CreateContainer within sandbox \"cfdd1f12ec9dd891f9a6bd409e83f7f58429b30446fcd76df4b6333ac8136419\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"e15bfbccdbb1b0835d46e10c4107d83b1079fc470bcdc72d92cd0eda479d4e00\"" Dec 13 14:20:47.261362 env[1270]: time="2024-12-13T14:20:47.261349125Z" level=info msg="StartContainer for \"e15bfbccdbb1b0835d46e10c4107d83b1079fc470bcdc72d92cd0eda479d4e00\"" Dec 13 14:20:47.278031 systemd[1]: Started cri-containerd-e15bfbccdbb1b0835d46e10c4107d83b1079fc470bcdc72d92cd0eda479d4e00.scope. Dec 13 14:20:47.287000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.289981 kernel: kauditd_printk_skb: 185 callbacks suppressed Dec 13 14:20:47.290018 kernel: audit: type=1400 audit(1734099647.287:969): avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.287000 audit[2788]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f1ee81fd7c8 items=0 ppid=2634 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:47.296070 kernel: audit: type=1300 audit(1734099647.287:969): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f1ee81fd7c8 items=0 ppid=2634 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:47.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531356266626363646262316230383335643436653130633431303764 Dec 13 14:20:47.299610 kernel: audit: type=1327 audit(1734099647.287:969): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531356266626363646262316230383335643436653130633431303764 Dec 13 14:20:47.299642 kernel: audit: type=1400 audit(1734099647.295:970): avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.295000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.295000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.304769 kernel: audit: type=1400 audit(1734099647.295:970): avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.295000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.307304 kernel: audit: type=1400 audit(1734099647.295:970): avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.307329 kernel: audit: type=1400 audit(1734099647.295:970): avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.295000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.295000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.312463 kernel: audit: type=1400 audit(1734099647.295:970): avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.295000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.295000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.318460 kernel: audit: type=1400 audit(1734099647.295:970): avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.318488 kernel: audit: type=1400 audit(1734099647.295:970): avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.295000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.295000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.295000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.295000 audit: BPF prog-id=127 op=LOAD Dec 13 14:20:47.295000 audit[2788]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00032fbd8 items=0 ppid=2634 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:47.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531356266626363646262316230383335643436653130633431303764 Dec 13 14:20:47.295000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.295000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.295000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.295000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.295000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.295000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.295000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.295000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.295000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.295000 audit: BPF prog-id=128 op=LOAD Dec 13 14:20:47.295000 audit[2788]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00032fc28 items=0 ppid=2634 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:47.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531356266626363646262316230383335643436653130633431303764 Dec 13 14:20:47.295000 audit: BPF prog-id=128 op=UNLOAD Dec 13 14:20:47.295000 audit: BPF prog-id=127 op=UNLOAD Dec 13 14:20:47.295000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.295000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.295000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.295000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.295000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.295000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.295000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.295000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.295000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.295000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:47.295000 audit: BPF prog-id=129 op=LOAD Dec 13 14:20:47.295000 audit[2788]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00032fcb8 items=0 ppid=2634 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:47.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531356266626363646262316230383335643436653130633431303764 Dec 13 14:20:47.325058 env[1270]: time="2024-12-13T14:20:47.325033380Z" level=info msg="StartContainer for \"e15bfbccdbb1b0835d46e10c4107d83b1079fc470bcdc72d92cd0eda479d4e00\" returns successfully" Dec 13 14:20:47.331391 systemd[1]: cri-containerd-e15bfbccdbb1b0835d46e10c4107d83b1079fc470bcdc72d92cd0eda479d4e00.scope: Deactivated successfully. Dec 13 14:20:47.334000 audit: BPF prog-id=129 op=UNLOAD Dec 13 14:20:47.497827 systemd[1]: run-containerd-runc-k8s.io-e15bfbccdbb1b0835d46e10c4107d83b1079fc470bcdc72d92cd0eda479d4e00-runc.zCFGH1.mount: Deactivated successfully. Dec 13 14:20:47.497901 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e15bfbccdbb1b0835d46e10c4107d83b1079fc470bcdc72d92cd0eda479d4e00-rootfs.mount: Deactivated successfully. Dec 13 14:20:47.522521 env[1270]: time="2024-12-13T14:20:47.522486769Z" level=info msg="shim disconnected" id=e15bfbccdbb1b0835d46e10c4107d83b1079fc470bcdc72d92cd0eda479d4e00 Dec 13 14:20:47.522654 env[1270]: time="2024-12-13T14:20:47.522637563Z" level=warning msg="cleaning up after shim disconnected" id=e15bfbccdbb1b0835d46e10c4107d83b1079fc470bcdc72d92cd0eda479d4e00 namespace=k8s.io Dec 13 14:20:47.522719 env[1270]: time="2024-12-13T14:20:47.522705506Z" level=info msg="cleaning up dead shim" Dec 13 14:20:47.529313 env[1270]: time="2024-12-13T14:20:47.529280281Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:20:47Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2827 runtime=io.containerd.runc.v2\n" Dec 13 14:20:47.900762 env[1270]: time="2024-12-13T14:20:47.900378155Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:20:48.822814 kubelet[2196]: E1213 14:20:48.822780 2196 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-l59ps" podUID="ea4acfc8-bc78-49a6-862f-fde7fb7796eb" Dec 13 14:20:50.822747 kubelet[2196]: E1213 14:20:50.822092 2196 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-l59ps" podUID="ea4acfc8-bc78-49a6-862f-fde7fb7796eb" Dec 13 14:20:52.822314 kubelet[2196]: E1213 14:20:52.822272 2196 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-l59ps" podUID="ea4acfc8-bc78-49a6-862f-fde7fb7796eb" Dec 13 14:20:53.284826 env[1270]: time="2024-12-13T14:20:53.284756539Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:53.338036 env[1270]: time="2024-12-13T14:20:53.338004002Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:53.345456 env[1270]: time="2024-12-13T14:20:53.345427520Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:53.346122 env[1270]: time="2024-12-13T14:20:53.346108069Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:20:53.346457 env[1270]: time="2024-12-13T14:20:53.346433321Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 14:20:53.348686 env[1270]: time="2024-12-13T14:20:53.348664941Z" level=info msg="CreateContainer within sandbox \"cfdd1f12ec9dd891f9a6bd409e83f7f58429b30446fcd76df4b6333ac8136419\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:20:53.356229 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1116159847.mount: Deactivated successfully. Dec 13 14:20:53.358617 env[1270]: time="2024-12-13T14:20:53.358596287Z" level=info msg="CreateContainer within sandbox \"cfdd1f12ec9dd891f9a6bd409e83f7f58429b30446fcd76df4b6333ac8136419\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"c8ab46ae5ea67d5e9b37c6a831e22dfdbf650b07811d0b48c4b185e232845aaa\"" Dec 13 14:20:53.359128 env[1270]: time="2024-12-13T14:20:53.359109210Z" level=info msg="StartContainer for \"c8ab46ae5ea67d5e9b37c6a831e22dfdbf650b07811d0b48c4b185e232845aaa\"" Dec 13 14:20:53.376796 systemd[1]: Started cri-containerd-c8ab46ae5ea67d5e9b37c6a831e22dfdbf650b07811d0b48c4b185e232845aaa.scope. Dec 13 14:20:53.386000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.388572 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:20:53.388616 kernel: audit: type=1400 audit(1734099653.386:976): avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.386000 audit[2852]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001996b0 a2=3c a3=7fa6884e4518 items=0 ppid=2634 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:53.395461 kernel: audit: type=1300 audit(1734099653.386:976): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001996b0 a2=3c a3=7fa6884e4518 items=0 ppid=2634 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:53.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338616234366165356561363764356539623337633661383331653232 Dec 13 14:20:53.399461 kernel: audit: type=1327 audit(1734099653.386:976): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338616234366165356561363764356539623337633661383331653232 Dec 13 14:20:53.386000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.386000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.405176 kernel: audit: type=1400 audit(1734099653.386:977): avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.405227 kernel: audit: type=1400 audit(1734099653.386:977): avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.386000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.407643 kernel: audit: type=1400 audit(1734099653.386:977): avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.410477 kernel: audit: type=1400 audit(1734099653.386:977): avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.410514 kernel: audit: type=1400 audit(1734099653.386:977): avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.386000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.386000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.386000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.415461 kernel: audit: type=1400 audit(1734099653.386:977): avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.417995 kernel: audit: type=1400 audit(1734099653.386:977): avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.386000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.386000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.386000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.386000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.386000 audit: BPF prog-id=130 op=LOAD Dec 13 14:20:53.386000 audit[2852]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001999d8 a2=78 a3=c000275ba8 items=0 ppid=2634 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:53.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338616234366165356561363764356539623337633661383331653232 Dec 13 14:20:53.390000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.390000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.390000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.390000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.390000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.390000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.390000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.390000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.390000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.390000 audit: BPF prog-id=131 op=LOAD Dec 13 14:20:53.390000 audit[2852]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000199770 a2=78 a3=c000275bf8 items=0 ppid=2634 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:53.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338616234366165356561363764356539623337633661383331653232 Dec 13 14:20:53.390000 audit: BPF prog-id=131 op=UNLOAD Dec 13 14:20:53.390000 audit: BPF prog-id=130 op=UNLOAD Dec 13 14:20:53.390000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.390000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.390000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.390000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.390000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.390000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.390000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.390000 audit[2852]: AVC avc: denied { perfmon } for pid=2852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.390000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.390000 audit[2852]: AVC avc: denied { bpf } for pid=2852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:20:53.390000 audit: BPF prog-id=132 op=LOAD Dec 13 14:20:53.390000 audit[2852]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000199c30 a2=78 a3=c000275c88 items=0 ppid=2634 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:20:53.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338616234366165356561363764356539623337633661383331653232 Dec 13 14:20:53.418961 env[1270]: time="2024-12-13T14:20:53.418929030Z" level=info msg="StartContainer for \"c8ab46ae5ea67d5e9b37c6a831e22dfdbf650b07811d0b48c4b185e232845aaa\" returns successfully" Dec 13 14:20:54.354308 systemd[1]: run-containerd-runc-k8s.io-c8ab46ae5ea67d5e9b37c6a831e22dfdbf650b07811d0b48c4b185e232845aaa-runc.r0u9iW.mount: Deactivated successfully. Dec 13 14:20:54.553836 env[1270]: time="2024-12-13T14:20:54.553796910Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:20:54.556543 systemd[1]: cri-containerd-c8ab46ae5ea67d5e9b37c6a831e22dfdbf650b07811d0b48c4b185e232845aaa.scope: Deactivated successfully. Dec 13 14:20:54.557000 audit: BPF prog-id=132 op=UNLOAD Dec 13 14:20:54.568416 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c8ab46ae5ea67d5e9b37c6a831e22dfdbf650b07811d0b48c4b185e232845aaa-rootfs.mount: Deactivated successfully. Dec 13 14:20:54.639975 kubelet[2196]: I1213 14:20:54.613600 2196 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 14:20:54.641876 env[1270]: time="2024-12-13T14:20:54.641813843Z" level=info msg="shim disconnected" id=c8ab46ae5ea67d5e9b37c6a831e22dfdbf650b07811d0b48c4b185e232845aaa Dec 13 14:20:54.641928 env[1270]: time="2024-12-13T14:20:54.641876342Z" level=warning msg="cleaning up after shim disconnected" id=c8ab46ae5ea67d5e9b37c6a831e22dfdbf650b07811d0b48c4b185e232845aaa namespace=k8s.io Dec 13 14:20:54.641928 env[1270]: time="2024-12-13T14:20:54.641883019Z" level=info msg="cleaning up dead shim" Dec 13 14:20:54.647182 env[1270]: time="2024-12-13T14:20:54.647151352Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:20:54Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2888 runtime=io.containerd.runc.v2\n" Dec 13 14:20:54.653882 kubelet[2196]: I1213 14:20:54.653657 2196 topology_manager.go:215] "Topology Admit Handler" podUID="ad4098cd-e162-4f9f-8435-adb35d1aa4c7" podNamespace="kube-system" podName="coredns-7db6d8ff4d-bgsrp" Dec 13 14:20:54.660000 kubelet[2196]: I1213 14:20:54.659982 2196 topology_manager.go:215] "Topology Admit Handler" podUID="dfda6d2b-ae63-4f45-abb5-6eb95ae8af85" podNamespace="kube-system" podName="coredns-7db6d8ff4d-8pvb8" Dec 13 14:20:54.662052 systemd[1]: Created slice kubepods-burstable-podad4098cd_e162_4f9f_8435_adb35d1aa4c7.slice. Dec 13 14:20:54.664342 kubelet[2196]: I1213 14:20:54.664081 2196 topology_manager.go:215] "Topology Admit Handler" podUID="c3c31618-9087-40ec-ac13-e264b487ba1e" podNamespace="calico-system" podName="calico-kube-controllers-5948cc9557-vwt48" Dec 13 14:20:54.664342 kubelet[2196]: I1213 14:20:54.664165 2196 topology_manager.go:215] "Topology Admit Handler" podUID="84d16462-4f19-45fc-87e0-9537b5b2290a" podNamespace="calico-apiserver" podName="calico-apiserver-c756dccf-qwttr" Dec 13 14:20:54.667292 systemd[1]: Created slice kubepods-burstable-poddfda6d2b_ae63_4f45_abb5_6eb95ae8af85.slice. Dec 13 14:20:54.669250 kubelet[2196]: I1213 14:20:54.669205 2196 topology_manager.go:215] "Topology Admit Handler" podUID="b00a720b-3e05-45c2-b017-4b0afa94be32" podNamespace="calico-apiserver" podName="calico-apiserver-c756dccf-h6pbq" Dec 13 14:20:54.671979 systemd[1]: Created slice kubepods-besteffort-pod84d16462_4f19_45fc_87e0_9537b5b2290a.slice. Dec 13 14:20:54.676244 systemd[1]: Created slice kubepods-besteffort-podc3c31618_9087_40ec_ac13_e264b487ba1e.slice. Dec 13 14:20:54.682165 systemd[1]: Created slice kubepods-besteffort-podb00a720b_3e05_45c2_b017_4b0afa94be32.slice. Dec 13 14:20:54.743518 kubelet[2196]: I1213 14:20:54.743490 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/ad4098cd-e162-4f9f-8435-adb35d1aa4c7-config-volume\") pod \"coredns-7db6d8ff4d-bgsrp\" (UID: \"ad4098cd-e162-4f9f-8435-adb35d1aa4c7\") " pod="kube-system/coredns-7db6d8ff4d-bgsrp" Dec 13 14:20:54.743518 kubelet[2196]: I1213 14:20:54.743521 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/dfda6d2b-ae63-4f45-abb5-6eb95ae8af85-config-volume\") pod \"coredns-7db6d8ff4d-8pvb8\" (UID: \"dfda6d2b-ae63-4f45-abb5-6eb95ae8af85\") " pod="kube-system/coredns-7db6d8ff4d-8pvb8" Dec 13 14:20:54.743658 kubelet[2196]: I1213 14:20:54.743534 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c3c31618-9087-40ec-ac13-e264b487ba1e-tigera-ca-bundle\") pod \"calico-kube-controllers-5948cc9557-vwt48\" (UID: \"c3c31618-9087-40ec-ac13-e264b487ba1e\") " pod="calico-system/calico-kube-controllers-5948cc9557-vwt48" Dec 13 14:20:54.743658 kubelet[2196]: I1213 14:20:54.743545 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wjhwp\" (UniqueName: \"kubernetes.io/projected/ad4098cd-e162-4f9f-8435-adb35d1aa4c7-kube-api-access-wjhwp\") pod \"coredns-7db6d8ff4d-bgsrp\" (UID: \"ad4098cd-e162-4f9f-8435-adb35d1aa4c7\") " pod="kube-system/coredns-7db6d8ff4d-bgsrp" Dec 13 14:20:54.743658 kubelet[2196]: I1213 14:20:54.743554 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/b00a720b-3e05-45c2-b017-4b0afa94be32-calico-apiserver-certs\") pod \"calico-apiserver-c756dccf-h6pbq\" (UID: \"b00a720b-3e05-45c2-b017-4b0afa94be32\") " pod="calico-apiserver/calico-apiserver-c756dccf-h6pbq" Dec 13 14:20:54.743658 kubelet[2196]: I1213 14:20:54.743564 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qp76z\" (UniqueName: \"kubernetes.io/projected/b00a720b-3e05-45c2-b017-4b0afa94be32-kube-api-access-qp76z\") pod \"calico-apiserver-c756dccf-h6pbq\" (UID: \"b00a720b-3e05-45c2-b017-4b0afa94be32\") " pod="calico-apiserver/calico-apiserver-c756dccf-h6pbq" Dec 13 14:20:54.743658 kubelet[2196]: I1213 14:20:54.743578 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zvm8m\" (UniqueName: \"kubernetes.io/projected/dfda6d2b-ae63-4f45-abb5-6eb95ae8af85-kube-api-access-zvm8m\") pod \"coredns-7db6d8ff4d-8pvb8\" (UID: \"dfda6d2b-ae63-4f45-abb5-6eb95ae8af85\") " pod="kube-system/coredns-7db6d8ff4d-8pvb8" Dec 13 14:20:54.743971 kubelet[2196]: I1213 14:20:54.743588 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lxmsl\" (UniqueName: \"kubernetes.io/projected/c3c31618-9087-40ec-ac13-e264b487ba1e-kube-api-access-lxmsl\") pod \"calico-kube-controllers-5948cc9557-vwt48\" (UID: \"c3c31618-9087-40ec-ac13-e264b487ba1e\") " pod="calico-system/calico-kube-controllers-5948cc9557-vwt48" Dec 13 14:20:54.743971 kubelet[2196]: I1213 14:20:54.743598 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cn7gl\" (UniqueName: \"kubernetes.io/projected/84d16462-4f19-45fc-87e0-9537b5b2290a-kube-api-access-cn7gl\") pod \"calico-apiserver-c756dccf-qwttr\" (UID: \"84d16462-4f19-45fc-87e0-9537b5b2290a\") " pod="calico-apiserver/calico-apiserver-c756dccf-qwttr" Dec 13 14:20:54.743971 kubelet[2196]: I1213 14:20:54.743609 2196 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/84d16462-4f19-45fc-87e0-9537b5b2290a-calico-apiserver-certs\") pod \"calico-apiserver-c756dccf-qwttr\" (UID: \"84d16462-4f19-45fc-87e0-9537b5b2290a\") " pod="calico-apiserver/calico-apiserver-c756dccf-qwttr" Dec 13 14:20:54.825572 systemd[1]: Created slice kubepods-besteffort-podea4acfc8_bc78_49a6_862f_fde7fb7796eb.slice. Dec 13 14:20:54.827029 env[1270]: time="2024-12-13T14:20:54.827008272Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-l59ps,Uid:ea4acfc8-bc78-49a6-862f-fde7fb7796eb,Namespace:calico-system,Attempt:0,}" Dec 13 14:20:54.912703 env[1270]: time="2024-12-13T14:20:54.911850214Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:20:54.965155 env[1270]: time="2024-12-13T14:20:54.965133303Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-bgsrp,Uid:ad4098cd-e162-4f9f-8435-adb35d1aa4c7,Namespace:kube-system,Attempt:0,}" Dec 13 14:20:54.971103 env[1270]: time="2024-12-13T14:20:54.971075049Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-8pvb8,Uid:dfda6d2b-ae63-4f45-abb5-6eb95ae8af85,Namespace:kube-system,Attempt:0,}" Dec 13 14:20:54.973841 env[1270]: time="2024-12-13T14:20:54.973820829Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c756dccf-qwttr,Uid:84d16462-4f19-45fc-87e0-9537b5b2290a,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:20:54.980071 env[1270]: time="2024-12-13T14:20:54.980043781Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5948cc9557-vwt48,Uid:c3c31618-9087-40ec-ac13-e264b487ba1e,Namespace:calico-system,Attempt:0,}" Dec 13 14:20:54.989274 env[1270]: time="2024-12-13T14:20:54.989246559Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c756dccf-h6pbq,Uid:b00a720b-3e05-45c2-b017-4b0afa94be32,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:20:55.103670 env[1270]: time="2024-12-13T14:20:55.103626982Z" level=error msg="Failed to destroy network for sandbox \"cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:20:55.104030 env[1270]: time="2024-12-13T14:20:55.104009984Z" level=error msg="encountered an error cleaning up failed sandbox \"cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:20:55.104114 env[1270]: time="2024-12-13T14:20:55.104097177Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-bgsrp,Uid:ad4098cd-e162-4f9f-8435-adb35d1aa4c7,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:20:55.108498 env[1270]: time="2024-12-13T14:20:55.108441270Z" level=error msg="Failed to destroy network for sandbox \"120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:20:55.108707 env[1270]: time="2024-12-13T14:20:55.108687805Z" level=error msg="encountered an error cleaning up failed sandbox \"120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:20:55.108756 env[1270]: time="2024-12-13T14:20:55.108721002Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c756dccf-qwttr,Uid:84d16462-4f19-45fc-87e0-9537b5b2290a,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:20:55.109953 env[1270]: time="2024-12-13T14:20:55.109935586Z" level=error msg="Failed to destroy network for sandbox \"444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:20:55.110207 env[1270]: time="2024-12-13T14:20:55.110191700Z" level=error msg="encountered an error cleaning up failed sandbox \"444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:20:55.110280 env[1270]: time="2024-12-13T14:20:55.110264786Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-l59ps,Uid:ea4acfc8-bc78-49a6-862f-fde7fb7796eb,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:20:55.122010 kubelet[2196]: E1213 14:20:55.104322 2196 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:20:55.122010 kubelet[2196]: E1213 14:20:55.121885 2196 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-bgsrp" Dec 13 14:20:55.122010 kubelet[2196]: E1213 14:20:55.121885 2196 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:20:55.122010 kubelet[2196]: E1213 14:20:55.121903 2196 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-bgsrp" Dec 13 14:20:55.122172 kubelet[2196]: E1213 14:20:55.121910 2196 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-l59ps" Dec 13 14:20:55.122172 kubelet[2196]: E1213 14:20:55.121922 2196 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-l59ps" Dec 13 14:20:55.122172 kubelet[2196]: E1213 14:20:55.121934 2196 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-bgsrp_kube-system(ad4098cd-e162-4f9f-8435-adb35d1aa4c7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-bgsrp_kube-system(ad4098cd-e162-4f9f-8435-adb35d1aa4c7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-bgsrp" podUID="ad4098cd-e162-4f9f-8435-adb35d1aa4c7" Dec 13 14:20:55.122260 kubelet[2196]: E1213 14:20:55.121940 2196 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-l59ps_calico-system(ea4acfc8-bc78-49a6-862f-fde7fb7796eb)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-l59ps_calico-system(ea4acfc8-bc78-49a6-862f-fde7fb7796eb)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-l59ps" podUID="ea4acfc8-bc78-49a6-862f-fde7fb7796eb" Dec 13 14:20:55.122260 kubelet[2196]: E1213 14:20:55.108825 2196 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:20:55.122260 kubelet[2196]: E1213 14:20:55.121966 2196 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-c756dccf-qwttr" Dec 13 14:20:55.122339 kubelet[2196]: E1213 14:20:55.121976 2196 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-c756dccf-qwttr" Dec 13 14:20:55.122339 kubelet[2196]: E1213 14:20:55.121988 2196 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-c756dccf-qwttr_calico-apiserver(84d16462-4f19-45fc-87e0-9537b5b2290a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-c756dccf-qwttr_calico-apiserver(84d16462-4f19-45fc-87e0-9537b5b2290a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-c756dccf-qwttr" podUID="84d16462-4f19-45fc-87e0-9537b5b2290a" Dec 13 14:20:55.124628 env[1270]: time="2024-12-13T14:20:55.124595900Z" level=error msg="Failed to destroy network for sandbox \"a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:20:55.124903 env[1270]: time="2024-12-13T14:20:55.124886763Z" level=error msg="encountered an error cleaning up failed sandbox \"a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:20:55.124982 env[1270]: time="2024-12-13T14:20:55.124958906Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-8pvb8,Uid:dfda6d2b-ae63-4f45-abb5-6eb95ae8af85,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:20:55.125191 kubelet[2196]: E1213 14:20:55.125113 2196 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:20:55.125191 kubelet[2196]: E1213 14:20:55.125137 2196 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-8pvb8" Dec 13 14:20:55.125191 kubelet[2196]: E1213 14:20:55.125150 2196 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-8pvb8" Dec 13 14:20:55.125273 kubelet[2196]: E1213 14:20:55.125169 2196 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-8pvb8_kube-system(dfda6d2b-ae63-4f45-abb5-6eb95ae8af85)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-8pvb8_kube-system(dfda6d2b-ae63-4f45-abb5-6eb95ae8af85)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-8pvb8" podUID="dfda6d2b-ae63-4f45-abb5-6eb95ae8af85" Dec 13 14:20:55.127958 env[1270]: time="2024-12-13T14:20:55.127933982Z" level=error msg="Failed to destroy network for sandbox \"6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:20:55.128222 env[1270]: time="2024-12-13T14:20:55.128194416Z" level=error msg="encountered an error cleaning up failed sandbox \"6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:20:55.128297 env[1270]: time="2024-12-13T14:20:55.128280329Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c756dccf-h6pbq,Uid:b00a720b-3e05-45c2-b017-4b0afa94be32,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:20:55.128564 kubelet[2196]: E1213 14:20:55.128454 2196 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:20:55.128564 kubelet[2196]: E1213 14:20:55.128493 2196 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-c756dccf-h6pbq" Dec 13 14:20:55.128564 kubelet[2196]: E1213 14:20:55.128504 2196 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-c756dccf-h6pbq" Dec 13 14:20:55.136963 kubelet[2196]: E1213 14:20:55.128536 2196 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-c756dccf-h6pbq_calico-apiserver(b00a720b-3e05-45c2-b017-4b0afa94be32)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-c756dccf-h6pbq_calico-apiserver(b00a720b-3e05-45c2-b017-4b0afa94be32)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-c756dccf-h6pbq" podUID="b00a720b-3e05-45c2-b017-4b0afa94be32" Dec 13 14:20:55.136963 kubelet[2196]: E1213 14:20:55.134308 2196 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:20:55.136963 kubelet[2196]: E1213 14:20:55.134410 2196 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5948cc9557-vwt48" Dec 13 14:20:55.137091 env[1270]: time="2024-12-13T14:20:55.132871461Z" level=error msg="Failed to destroy network for sandbox \"97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:20:55.137091 env[1270]: time="2024-12-13T14:20:55.133757157Z" level=error msg="encountered an error cleaning up failed sandbox \"97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:20:55.137091 env[1270]: time="2024-12-13T14:20:55.133791347Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5948cc9557-vwt48,Uid:c3c31618-9087-40ec-ac13-e264b487ba1e,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:20:55.146742 kubelet[2196]: E1213 14:20:55.134431 2196 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5948cc9557-vwt48" Dec 13 14:20:55.146742 kubelet[2196]: E1213 14:20:55.134475 2196 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-5948cc9557-vwt48_calico-system(c3c31618-9087-40ec-ac13-e264b487ba1e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-5948cc9557-vwt48_calico-system(c3c31618-9087-40ec-ac13-e264b487ba1e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5948cc9557-vwt48" podUID="c3c31618-9087-40ec-ac13-e264b487ba1e" Dec 13 14:20:55.360072 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b-shm.mount: Deactivated successfully. Dec 13 14:20:55.911359 kubelet[2196]: I1213 14:20:55.911335 2196 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" Dec 13 14:20:55.912728 kubelet[2196]: I1213 14:20:55.912705 2196 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" Dec 13 14:20:55.914377 kubelet[2196]: I1213 14:20:55.914190 2196 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" Dec 13 14:20:55.914925 kubelet[2196]: I1213 14:20:55.914916 2196 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" Dec 13 14:20:55.915718 kubelet[2196]: I1213 14:20:55.915708 2196 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" Dec 13 14:20:55.916389 kubelet[2196]: I1213 14:20:55.916380 2196 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" Dec 13 14:20:55.925283 env[1270]: time="2024-12-13T14:20:55.925255477Z" level=info msg="StopPodSandbox for \"6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72\"" Dec 13 14:20:55.925805 env[1270]: time="2024-12-13T14:20:55.925787965Z" level=info msg="StopPodSandbox for \"cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15\"" Dec 13 14:20:55.926052 env[1270]: time="2024-12-13T14:20:55.926040151Z" level=info msg="StopPodSandbox for \"120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb\"" Dec 13 14:20:55.926286 env[1270]: time="2024-12-13T14:20:55.926275157Z" level=info msg="StopPodSandbox for \"97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80\"" Dec 13 14:20:55.926457 env[1270]: time="2024-12-13T14:20:55.926435448Z" level=info msg="StopPodSandbox for \"444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b\"" Dec 13 14:20:55.926805 env[1270]: time="2024-12-13T14:20:55.926781959Z" level=info msg="StopPodSandbox for \"a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d\"" Dec 13 14:20:55.961599 env[1270]: time="2024-12-13T14:20:55.961566272Z" level=error msg="StopPodSandbox for \"120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb\" failed" error="failed to destroy network for sandbox \"120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:20:55.962178 kubelet[2196]: E1213 14:20:55.961816 2196 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" Dec 13 14:20:55.962178 kubelet[2196]: E1213 14:20:55.962021 2196 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb"} Dec 13 14:20:55.962178 kubelet[2196]: E1213 14:20:55.962064 2196 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"84d16462-4f19-45fc-87e0-9537b5b2290a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:20:55.962178 kubelet[2196]: E1213 14:20:55.962102 2196 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"84d16462-4f19-45fc-87e0-9537b5b2290a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-c756dccf-qwttr" podUID="84d16462-4f19-45fc-87e0-9537b5b2290a" Dec 13 14:20:55.975285 env[1270]: time="2024-12-13T14:20:55.975247399Z" level=error msg="StopPodSandbox for \"97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80\" failed" error="failed to destroy network for sandbox \"97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:20:55.975642 kubelet[2196]: E1213 14:20:55.975525 2196 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" Dec 13 14:20:55.975642 kubelet[2196]: E1213 14:20:55.975568 2196 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80"} Dec 13 14:20:55.975642 kubelet[2196]: E1213 14:20:55.975592 2196 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c3c31618-9087-40ec-ac13-e264b487ba1e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:20:55.975642 kubelet[2196]: E1213 14:20:55.975607 2196 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c3c31618-9087-40ec-ac13-e264b487ba1e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5948cc9557-vwt48" podUID="c3c31618-9087-40ec-ac13-e264b487ba1e" Dec 13 14:20:55.976224 kubelet[2196]: E1213 14:20:55.975936 2196 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" Dec 13 14:20:55.976224 kubelet[2196]: E1213 14:20:55.975954 2196 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72"} Dec 13 14:20:55.976224 kubelet[2196]: E1213 14:20:55.975982 2196 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b00a720b-3e05-45c2-b017-4b0afa94be32\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:20:55.976224 kubelet[2196]: E1213 14:20:55.975995 2196 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b00a720b-3e05-45c2-b017-4b0afa94be32\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-c756dccf-h6pbq" podUID="b00a720b-3e05-45c2-b017-4b0afa94be32" Dec 13 14:20:55.976345 env[1270]: time="2024-12-13T14:20:55.975845189Z" level=error msg="StopPodSandbox for \"6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72\" failed" error="failed to destroy network for sandbox \"6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:20:55.989251 env[1270]: time="2024-12-13T14:20:55.989210048Z" level=error msg="StopPodSandbox for \"444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b\" failed" error="failed to destroy network for sandbox \"444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:20:55.989580 kubelet[2196]: E1213 14:20:55.989468 2196 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" Dec 13 14:20:55.989580 kubelet[2196]: E1213 14:20:55.989506 2196 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b"} Dec 13 14:20:55.989580 kubelet[2196]: E1213 14:20:55.989541 2196 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ea4acfc8-bc78-49a6-862f-fde7fb7796eb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:20:55.989580 kubelet[2196]: E1213 14:20:55.989561 2196 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ea4acfc8-bc78-49a6-862f-fde7fb7796eb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-l59ps" podUID="ea4acfc8-bc78-49a6-862f-fde7fb7796eb" Dec 13 14:20:55.990083 env[1270]: time="2024-12-13T14:20:55.990045317Z" level=error msg="StopPodSandbox for \"cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15\" failed" error="failed to destroy network for sandbox \"cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:20:55.990248 kubelet[2196]: E1213 14:20:55.990227 2196 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" Dec 13 14:20:55.990294 kubelet[2196]: E1213 14:20:55.990250 2196 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15"} Dec 13 14:20:55.990294 kubelet[2196]: E1213 14:20:55.990268 2196 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ad4098cd-e162-4f9f-8435-adb35d1aa4c7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:20:55.990717 kubelet[2196]: E1213 14:20:55.990290 2196 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ad4098cd-e162-4f9f-8435-adb35d1aa4c7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-bgsrp" podUID="ad4098cd-e162-4f9f-8435-adb35d1aa4c7" Dec 13 14:20:55.991994 env[1270]: time="2024-12-13T14:20:55.991966240Z" level=error msg="StopPodSandbox for \"a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d\" failed" error="failed to destroy network for sandbox \"a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:20:55.992330 kubelet[2196]: E1213 14:20:55.992234 2196 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" Dec 13 14:20:55.992330 kubelet[2196]: E1213 14:20:55.992262 2196 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d"} Dec 13 14:20:55.992330 kubelet[2196]: E1213 14:20:55.992282 2196 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"dfda6d2b-ae63-4f45-abb5-6eb95ae8af85\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:20:55.992330 kubelet[2196]: E1213 14:20:55.992313 2196 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"dfda6d2b-ae63-4f45-abb5-6eb95ae8af85\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-8pvb8" podUID="dfda6d2b-ae63-4f45-abb5-6eb95ae8af85" Dec 13 14:21:00.453226 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4228737868.mount: Deactivated successfully. Dec 13 14:21:00.494178 env[1270]: time="2024-12-13T14:21:00.494133455Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:00.495878 env[1270]: time="2024-12-13T14:21:00.495859492Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:00.496730 env[1270]: time="2024-12-13T14:21:00.496717672Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:00.498476 env[1270]: time="2024-12-13T14:21:00.498463432Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:00.498696 env[1270]: time="2024-12-13T14:21:00.498675369Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 14:21:00.515614 env[1270]: time="2024-12-13T14:21:00.515585525Z" level=info msg="CreateContainer within sandbox \"cfdd1f12ec9dd891f9a6bd409e83f7f58429b30446fcd76df4b6333ac8136419\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:21:00.527035 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2224517333.mount: Deactivated successfully. Dec 13 14:21:00.532537 env[1270]: time="2024-12-13T14:21:00.532514184Z" level=info msg="CreateContainer within sandbox \"cfdd1f12ec9dd891f9a6bd409e83f7f58429b30446fcd76df4b6333ac8136419\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"5ccbdc925327601363e1ffcc509b8da46637121d645002c9e4ddd4466d783d3a\"" Dec 13 14:21:00.555110 env[1270]: time="2024-12-13T14:21:00.554586627Z" level=info msg="StartContainer for \"5ccbdc925327601363e1ffcc509b8da46637121d645002c9e4ddd4466d783d3a\"" Dec 13 14:21:00.571412 systemd[1]: Started cri-containerd-5ccbdc925327601363e1ffcc509b8da46637121d645002c9e4ddd4466d783d3a.scope. Dec 13 14:21:00.594540 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:21:00.600065 kernel: audit: type=1400 audit(1734099660.587:983): avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.600498 kernel: audit: type=1300 audit(1734099660.587:983): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f7f60535018 items=0 ppid=2634 pid=3231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:00.600530 kernel: audit: type=1327 audit(1734099660.587:983): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563636264633932353332373630313336336531666663633530396238 Dec 13 14:21:00.603183 kernel: audit: type=1400 audit(1734099660.588:984): avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.587000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.608018 kernel: audit: type=1400 audit(1734099660.588:984): avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.587000 audit[3231]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f7f60535018 items=0 ppid=2634 pid=3231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:00.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563636264633932353332373630313336336531666663633530396238 Dec 13 14:21:00.588000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.588000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.588000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.612460 kernel: audit: type=1400 audit(1734099660.588:984): avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.588000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.588000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.617570 kernel: audit: type=1400 audit(1734099660.588:984): avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.617598 kernel: audit: type=1400 audit(1734099660.588:984): avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.617617 env[1270]: time="2024-12-13T14:21:00.615714139Z" level=info msg="StartContainer for \"5ccbdc925327601363e1ffcc509b8da46637121d645002c9e4ddd4466d783d3a\" returns successfully" Dec 13 14:21:00.588000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.620823 kernel: audit: type=1400 audit(1734099660.588:984): avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.588000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.623623 kernel: audit: type=1400 audit(1734099660.588:984): avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.588000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.588000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.588000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.588000 audit: BPF prog-id=133 op=LOAD Dec 13 14:21:00.588000 audit[3231]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000388888 items=0 ppid=2634 pid=3231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:00.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563636264633932353332373630313336336531666663633530396238 Dec 13 14:21:00.594000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.594000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.594000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.594000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.594000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.594000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.594000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.594000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.594000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.594000 audit: BPF prog-id=134 op=LOAD Dec 13 14:21:00.594000 audit[3231]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003888d8 items=0 ppid=2634 pid=3231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:00.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563636264633932353332373630313336336531666663633530396238 Dec 13 14:21:00.594000 audit: BPF prog-id=134 op=UNLOAD Dec 13 14:21:00.594000 audit: BPF prog-id=133 op=UNLOAD Dec 13 14:21:00.594000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.594000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.594000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.594000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.594000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.594000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.594000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.594000 audit[3231]: AVC avc: denied { perfmon } for pid=3231 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.594000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.594000 audit[3231]: AVC avc: denied { bpf } for pid=3231 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:00.594000 audit: BPF prog-id=135 op=LOAD Dec 13 14:21:00.594000 audit[3231]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000388968 items=0 ppid=2634 pid=3231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:00.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563636264633932353332373630313336336531666663633530396238 Dec 13 14:21:01.117832 kubelet[2196]: I1213 14:21:01.100202 2196 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-rnmtl" podStartSLOduration=1.291542006 podStartE2EDuration="19.046172732s" podCreationTimestamp="2024-12-13 14:20:42 +0000 UTC" firstStartedPulling="2024-12-13 14:20:42.744777295 +0000 UTC m=+21.099797076" lastFinishedPulling="2024-12-13 14:21:00.499408022 +0000 UTC m=+38.854427802" observedRunningTime="2024-12-13 14:21:01.045106132 +0000 UTC m=+39.400125921" watchObservedRunningTime="2024-12-13 14:21:01.046172732 +0000 UTC m=+39.401192515" Dec 13 14:21:01.244264 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:21:01.244367 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:21:01.936606 systemd[1]: run-containerd-runc-k8s.io-5ccbdc925327601363e1ffcc509b8da46637121d645002c9e4ddd4466d783d3a-runc.hbvSlK.mount: Deactivated successfully. Dec 13 14:21:02.517000 audit[3391]: AVC avc: denied { write } for pid=3391 comm="tee" name="fd" dev="proc" ino=35635 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:21:02.517000 audit[3391]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe9e306a2e a2=241 a3=1b6 items=1 ppid=3352 pid=3391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.517000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:21:02.517000 audit: PATH item=0 name="/dev/fd/63" inode=35630 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:02.517000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:21:02.522000 audit[3404]: AVC avc: denied { write } for pid=3404 comm="tee" name="fd" dev="proc" ino=36192 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:21:02.522000 audit[3404]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff0b61ba1f a2=241 a3=1b6 items=1 ppid=3351 pid=3404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.522000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:21:02.522000 audit: PATH item=0 name="/dev/fd/63" inode=36187 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:02.522000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:21:02.551000 audit[3406]: AVC avc: denied { write } for pid=3406 comm="tee" name="fd" dev="proc" ino=36208 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:21:02.551000 audit[3389]: AVC avc: denied { write } for pid=3389 comm="tee" name="fd" dev="proc" ino=36209 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:21:02.551000 audit[3389]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff94de6a30 a2=241 a3=1b6 items=1 ppid=3354 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.551000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:21:02.551000 audit: PATH item=0 name="/dev/fd/63" inode=36185 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:02.551000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:21:02.551000 audit[3406]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc2cc12a2f a2=241 a3=1b6 items=1 ppid=3345 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.551000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:21:02.551000 audit: PATH item=0 name="/dev/fd/63" inode=36193 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:02.551000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:21:02.555000 audit[3415]: AVC avc: denied { write } for pid=3415 comm="tee" name="fd" dev="proc" ino=36214 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:21:02.555000 audit[3409]: AVC avc: denied { write } for pid=3409 comm="tee" name="fd" dev="proc" ino=36217 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:21:02.558000 audit[3417]: AVC avc: denied { write } for pid=3417 comm="tee" name="fd" dev="proc" ino=36220 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:21:02.555000 audit[3409]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff90708a2e a2=241 a3=1b6 items=1 ppid=3365 pid=3409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.555000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:21:02.555000 audit: PATH item=0 name="/dev/fd/63" inode=35639 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:02.555000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:21:02.555000 audit[3415]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd6c5aba1e a2=241 a3=1b6 items=1 ppid=3349 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.555000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:21:02.555000 audit: PATH item=0 name="/dev/fd/63" inode=36199 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:02.555000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:21:02.558000 audit[3417]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd57298a2e a2=241 a3=1b6 items=1 ppid=3346 pid=3417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.558000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:21:02.558000 audit: PATH item=0 name="/dev/fd/63" inode=36205 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:21:02.558000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:21:02.669000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.669000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.669000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.669000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.669000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.669000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.669000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.669000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.669000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.669000 audit: BPF prog-id=136 op=LOAD Dec 13 14:21:02.669000 audit[3451]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff7495c8b0 a2=98 a3=3 items=0 ppid=3358 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.669000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:21:02.669000 audit: BPF prog-id=136 op=UNLOAD Dec 13 14:21:02.671000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.671000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.671000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.671000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.671000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.671000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.671000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.671000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.671000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.671000 audit: BPF prog-id=137 op=LOAD Dec 13 14:21:02.671000 audit[3451]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff7495c690 a2=74 a3=540051 items=0 ppid=3358 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.671000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:21:02.671000 audit: BPF prog-id=137 op=UNLOAD Dec 13 14:21:02.671000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.671000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.671000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.671000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.671000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.671000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.671000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.671000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.671000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.671000 audit: BPF prog-id=138 op=LOAD Dec 13 14:21:02.671000 audit[3451]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff7495c6c0 a2=94 a3=2 items=0 ppid=3358 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.671000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:21:02.671000 audit: BPF prog-id=138 op=UNLOAD Dec 13 14:21:02.739000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.739000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.739000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.739000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.739000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.739000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.739000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.739000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.739000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.739000 audit: BPF prog-id=139 op=LOAD Dec 13 14:21:02.739000 audit[3451]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff7495c580 a2=40 a3=1 items=0 ppid=3358 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.739000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:21:02.739000 audit: BPF prog-id=139 op=UNLOAD Dec 13 14:21:02.739000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.739000 audit[3451]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff7495c650 a2=50 a3=7fff7495c730 items=0 ppid=3358 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.739000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:21:02.745000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.745000 audit[3451]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7495c590 a2=28 a3=0 items=0 ppid=3358 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.745000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7495c5c0 a2=28 a3=0 items=0 ppid=3358 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.746000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7495c4d0 a2=28 a3=0 items=0 ppid=3358 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.746000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7495c5e0 a2=28 a3=0 items=0 ppid=3358 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.746000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7495c5c0 a2=28 a3=0 items=0 ppid=3358 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.746000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7495c5b0 a2=28 a3=0 items=0 ppid=3358 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.746000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7495c5e0 a2=28 a3=0 items=0 ppid=3358 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.746000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7495c5c0 a2=28 a3=0 items=0 ppid=3358 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.746000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7495c5e0 a2=28 a3=0 items=0 ppid=3358 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.746000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff7495c5b0 a2=28 a3=0 items=0 ppid=3358 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.746000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff7495c620 a2=28 a3=0 items=0 ppid=3358 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.746000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff7495c3d0 a2=50 a3=1 items=0 ppid=3358 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.746000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit: BPF prog-id=140 op=LOAD Dec 13 14:21:02.746000 audit[3451]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff7495c3d0 a2=94 a3=5 items=0 ppid=3358 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.746000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:21:02.746000 audit: BPF prog-id=140 op=UNLOAD Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff7495c480 a2=50 a3=1 items=0 ppid=3358 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.746000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff7495c5a0 a2=4 a3=38 items=0 ppid=3358 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.746000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { confidentiality } for pid=3451 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:21:02.746000 audit[3451]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff7495c5f0 a2=94 a3=6 items=0 ppid=3358 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.746000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { confidentiality } for pid=3451 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:21:02.746000 audit[3451]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff7495bda0 a2=94 a3=83 items=0 ppid=3358 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.746000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { perfmon } for pid=3451 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { bpf } for pid=3451 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.746000 audit[3451]: AVC avc: denied { confidentiality } for pid=3451 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:21:02.746000 audit[3451]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff7495bda0 a2=94 a3=83 items=0 ppid=3358 pid=3451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.746000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:21:02.752000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.752000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.752000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.752000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.752000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.752000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.752000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.752000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.752000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.752000 audit: BPF prog-id=141 op=LOAD Dec 13 14:21:02.752000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffefec035d0 a2=98 a3=1999999999999999 items=0 ppid=3358 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.752000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:21:02.753000 audit: BPF prog-id=141 op=UNLOAD Dec 13 14:21:02.753000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.753000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.753000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.753000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.753000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.753000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.753000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.753000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.753000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.753000 audit: BPF prog-id=142 op=LOAD Dec 13 14:21:02.753000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffefec034b0 a2=74 a3=ffff items=0 ppid=3358 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.753000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:21:02.753000 audit: BPF prog-id=142 op=UNLOAD Dec 13 14:21:02.753000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.753000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.753000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.753000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.753000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.753000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.753000 audit[3458]: AVC avc: denied { perfmon } for pid=3458 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.753000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.753000 audit[3458]: AVC avc: denied { bpf } for pid=3458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.753000 audit: BPF prog-id=143 op=LOAD Dec 13 14:21:02.753000 audit[3458]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffefec034f0 a2=40 a3=7ffefec036d0 items=0 ppid=3358 pid=3458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.753000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:21:02.753000 audit: BPF prog-id=143 op=UNLOAD Dec 13 14:21:02.825738 systemd-networkd[1063]: vxlan.calico: Link UP Dec 13 14:21:02.825742 systemd-networkd[1063]: vxlan.calico: Gained carrier Dec 13 14:21:02.851000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.851000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.851000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.851000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.851000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.851000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.851000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.851000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.851000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.851000 audit: BPF prog-id=144 op=LOAD Dec 13 14:21:02.851000 audit[3487]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcdbfba9e0 a2=98 a3=ffffffff items=0 ppid=3358 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.851000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:21:02.851000 audit: BPF prog-id=144 op=UNLOAD Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit: BPF prog-id=145 op=LOAD Dec 13 14:21:02.852000 audit[3487]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcdbfba7f0 a2=74 a3=540051 items=0 ppid=3358 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:21:02.852000 audit: BPF prog-id=145 op=UNLOAD Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit: BPF prog-id=146 op=LOAD Dec 13 14:21:02.852000 audit[3487]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcdbfba820 a2=94 a3=2 items=0 ppid=3358 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:21:02.852000 audit: BPF prog-id=146 op=UNLOAD Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit[3487]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcdbfba6f0 a2=28 a3=0 items=0 ppid=3358 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit[3487]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcdbfba720 a2=28 a3=0 items=0 ppid=3358 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit[3487]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcdbfba630 a2=28 a3=0 items=0 ppid=3358 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit[3487]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcdbfba740 a2=28 a3=0 items=0 ppid=3358 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit[3487]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcdbfba720 a2=28 a3=0 items=0 ppid=3358 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit[3487]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcdbfba710 a2=28 a3=0 items=0 ppid=3358 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit[3487]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcdbfba740 a2=28 a3=0 items=0 ppid=3358 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit[3487]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcdbfba720 a2=28 a3=0 items=0 ppid=3358 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit[3487]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcdbfba740 a2=28 a3=0 items=0 ppid=3358 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit[3487]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcdbfba710 a2=28 a3=0 items=0 ppid=3358 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit[3487]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcdbfba780 a2=28 a3=0 items=0 ppid=3358 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.852000 audit: BPF prog-id=147 op=LOAD Dec 13 14:21:02.852000 audit[3487]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcdbfba5f0 a2=40 a3=0 items=0 ppid=3358 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:21:02.852000 audit: BPF prog-id=147 op=UNLOAD Dec 13 14:21:02.854000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.854000 audit[3487]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffcdbfba5e0 a2=50 a3=2800 items=0 ppid=3358 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.854000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:21:02.854000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.854000 audit[3487]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffcdbfba5e0 a2=50 a3=2800 items=0 ppid=3358 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.854000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:21:02.854000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.854000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.854000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.854000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.854000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.854000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.854000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.854000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.854000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.854000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.854000 audit: BPF prog-id=148 op=LOAD Dec 13 14:21:02.854000 audit[3487]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcdbfb9e00 a2=94 a3=2 items=0 ppid=3358 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.854000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:21:02.854000 audit: BPF prog-id=148 op=UNLOAD Dec 13 14:21:02.854000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.854000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.854000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.854000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.854000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.854000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.854000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.854000 audit[3487]: AVC avc: denied { perfmon } for pid=3487 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.854000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.854000 audit[3487]: AVC avc: denied { bpf } for pid=3487 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.854000 audit: BPF prog-id=149 op=LOAD Dec 13 14:21:02.854000 audit[3487]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcdbfb9f00 a2=94 a3=2d items=0 ppid=3358 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.854000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:21:02.878000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.878000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.878000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.878000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.878000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.878000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.878000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.878000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.878000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.878000 audit: BPF prog-id=150 op=LOAD Dec 13 14:21:02.878000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffebc2ba870 a2=98 a3=0 items=0 ppid=3358 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.878000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:21:02.878000 audit: BPF prog-id=150 op=UNLOAD Dec 13 14:21:02.878000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.878000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.878000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.878000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.878000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.878000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.878000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.878000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.878000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.878000 audit: BPF prog-id=151 op=LOAD Dec 13 14:21:02.878000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffebc2ba650 a2=74 a3=540051 items=0 ppid=3358 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.878000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:21:02.878000 audit: BPF prog-id=151 op=UNLOAD Dec 13 14:21:02.878000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.878000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.878000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.878000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.878000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.878000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.878000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.878000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.878000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.878000 audit: BPF prog-id=152 op=LOAD Dec 13 14:21:02.878000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffebc2ba680 a2=94 a3=2 items=0 ppid=3358 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.878000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:21:02.878000 audit: BPF prog-id=152 op=UNLOAD Dec 13 14:21:02.980000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.980000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.980000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.980000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.980000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.980000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.980000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.980000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.980000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.980000 audit: BPF prog-id=153 op=LOAD Dec 13 14:21:02.980000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffebc2ba540 a2=40 a3=1 items=0 ppid=3358 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.980000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:21:02.980000 audit: BPF prog-id=153 op=UNLOAD Dec 13 14:21:02.980000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.980000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffebc2ba610 a2=50 a3=7ffebc2ba6f0 items=0 ppid=3358 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.980000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffebc2ba550 a2=28 a3=0 items=0 ppid=3358 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.987000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffebc2ba580 a2=28 a3=0 items=0 ppid=3358 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.987000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffebc2ba490 a2=28 a3=0 items=0 ppid=3358 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.987000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffebc2ba5a0 a2=28 a3=0 items=0 ppid=3358 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.987000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffebc2ba580 a2=28 a3=0 items=0 ppid=3358 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.987000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffebc2ba570 a2=28 a3=0 items=0 ppid=3358 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.987000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffebc2ba5a0 a2=28 a3=0 items=0 ppid=3358 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.987000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffebc2ba580 a2=28 a3=0 items=0 ppid=3358 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.987000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffebc2ba5a0 a2=28 a3=0 items=0 ppid=3358 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.987000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffebc2ba570 a2=28 a3=0 items=0 ppid=3358 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.987000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffebc2ba5e0 a2=28 a3=0 items=0 ppid=3358 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.987000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffebc2ba390 a2=50 a3=1 items=0 ppid=3358 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.987000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit: BPF prog-id=154 op=LOAD Dec 13 14:21:02.987000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffebc2ba390 a2=94 a3=5 items=0 ppid=3358 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.987000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:21:02.987000 audit: BPF prog-id=154 op=UNLOAD Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffebc2ba440 a2=50 a3=1 items=0 ppid=3358 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.987000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffebc2ba560 a2=4 a3=38 items=0 ppid=3358 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.987000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { confidentiality } for pid=3501 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:21:02.987000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffebc2ba5b0 a2=94 a3=6 items=0 ppid=3358 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.987000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { confidentiality } for pid=3501 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:21:02.987000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffebc2b9d60 a2=94 a3=83 items=0 ppid=3358 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.987000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { perfmon } for pid=3501 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.987000 audit[3501]: AVC avc: denied { confidentiality } for pid=3501 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:21:02.987000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffebc2b9d60 a2=94 a3=83 items=0 ppid=3358 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.987000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:21:02.988000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.988000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffebc2bb7a0 a2=10 a3=f1f00800 items=0 ppid=3358 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.988000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:21:02.988000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.988000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffebc2bb640 a2=10 a3=3 items=0 ppid=3358 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.988000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:21:02.988000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.988000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffebc2bb5e0 a2=10 a3=3 items=0 ppid=3358 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.988000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:21:02.988000 audit[3501]: AVC avc: denied { bpf } for pid=3501 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:02.988000 audit[3501]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffebc2bb5e0 a2=10 a3=7 items=0 ppid=3358 pid=3501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:02.988000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:21:02.994000 audit: BPF prog-id=149 op=UNLOAD Dec 13 14:21:03.043000 audit[3542]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3542 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:21:03.043000 audit[3542]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fffc4b14870 a2=0 a3=7fffc4b1485c items=0 ppid=3358 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:03.043000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:21:03.049000 audit[3545]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=3545 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:21:03.049000 audit[3545]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffe3688a600 a2=0 a3=7ffe3688a5ec items=0 ppid=3358 pid=3545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:03.049000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:21:03.051000 audit[3544]: NETFILTER_CFG table=filter:99 family=2 entries=39 op=nft_register_chain pid=3544 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:21:03.051000 audit[3544]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffd03830170 a2=0 a3=7ffd0383015c items=0 ppid=3358 pid=3544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:03.051000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:21:03.054000 audit[3543]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=3543 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:21:03.054000 audit[3543]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fffa2556a20 a2=0 a3=7fffa2556a0c items=0 ppid=3358 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:03.054000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:21:04.631641 systemd-networkd[1063]: vxlan.calico: Gained IPv6LL Dec 13 14:21:06.823238 env[1270]: time="2024-12-13T14:21:06.823206422Z" level=info msg="StopPodSandbox for \"120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb\"" Dec 13 14:21:07.108892 env[1270]: 2024-12-13 14:21:06.875 [INFO][3570] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" Dec 13 14:21:07.108892 env[1270]: 2024-12-13 14:21:06.875 [INFO][3570] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" iface="eth0" netns="/var/run/netns/cni-75acf298-3af0-3582-7963-565cb1b10866" Dec 13 14:21:07.108892 env[1270]: 2024-12-13 14:21:06.875 [INFO][3570] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" iface="eth0" netns="/var/run/netns/cni-75acf298-3af0-3582-7963-565cb1b10866" Dec 13 14:21:07.108892 env[1270]: 2024-12-13 14:21:06.877 [INFO][3570] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" iface="eth0" netns="/var/run/netns/cni-75acf298-3af0-3582-7963-565cb1b10866" Dec 13 14:21:07.108892 env[1270]: 2024-12-13 14:21:06.877 [INFO][3570] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" Dec 13 14:21:07.108892 env[1270]: 2024-12-13 14:21:06.877 [INFO][3570] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" Dec 13 14:21:07.108892 env[1270]: 2024-12-13 14:21:07.083 [INFO][3576] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" HandleID="k8s-pod-network.120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" Workload="localhost-k8s-calico--apiserver--c756dccf--qwttr-eth0" Dec 13 14:21:07.108892 env[1270]: 2024-12-13 14:21:07.086 [INFO][3576] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:21:07.108892 env[1270]: 2024-12-13 14:21:07.087 [INFO][3576] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:21:07.108892 env[1270]: 2024-12-13 14:21:07.105 [WARNING][3576] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" HandleID="k8s-pod-network.120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" Workload="localhost-k8s-calico--apiserver--c756dccf--qwttr-eth0" Dec 13 14:21:07.108892 env[1270]: 2024-12-13 14:21:07.105 [INFO][3576] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" HandleID="k8s-pod-network.120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" Workload="localhost-k8s-calico--apiserver--c756dccf--qwttr-eth0" Dec 13 14:21:07.108892 env[1270]: 2024-12-13 14:21:07.106 [INFO][3576] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:21:07.108892 env[1270]: 2024-12-13 14:21:07.107 [INFO][3570] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" Dec 13 14:21:07.110767 systemd[1]: run-netns-cni\x2d75acf298\x2d3af0\x2d3582\x2d7963\x2d565cb1b10866.mount: Deactivated successfully. Dec 13 14:21:07.111615 env[1270]: time="2024-12-13T14:21:07.111138359Z" level=info msg="TearDown network for sandbox \"120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb\" successfully" Dec 13 14:21:07.111615 env[1270]: time="2024-12-13T14:21:07.111160472Z" level=info msg="StopPodSandbox for \"120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb\" returns successfully" Dec 13 14:21:07.111814 env[1270]: time="2024-12-13T14:21:07.111799189Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c756dccf-qwttr,Uid:84d16462-4f19-45fc-87e0-9537b5b2290a,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:21:07.200860 systemd-networkd[1063]: calid05843ec86b: Link UP Dec 13 14:21:07.203066 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:21:07.203119 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid05843ec86b: link becomes ready Dec 13 14:21:07.203045 systemd-networkd[1063]: calid05843ec86b: Gained carrier Dec 13 14:21:07.214503 env[1270]: 2024-12-13 14:21:07.145 [INFO][3583] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--c756dccf--qwttr-eth0 calico-apiserver-c756dccf- calico-apiserver 84d16462-4f19-45fc-87e0-9537b5b2290a 787 0 2024-12-13 14:20:42 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:c756dccf projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-c756dccf-qwttr eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calid05843ec86b [] []}} ContainerID="e39611e7796ee42eadfb10d638eaf3e6ec8e8950835e601639543ee903a66409" Namespace="calico-apiserver" Pod="calico-apiserver-c756dccf-qwttr" WorkloadEndpoint="localhost-k8s-calico--apiserver--c756dccf--qwttr-" Dec 13 14:21:07.214503 env[1270]: 2024-12-13 14:21:07.146 [INFO][3583] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="e39611e7796ee42eadfb10d638eaf3e6ec8e8950835e601639543ee903a66409" Namespace="calico-apiserver" Pod="calico-apiserver-c756dccf-qwttr" WorkloadEndpoint="localhost-k8s-calico--apiserver--c756dccf--qwttr-eth0" Dec 13 14:21:07.214503 env[1270]: 2024-12-13 14:21:07.167 [INFO][3595] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e39611e7796ee42eadfb10d638eaf3e6ec8e8950835e601639543ee903a66409" HandleID="k8s-pod-network.e39611e7796ee42eadfb10d638eaf3e6ec8e8950835e601639543ee903a66409" Workload="localhost-k8s-calico--apiserver--c756dccf--qwttr-eth0" Dec 13 14:21:07.214503 env[1270]: 2024-12-13 14:21:07.177 [INFO][3595] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e39611e7796ee42eadfb10d638eaf3e6ec8e8950835e601639543ee903a66409" HandleID="k8s-pod-network.e39611e7796ee42eadfb10d638eaf3e6ec8e8950835e601639543ee903a66409" Workload="localhost-k8s-calico--apiserver--c756dccf--qwttr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000319140), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-c756dccf-qwttr", "timestamp":"2024-12-13 14:21:07.167893598 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:21:07.214503 env[1270]: 2024-12-13 14:21:07.177 [INFO][3595] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:21:07.214503 env[1270]: 2024-12-13 14:21:07.177 [INFO][3595] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:21:07.214503 env[1270]: 2024-12-13 14:21:07.177 [INFO][3595] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:21:07.214503 env[1270]: 2024-12-13 14:21:07.179 [INFO][3595] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e39611e7796ee42eadfb10d638eaf3e6ec8e8950835e601639543ee903a66409" host="localhost" Dec 13 14:21:07.214503 env[1270]: 2024-12-13 14:21:07.184 [INFO][3595] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:21:07.214503 env[1270]: 2024-12-13 14:21:07.186 [INFO][3595] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:21:07.214503 env[1270]: 2024-12-13 14:21:07.187 [INFO][3595] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:21:07.214503 env[1270]: 2024-12-13 14:21:07.188 [INFO][3595] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:21:07.214503 env[1270]: 2024-12-13 14:21:07.188 [INFO][3595] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.e39611e7796ee42eadfb10d638eaf3e6ec8e8950835e601639543ee903a66409" host="localhost" Dec 13 14:21:07.214503 env[1270]: 2024-12-13 14:21:07.189 [INFO][3595] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.e39611e7796ee42eadfb10d638eaf3e6ec8e8950835e601639543ee903a66409 Dec 13 14:21:07.214503 env[1270]: 2024-12-13 14:21:07.191 [INFO][3595] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.e39611e7796ee42eadfb10d638eaf3e6ec8e8950835e601639543ee903a66409" host="localhost" Dec 13 14:21:07.214503 env[1270]: 2024-12-13 14:21:07.197 [INFO][3595] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.e39611e7796ee42eadfb10d638eaf3e6ec8e8950835e601639543ee903a66409" host="localhost" Dec 13 14:21:07.214503 env[1270]: 2024-12-13 14:21:07.197 [INFO][3595] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.e39611e7796ee42eadfb10d638eaf3e6ec8e8950835e601639543ee903a66409" host="localhost" Dec 13 14:21:07.214503 env[1270]: 2024-12-13 14:21:07.197 [INFO][3595] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:21:07.214503 env[1270]: 2024-12-13 14:21:07.197 [INFO][3595] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="e39611e7796ee42eadfb10d638eaf3e6ec8e8950835e601639543ee903a66409" HandleID="k8s-pod-network.e39611e7796ee42eadfb10d638eaf3e6ec8e8950835e601639543ee903a66409" Workload="localhost-k8s-calico--apiserver--c756dccf--qwttr-eth0" Dec 13 14:21:07.215710 env[1270]: 2024-12-13 14:21:07.199 [INFO][3583] cni-plugin/k8s.go 386: Populated endpoint ContainerID="e39611e7796ee42eadfb10d638eaf3e6ec8e8950835e601639543ee903a66409" Namespace="calico-apiserver" Pod="calico-apiserver-c756dccf-qwttr" WorkloadEndpoint="localhost-k8s-calico--apiserver--c756dccf--qwttr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--c756dccf--qwttr-eth0", GenerateName:"calico-apiserver-c756dccf-", Namespace:"calico-apiserver", SelfLink:"", UID:"84d16462-4f19-45fc-87e0-9537b5b2290a", ResourceVersion:"787", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 20, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c756dccf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-c756dccf-qwttr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid05843ec86b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:21:07.215710 env[1270]: 2024-12-13 14:21:07.199 [INFO][3583] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="e39611e7796ee42eadfb10d638eaf3e6ec8e8950835e601639543ee903a66409" Namespace="calico-apiserver" Pod="calico-apiserver-c756dccf-qwttr" WorkloadEndpoint="localhost-k8s-calico--apiserver--c756dccf--qwttr-eth0" Dec 13 14:21:07.215710 env[1270]: 2024-12-13 14:21:07.199 [INFO][3583] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid05843ec86b ContainerID="e39611e7796ee42eadfb10d638eaf3e6ec8e8950835e601639543ee903a66409" Namespace="calico-apiserver" Pod="calico-apiserver-c756dccf-qwttr" WorkloadEndpoint="localhost-k8s-calico--apiserver--c756dccf--qwttr-eth0" Dec 13 14:21:07.215710 env[1270]: 2024-12-13 14:21:07.204 [INFO][3583] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e39611e7796ee42eadfb10d638eaf3e6ec8e8950835e601639543ee903a66409" Namespace="calico-apiserver" Pod="calico-apiserver-c756dccf-qwttr" WorkloadEndpoint="localhost-k8s-calico--apiserver--c756dccf--qwttr-eth0" Dec 13 14:21:07.215710 env[1270]: 2024-12-13 14:21:07.206 [INFO][3583] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="e39611e7796ee42eadfb10d638eaf3e6ec8e8950835e601639543ee903a66409" Namespace="calico-apiserver" Pod="calico-apiserver-c756dccf-qwttr" WorkloadEndpoint="localhost-k8s-calico--apiserver--c756dccf--qwttr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--c756dccf--qwttr-eth0", GenerateName:"calico-apiserver-c756dccf-", Namespace:"calico-apiserver", SelfLink:"", UID:"84d16462-4f19-45fc-87e0-9537b5b2290a", ResourceVersion:"787", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 20, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c756dccf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e39611e7796ee42eadfb10d638eaf3e6ec8e8950835e601639543ee903a66409", Pod:"calico-apiserver-c756dccf-qwttr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid05843ec86b", MAC:"e2:fd:74:44:bb:42", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:21:07.215710 env[1270]: 2024-12-13 14:21:07.212 [INFO][3583] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="e39611e7796ee42eadfb10d638eaf3e6ec8e8950835e601639543ee903a66409" Namespace="calico-apiserver" Pod="calico-apiserver-c756dccf-qwttr" WorkloadEndpoint="localhost-k8s-calico--apiserver--c756dccf--qwttr-eth0" Dec 13 14:21:07.225517 env[1270]: time="2024-12-13T14:21:07.225484546Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:21:07.225648 env[1270]: time="2024-12-13T14:21:07.225633763Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:21:07.225834 env[1270]: time="2024-12-13T14:21:07.225819055Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:21:07.225983 env[1270]: time="2024-12-13T14:21:07.225966151Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e39611e7796ee42eadfb10d638eaf3e6ec8e8950835e601639543ee903a66409 pid=3625 runtime=io.containerd.runc.v2 Dec 13 14:21:07.226000 audit[3630]: NETFILTER_CFG table=filter:101 family=2 entries=40 op=nft_register_chain pid=3630 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:21:07.227746 kernel: kauditd_printk_skb: 548 callbacks suppressed Dec 13 14:21:07.227779 kernel: audit: type=1325 audit(1734099667.226:1091): table=filter:101 family=2 entries=40 op=nft_register_chain pid=3630 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:21:07.226000 audit[3630]: SYSCALL arch=c000003e syscall=46 success=yes exit=23492 a0=3 a1=7ffec61fc6c0 a2=0 a3=7ffec61fc6ac items=0 ppid=3358 pid=3630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:07.233468 kernel: audit: type=1300 audit(1734099667.226:1091): arch=c000003e syscall=46 success=yes exit=23492 a0=3 a1=7ffec61fc6c0 a2=0 a3=7ffec61fc6ac items=0 ppid=3358 pid=3630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:07.226000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:21:07.238266 kernel: audit: type=1327 audit(1734099667.226:1091): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:21:07.246125 systemd[1]: Started cri-containerd-e39611e7796ee42eadfb10d638eaf3e6ec8e8950835e601639543ee903a66409.scope. Dec 13 14:21:07.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.263892 kernel: audit: type=1400 audit(1734099667.258:1092): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.263929 kernel: audit: type=1400 audit(1734099667.258:1093): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.263946 kernel: audit: type=1400 audit(1734099667.258:1094): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.268731 kernel: audit: type=1400 audit(1734099667.258:1095): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.268762 kernel: audit: type=1400 audit(1734099667.258:1096): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.273776 kernel: audit: type=1400 audit(1734099667.258:1097): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.273804 kernel: audit: type=1400 audit(1734099667.258:1098): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.258000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.258000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.258000 audit: BPF prog-id=155 op=LOAD Dec 13 14:21:07.258000 audit[3636]: AVC avc: denied { bpf } for pid=3636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.258000 audit[3636]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3625 pid=3636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:07.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533393631316537373936656534326561646662313064363338656166 Dec 13 14:21:07.258000 audit[3636]: AVC avc: denied { perfmon } for pid=3636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.258000 audit[3636]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3625 pid=3636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:07.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533393631316537373936656534326561646662313064363338656166 Dec 13 14:21:07.258000 audit[3636]: AVC avc: denied { bpf } for pid=3636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.258000 audit[3636]: AVC avc: denied { bpf } for pid=3636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.258000 audit[3636]: AVC avc: denied { bpf } for pid=3636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.258000 audit[3636]: AVC avc: denied { perfmon } for pid=3636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.258000 audit[3636]: AVC avc: denied { perfmon } for pid=3636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.258000 audit[3636]: AVC avc: denied { perfmon } for pid=3636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.258000 audit[3636]: AVC avc: denied { perfmon } for pid=3636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.258000 audit[3636]: AVC avc: denied { perfmon } for pid=3636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.258000 audit[3636]: AVC avc: denied { bpf } for pid=3636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.258000 audit[3636]: AVC avc: denied { bpf } for pid=3636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.258000 audit: BPF prog-id=156 op=LOAD Dec 13 14:21:07.258000 audit[3636]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000337d10 items=0 ppid=3625 pid=3636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:07.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533393631316537373936656534326561646662313064363338656166 Dec 13 14:21:07.261000 audit[3636]: AVC avc: denied { bpf } for pid=3636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.261000 audit[3636]: AVC avc: denied { bpf } for pid=3636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.261000 audit[3636]: AVC avc: denied { perfmon } for pid=3636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.261000 audit[3636]: AVC avc: denied { perfmon } for pid=3636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.261000 audit[3636]: AVC avc: denied { perfmon } for pid=3636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.261000 audit[3636]: AVC avc: denied { perfmon } for pid=3636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.261000 audit[3636]: AVC avc: denied { perfmon } for pid=3636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.261000 audit[3636]: AVC avc: denied { bpf } for pid=3636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.261000 audit[3636]: AVC avc: denied { bpf } for pid=3636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.261000 audit: BPF prog-id=157 op=LOAD Dec 13 14:21:07.261000 audit[3636]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000337d58 items=0 ppid=3625 pid=3636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:07.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533393631316537373936656534326561646662313064363338656166 Dec 13 14:21:07.265000 audit: BPF prog-id=157 op=UNLOAD Dec 13 14:21:07.265000 audit: BPF prog-id=156 op=UNLOAD Dec 13 14:21:07.265000 audit[3636]: AVC avc: denied { bpf } for pid=3636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.265000 audit[3636]: AVC avc: denied { bpf } for pid=3636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.265000 audit[3636]: AVC avc: denied { bpf } for pid=3636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.265000 audit[3636]: AVC avc: denied { perfmon } for pid=3636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.265000 audit[3636]: AVC avc: denied { perfmon } for pid=3636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.265000 audit[3636]: AVC avc: denied { perfmon } for pid=3636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.265000 audit[3636]: AVC avc: denied { perfmon } for pid=3636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.265000 audit[3636]: AVC avc: denied { perfmon } for pid=3636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.265000 audit[3636]: AVC avc: denied { bpf } for pid=3636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.265000 audit[3636]: AVC avc: denied { bpf } for pid=3636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:07.265000 audit: BPF prog-id=158 op=LOAD Dec 13 14:21:07.265000 audit[3636]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0003b8168 items=0 ppid=3625 pid=3636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:07.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533393631316537373936656534326561646662313064363338656166 Dec 13 14:21:07.275960 systemd-resolved[1205]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:21:07.301830 env[1270]: time="2024-12-13T14:21:07.301800998Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c756dccf-qwttr,Uid:84d16462-4f19-45fc-87e0-9537b5b2290a,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"e39611e7796ee42eadfb10d638eaf3e6ec8e8950835e601639543ee903a66409\"" Dec 13 14:21:07.305921 env[1270]: time="2024-12-13T14:21:07.305897568Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:21:07.823134 env[1270]: time="2024-12-13T14:21:07.823085334Z" level=info msg="StopPodSandbox for \"a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d\"" Dec 13 14:21:07.823617 env[1270]: time="2024-12-13T14:21:07.823502963Z" level=info msg="StopPodSandbox for \"6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72\"" Dec 13 14:21:07.912512 env[1270]: 2024-12-13 14:21:07.870 [INFO][3686] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" Dec 13 14:21:07.912512 env[1270]: 2024-12-13 14:21:07.870 [INFO][3686] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" iface="eth0" netns="/var/run/netns/cni-cdfe9e75-50ea-4865-d1be-41b5f4344f4e" Dec 13 14:21:07.912512 env[1270]: 2024-12-13 14:21:07.870 [INFO][3686] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" iface="eth0" netns="/var/run/netns/cni-cdfe9e75-50ea-4865-d1be-41b5f4344f4e" Dec 13 14:21:07.912512 env[1270]: 2024-12-13 14:21:07.870 [INFO][3686] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" iface="eth0" netns="/var/run/netns/cni-cdfe9e75-50ea-4865-d1be-41b5f4344f4e" Dec 13 14:21:07.912512 env[1270]: 2024-12-13 14:21:07.870 [INFO][3686] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" Dec 13 14:21:07.912512 env[1270]: 2024-12-13 14:21:07.870 [INFO][3686] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" Dec 13 14:21:07.912512 env[1270]: 2024-12-13 14:21:07.893 [INFO][3703] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" HandleID="k8s-pod-network.6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" Workload="localhost-k8s-calico--apiserver--c756dccf--h6pbq-eth0" Dec 13 14:21:07.912512 env[1270]: 2024-12-13 14:21:07.893 [INFO][3703] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:21:07.912512 env[1270]: 2024-12-13 14:21:07.893 [INFO][3703] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:21:07.912512 env[1270]: 2024-12-13 14:21:07.900 [WARNING][3703] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" HandleID="k8s-pod-network.6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" Workload="localhost-k8s-calico--apiserver--c756dccf--h6pbq-eth0" Dec 13 14:21:07.912512 env[1270]: 2024-12-13 14:21:07.900 [INFO][3703] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" HandleID="k8s-pod-network.6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" Workload="localhost-k8s-calico--apiserver--c756dccf--h6pbq-eth0" Dec 13 14:21:07.912512 env[1270]: 2024-12-13 14:21:07.906 [INFO][3703] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:21:07.912512 env[1270]: 2024-12-13 14:21:07.907 [INFO][3686] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" Dec 13 14:21:07.914104 env[1270]: time="2024-12-13T14:21:07.913915226Z" level=info msg="TearDown network for sandbox \"6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72\" successfully" Dec 13 14:21:07.914104 env[1270]: time="2024-12-13T14:21:07.913960182Z" level=info msg="StopPodSandbox for \"6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72\" returns successfully" Dec 13 14:21:07.914663 env[1270]: time="2024-12-13T14:21:07.914642889Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c756dccf-h6pbq,Uid:b00a720b-3e05-45c2-b017-4b0afa94be32,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:21:07.917387 env[1270]: 2024-12-13 14:21:07.873 [INFO][3694] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" Dec 13 14:21:07.917387 env[1270]: 2024-12-13 14:21:07.874 [INFO][3694] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" iface="eth0" netns="/var/run/netns/cni-b4ad0783-27a8-e7bb-6657-a16232a1e612" Dec 13 14:21:07.917387 env[1270]: 2024-12-13 14:21:07.874 [INFO][3694] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" iface="eth0" netns="/var/run/netns/cni-b4ad0783-27a8-e7bb-6657-a16232a1e612" Dec 13 14:21:07.917387 env[1270]: 2024-12-13 14:21:07.875 [INFO][3694] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" iface="eth0" netns="/var/run/netns/cni-b4ad0783-27a8-e7bb-6657-a16232a1e612" Dec 13 14:21:07.917387 env[1270]: 2024-12-13 14:21:07.875 [INFO][3694] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" Dec 13 14:21:07.917387 env[1270]: 2024-12-13 14:21:07.875 [INFO][3694] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" Dec 13 14:21:07.917387 env[1270]: 2024-12-13 14:21:07.908 [INFO][3707] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" HandleID="k8s-pod-network.a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" Workload="localhost-k8s-coredns--7db6d8ff4d--8pvb8-eth0" Dec 13 14:21:07.917387 env[1270]: 2024-12-13 14:21:07.908 [INFO][3707] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:21:07.917387 env[1270]: 2024-12-13 14:21:07.908 [INFO][3707] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:21:07.917387 env[1270]: 2024-12-13 14:21:07.912 [WARNING][3707] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" HandleID="k8s-pod-network.a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" Workload="localhost-k8s-coredns--7db6d8ff4d--8pvb8-eth0" Dec 13 14:21:07.917387 env[1270]: 2024-12-13 14:21:07.912 [INFO][3707] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" HandleID="k8s-pod-network.a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" Workload="localhost-k8s-coredns--7db6d8ff4d--8pvb8-eth0" Dec 13 14:21:07.917387 env[1270]: 2024-12-13 14:21:07.913 [INFO][3707] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:21:07.917387 env[1270]: 2024-12-13 14:21:07.916 [INFO][3694] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" Dec 13 14:21:07.918169 env[1270]: time="2024-12-13T14:21:07.918125955Z" level=info msg="TearDown network for sandbox \"a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d\" successfully" Dec 13 14:21:07.918273 env[1270]: time="2024-12-13T14:21:07.918256944Z" level=info msg="StopPodSandbox for \"a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d\" returns successfully" Dec 13 14:21:07.918932 env[1270]: time="2024-12-13T14:21:07.918900496Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-8pvb8,Uid:dfda6d2b-ae63-4f45-abb5-6eb95ae8af85,Namespace:kube-system,Attempt:1,}" Dec 13 14:21:08.012971 systemd-networkd[1063]: cali2e8ba23fe98: Link UP Dec 13 14:21:08.013074 systemd-networkd[1063]: cali2e8ba23fe98: Gained carrier Dec 13 14:21:08.014160 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2e8ba23fe98: link becomes ready Dec 13 14:21:08.026104 env[1270]: 2024-12-13 14:21:07.948 [INFO][3715] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--c756dccf--h6pbq-eth0 calico-apiserver-c756dccf- calico-apiserver b00a720b-3e05-45c2-b017-4b0afa94be32 795 0 2024-12-13 14:20:42 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:c756dccf projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-c756dccf-h6pbq eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali2e8ba23fe98 [] []}} ContainerID="4a272e06193831e86f42cea2a349f8460cd3bf088b2711071c904d29429e625f" Namespace="calico-apiserver" Pod="calico-apiserver-c756dccf-h6pbq" WorkloadEndpoint="localhost-k8s-calico--apiserver--c756dccf--h6pbq-" Dec 13 14:21:08.026104 env[1270]: 2024-12-13 14:21:07.948 [INFO][3715] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="4a272e06193831e86f42cea2a349f8460cd3bf088b2711071c904d29429e625f" Namespace="calico-apiserver" Pod="calico-apiserver-c756dccf-h6pbq" WorkloadEndpoint="localhost-k8s-calico--apiserver--c756dccf--h6pbq-eth0" Dec 13 14:21:08.026104 env[1270]: 2024-12-13 14:21:07.979 [INFO][3738] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4a272e06193831e86f42cea2a349f8460cd3bf088b2711071c904d29429e625f" HandleID="k8s-pod-network.4a272e06193831e86f42cea2a349f8460cd3bf088b2711071c904d29429e625f" Workload="localhost-k8s-calico--apiserver--c756dccf--h6pbq-eth0" Dec 13 14:21:08.026104 env[1270]: 2024-12-13 14:21:07.985 [INFO][3738] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4a272e06193831e86f42cea2a349f8460cd3bf088b2711071c904d29429e625f" HandleID="k8s-pod-network.4a272e06193831e86f42cea2a349f8460cd3bf088b2711071c904d29429e625f" Workload="localhost-k8s-calico--apiserver--c756dccf--h6pbq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003acd90), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-c756dccf-h6pbq", "timestamp":"2024-12-13 14:21:07.979019258 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:21:08.026104 env[1270]: 2024-12-13 14:21:07.985 [INFO][3738] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:21:08.026104 env[1270]: 2024-12-13 14:21:07.985 [INFO][3738] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:21:08.026104 env[1270]: 2024-12-13 14:21:07.985 [INFO][3738] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:21:08.026104 env[1270]: 2024-12-13 14:21:07.986 [INFO][3738] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4a272e06193831e86f42cea2a349f8460cd3bf088b2711071c904d29429e625f" host="localhost" Dec 13 14:21:08.026104 env[1270]: 2024-12-13 14:21:07.996 [INFO][3738] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:21:08.026104 env[1270]: 2024-12-13 14:21:08.000 [INFO][3738] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:21:08.026104 env[1270]: 2024-12-13 14:21:08.001 [INFO][3738] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:21:08.026104 env[1270]: 2024-12-13 14:21:08.002 [INFO][3738] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:21:08.026104 env[1270]: 2024-12-13 14:21:08.002 [INFO][3738] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.4a272e06193831e86f42cea2a349f8460cd3bf088b2711071c904d29429e625f" host="localhost" Dec 13 14:21:08.026104 env[1270]: 2024-12-13 14:21:08.003 [INFO][3738] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.4a272e06193831e86f42cea2a349f8460cd3bf088b2711071c904d29429e625f Dec 13 14:21:08.026104 env[1270]: 2024-12-13 14:21:08.005 [INFO][3738] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.4a272e06193831e86f42cea2a349f8460cd3bf088b2711071c904d29429e625f" host="localhost" Dec 13 14:21:08.026104 env[1270]: 2024-12-13 14:21:08.008 [INFO][3738] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.4a272e06193831e86f42cea2a349f8460cd3bf088b2711071c904d29429e625f" host="localhost" Dec 13 14:21:08.026104 env[1270]: 2024-12-13 14:21:08.008 [INFO][3738] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.4a272e06193831e86f42cea2a349f8460cd3bf088b2711071c904d29429e625f" host="localhost" Dec 13 14:21:08.026104 env[1270]: 2024-12-13 14:21:08.008 [INFO][3738] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:21:08.026104 env[1270]: 2024-12-13 14:21:08.008 [INFO][3738] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="4a272e06193831e86f42cea2a349f8460cd3bf088b2711071c904d29429e625f" HandleID="k8s-pod-network.4a272e06193831e86f42cea2a349f8460cd3bf088b2711071c904d29429e625f" Workload="localhost-k8s-calico--apiserver--c756dccf--h6pbq-eth0" Dec 13 14:21:08.026715 env[1270]: 2024-12-13 14:21:08.010 [INFO][3715] cni-plugin/k8s.go 386: Populated endpoint ContainerID="4a272e06193831e86f42cea2a349f8460cd3bf088b2711071c904d29429e625f" Namespace="calico-apiserver" Pod="calico-apiserver-c756dccf-h6pbq" WorkloadEndpoint="localhost-k8s-calico--apiserver--c756dccf--h6pbq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--c756dccf--h6pbq-eth0", GenerateName:"calico-apiserver-c756dccf-", Namespace:"calico-apiserver", SelfLink:"", UID:"b00a720b-3e05-45c2-b017-4b0afa94be32", ResourceVersion:"795", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 20, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c756dccf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-c756dccf-h6pbq", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2e8ba23fe98", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:21:08.026715 env[1270]: 2024-12-13 14:21:08.010 [INFO][3715] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="4a272e06193831e86f42cea2a349f8460cd3bf088b2711071c904d29429e625f" Namespace="calico-apiserver" Pod="calico-apiserver-c756dccf-h6pbq" WorkloadEndpoint="localhost-k8s-calico--apiserver--c756dccf--h6pbq-eth0" Dec 13 14:21:08.026715 env[1270]: 2024-12-13 14:21:08.010 [INFO][3715] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2e8ba23fe98 ContainerID="4a272e06193831e86f42cea2a349f8460cd3bf088b2711071c904d29429e625f" Namespace="calico-apiserver" Pod="calico-apiserver-c756dccf-h6pbq" WorkloadEndpoint="localhost-k8s-calico--apiserver--c756dccf--h6pbq-eth0" Dec 13 14:21:08.026715 env[1270]: 2024-12-13 14:21:08.013 [INFO][3715] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4a272e06193831e86f42cea2a349f8460cd3bf088b2711071c904d29429e625f" Namespace="calico-apiserver" Pod="calico-apiserver-c756dccf-h6pbq" WorkloadEndpoint="localhost-k8s-calico--apiserver--c756dccf--h6pbq-eth0" Dec 13 14:21:08.026715 env[1270]: 2024-12-13 14:21:08.016 [INFO][3715] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="4a272e06193831e86f42cea2a349f8460cd3bf088b2711071c904d29429e625f" Namespace="calico-apiserver" Pod="calico-apiserver-c756dccf-h6pbq" WorkloadEndpoint="localhost-k8s-calico--apiserver--c756dccf--h6pbq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--c756dccf--h6pbq-eth0", GenerateName:"calico-apiserver-c756dccf-", Namespace:"calico-apiserver", SelfLink:"", UID:"b00a720b-3e05-45c2-b017-4b0afa94be32", ResourceVersion:"795", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 20, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c756dccf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4a272e06193831e86f42cea2a349f8460cd3bf088b2711071c904d29429e625f", Pod:"calico-apiserver-c756dccf-h6pbq", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2e8ba23fe98", MAC:"aa:d9:e5:0c:50:7c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:21:08.026715 env[1270]: 2024-12-13 14:21:08.023 [INFO][3715] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="4a272e06193831e86f42cea2a349f8460cd3bf088b2711071c904d29429e625f" Namespace="calico-apiserver" Pod="calico-apiserver-c756dccf-h6pbq" WorkloadEndpoint="localhost-k8s-calico--apiserver--c756dccf--h6pbq-eth0" Dec 13 14:21:08.037303 env[1270]: time="2024-12-13T14:21:08.037264540Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:21:08.037427 env[1270]: time="2024-12-13T14:21:08.037412462Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:21:08.037507 env[1270]: time="2024-12-13T14:21:08.037493761Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:21:08.037640 env[1270]: time="2024-12-13T14:21:08.037623873Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4a272e06193831e86f42cea2a349f8460cd3bf088b2711071c904d29429e625f pid=3769 runtime=io.containerd.runc.v2 Dec 13 14:21:08.048500 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib7c3848073b: link becomes ready Dec 13 14:21:08.046189 systemd-networkd[1063]: calib7c3848073b: Link UP Dec 13 14:21:08.047741 systemd-networkd[1063]: calib7c3848073b: Gained carrier Dec 13 14:21:08.052289 systemd[1]: Started cri-containerd-4a272e06193831e86f42cea2a349f8460cd3bf088b2711071c904d29429e625f.scope. Dec 13 14:21:08.052000 audit[3787]: NETFILTER_CFG table=filter:102 family=2 entries=34 op=nft_register_chain pid=3787 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:21:08.052000 audit[3787]: SYSCALL arch=c000003e syscall=46 success=yes exit=20328 a0=3 a1=7ffe291b6e90 a2=0 a3=7ffe291b6e7c items=0 ppid=3358 pid=3787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:08.052000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:21:08.061603 env[1270]: 2024-12-13 14:21:07.959 [INFO][3721] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7db6d8ff4d--8pvb8-eth0 coredns-7db6d8ff4d- kube-system dfda6d2b-ae63-4f45-abb5-6eb95ae8af85 796 0 2024-12-13 14:20:36 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7db6d8ff4d-8pvb8 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calib7c3848073b [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="c476c51194df13d90244eff60e493988e83593b3fb1502c4743cd3dfc5996bb3" Namespace="kube-system" Pod="coredns-7db6d8ff4d-8pvb8" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--8pvb8-" Dec 13 14:21:08.061603 env[1270]: 2024-12-13 14:21:07.959 [INFO][3721] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c476c51194df13d90244eff60e493988e83593b3fb1502c4743cd3dfc5996bb3" Namespace="kube-system" Pod="coredns-7db6d8ff4d-8pvb8" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--8pvb8-eth0" Dec 13 14:21:08.061603 env[1270]: 2024-12-13 14:21:07.993 [INFO][3743] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c476c51194df13d90244eff60e493988e83593b3fb1502c4743cd3dfc5996bb3" HandleID="k8s-pod-network.c476c51194df13d90244eff60e493988e83593b3fb1502c4743cd3dfc5996bb3" Workload="localhost-k8s-coredns--7db6d8ff4d--8pvb8-eth0" Dec 13 14:21:08.061603 env[1270]: 2024-12-13 14:21:08.002 [INFO][3743] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c476c51194df13d90244eff60e493988e83593b3fb1502c4743cd3dfc5996bb3" HandleID="k8s-pod-network.c476c51194df13d90244eff60e493988e83593b3fb1502c4743cd3dfc5996bb3" Workload="localhost-k8s-coredns--7db6d8ff4d--8pvb8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318e90), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7db6d8ff4d-8pvb8", "timestamp":"2024-12-13 14:21:07.993922548 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:21:08.061603 env[1270]: 2024-12-13 14:21:08.003 [INFO][3743] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:21:08.061603 env[1270]: 2024-12-13 14:21:08.008 [INFO][3743] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:21:08.061603 env[1270]: 2024-12-13 14:21:08.008 [INFO][3743] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:21:08.061603 env[1270]: 2024-12-13 14:21:08.011 [INFO][3743] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c476c51194df13d90244eff60e493988e83593b3fb1502c4743cd3dfc5996bb3" host="localhost" Dec 13 14:21:08.061603 env[1270]: 2024-12-13 14:21:08.025 [INFO][3743] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:21:08.061603 env[1270]: 2024-12-13 14:21:08.028 [INFO][3743] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:21:08.061603 env[1270]: 2024-12-13 14:21:08.029 [INFO][3743] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:21:08.061603 env[1270]: 2024-12-13 14:21:08.031 [INFO][3743] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:21:08.061603 env[1270]: 2024-12-13 14:21:08.031 [INFO][3743] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.c476c51194df13d90244eff60e493988e83593b3fb1502c4743cd3dfc5996bb3" host="localhost" Dec 13 14:21:08.061603 env[1270]: 2024-12-13 14:21:08.032 [INFO][3743] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c476c51194df13d90244eff60e493988e83593b3fb1502c4743cd3dfc5996bb3 Dec 13 14:21:08.061603 env[1270]: 2024-12-13 14:21:08.035 [INFO][3743] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.c476c51194df13d90244eff60e493988e83593b3fb1502c4743cd3dfc5996bb3" host="localhost" Dec 13 14:21:08.061603 env[1270]: 2024-12-13 14:21:08.042 [INFO][3743] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.c476c51194df13d90244eff60e493988e83593b3fb1502c4743cd3dfc5996bb3" host="localhost" Dec 13 14:21:08.061603 env[1270]: 2024-12-13 14:21:08.042 [INFO][3743] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.c476c51194df13d90244eff60e493988e83593b3fb1502c4743cd3dfc5996bb3" host="localhost" Dec 13 14:21:08.061603 env[1270]: 2024-12-13 14:21:08.042 [INFO][3743] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:21:08.061603 env[1270]: 2024-12-13 14:21:08.042 [INFO][3743] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="c476c51194df13d90244eff60e493988e83593b3fb1502c4743cd3dfc5996bb3" HandleID="k8s-pod-network.c476c51194df13d90244eff60e493988e83593b3fb1502c4743cd3dfc5996bb3" Workload="localhost-k8s-coredns--7db6d8ff4d--8pvb8-eth0" Dec 13 14:21:08.062081 env[1270]: 2024-12-13 14:21:08.043 [INFO][3721] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c476c51194df13d90244eff60e493988e83593b3fb1502c4743cd3dfc5996bb3" Namespace="kube-system" Pod="coredns-7db6d8ff4d-8pvb8" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--8pvb8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--8pvb8-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"dfda6d2b-ae63-4f45-abb5-6eb95ae8af85", ResourceVersion:"796", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 20, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7db6d8ff4d-8pvb8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib7c3848073b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:21:08.062081 env[1270]: 2024-12-13 14:21:08.043 [INFO][3721] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="c476c51194df13d90244eff60e493988e83593b3fb1502c4743cd3dfc5996bb3" Namespace="kube-system" Pod="coredns-7db6d8ff4d-8pvb8" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--8pvb8-eth0" Dec 13 14:21:08.062081 env[1270]: 2024-12-13 14:21:08.043 [INFO][3721] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib7c3848073b ContainerID="c476c51194df13d90244eff60e493988e83593b3fb1502c4743cd3dfc5996bb3" Namespace="kube-system" Pod="coredns-7db6d8ff4d-8pvb8" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--8pvb8-eth0" Dec 13 14:21:08.062081 env[1270]: 2024-12-13 14:21:08.048 [INFO][3721] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c476c51194df13d90244eff60e493988e83593b3fb1502c4743cd3dfc5996bb3" Namespace="kube-system" Pod="coredns-7db6d8ff4d-8pvb8" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--8pvb8-eth0" Dec 13 14:21:08.062081 env[1270]: 2024-12-13 14:21:08.051 [INFO][3721] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c476c51194df13d90244eff60e493988e83593b3fb1502c4743cd3dfc5996bb3" Namespace="kube-system" Pod="coredns-7db6d8ff4d-8pvb8" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--8pvb8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--8pvb8-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"dfda6d2b-ae63-4f45-abb5-6eb95ae8af85", ResourceVersion:"796", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 20, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c476c51194df13d90244eff60e493988e83593b3fb1502c4743cd3dfc5996bb3", Pod:"coredns-7db6d8ff4d-8pvb8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib7c3848073b", MAC:"16:f5:e2:31:5e:63", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:21:08.062081 env[1270]: 2024-12-13 14:21:08.057 [INFO][3721] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c476c51194df13d90244eff60e493988e83593b3fb1502c4743cd3dfc5996bb3" Namespace="kube-system" Pod="coredns-7db6d8ff4d-8pvb8" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--8pvb8-eth0" Dec 13 14:21:08.069661 env[1270]: time="2024-12-13T14:21:08.069626482Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:21:08.069780 env[1270]: time="2024-12-13T14:21:08.069766025Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:21:08.069850 env[1270]: time="2024-12-13T14:21:08.069836800Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:21:08.070068 env[1270]: time="2024-12-13T14:21:08.070040884Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c476c51194df13d90244eff60e493988e83593b3fb1502c4743cd3dfc5996bb3 pid=3810 runtime=io.containerd.runc.v2 Dec 13 14:21:08.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.082000 audit: BPF prog-id=159 op=LOAD Dec 13 14:21:08.083000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.083000 audit[3780]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3769 pid=3780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:08.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461323732653036313933383331653836663432636561326133343966 Dec 13 14:21:08.086000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.086000 audit[3780]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3769 pid=3780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:08.086000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461323732653036313933383331653836663432636561326133343966 Dec 13 14:21:08.086000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.086000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.086000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.086000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.086000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.086000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.086000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.086000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.086000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.086000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.086000 audit: BPF prog-id=160 op=LOAD Dec 13 14:21:08.086000 audit[3780]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000318fc0 items=0 ppid=3769 pid=3780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:08.086000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461323732653036313933383331653836663432636561326133343966 Dec 13 14:21:08.086000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.086000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.086000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.086000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.086000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.086000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.086000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.086000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.086000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.086000 audit: BPF prog-id=161 op=LOAD Dec 13 14:21:08.086000 audit[3780]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000319008 items=0 ppid=3769 pid=3780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:08.086000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461323732653036313933383331653836663432636561326133343966 Dec 13 14:21:08.086000 audit: BPF prog-id=161 op=UNLOAD Dec 13 14:21:08.086000 audit: BPF prog-id=160 op=UNLOAD Dec 13 14:21:08.086000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.086000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.086000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.086000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.086000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.086000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.086000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.086000 audit[3780]: AVC avc: denied { perfmon } for pid=3780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.086000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.088336 systemd[1]: Started cri-containerd-c476c51194df13d90244eff60e493988e83593b3fb1502c4743cd3dfc5996bb3.scope. Dec 13 14:21:08.086000 audit[3780]: AVC avc: denied { bpf } for pid=3780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.086000 audit: BPF prog-id=162 op=LOAD Dec 13 14:21:08.086000 audit[3780]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000319418 items=0 ppid=3769 pid=3780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:08.086000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461323732653036313933383331653836663432636561326133343966 Dec 13 14:21:08.091460 systemd-resolved[1205]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:21:08.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.101000 audit: BPF prog-id=163 op=LOAD Dec 13 14:21:08.102000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.102000 audit[3824]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3810 pid=3824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:08.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334373663353131393464663133643930323434656666363065343933 Dec 13 14:21:08.102000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.102000 audit[3824]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3810 pid=3824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:08.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334373663353131393464663133643930323434656666363065343933 Dec 13 14:21:08.102000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.102000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.102000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.102000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.102000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.102000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.102000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.102000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.102000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.102000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.102000 audit: BPF prog-id=164 op=LOAD Dec 13 14:21:08.102000 audit[3824]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000279d90 items=0 ppid=3810 pid=3824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:08.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334373663353131393464663133643930323434656666363065343933 Dec 13 14:21:08.102000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.102000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.102000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.102000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.102000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.102000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.102000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.102000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.102000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.102000 audit: BPF prog-id=165 op=LOAD Dec 13 14:21:08.102000 audit[3824]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000279dd8 items=0 ppid=3810 pid=3824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:08.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334373663353131393464663133643930323434656666363065343933 Dec 13 14:21:08.102000 audit: BPF prog-id=165 op=UNLOAD Dec 13 14:21:08.102000 audit: BPF prog-id=164 op=UNLOAD Dec 13 14:21:08.102000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.102000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.102000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.102000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.102000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.102000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.102000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.102000 audit[3824]: AVC avc: denied { perfmon } for pid=3824 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.102000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.102000 audit[3824]: AVC avc: denied { bpf } for pid=3824 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.102000 audit: BPF prog-id=166 op=LOAD Dec 13 14:21:08.102000 audit[3824]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00036c1e8 items=0 ppid=3810 pid=3824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:08.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334373663353131393464663133643930323434656666363065343933 Dec 13 14:21:08.103540 systemd-resolved[1205]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:21:08.112774 systemd[1]: run-containerd-runc-k8s.io-e39611e7796ee42eadfb10d638eaf3e6ec8e8950835e601639543ee903a66409-runc.yNfnIn.mount: Deactivated successfully. Dec 13 14:21:08.112863 systemd[1]: run-netns-cni\x2dcdfe9e75\x2d50ea\x2d4865\x2dd1be\x2d41b5f4344f4e.mount: Deactivated successfully. Dec 13 14:21:08.112899 systemd[1]: run-netns-cni\x2db4ad0783\x2d27a8\x2de7bb\x2d6657\x2da16232a1e612.mount: Deactivated successfully. Dec 13 14:21:08.128742 env[1270]: time="2024-12-13T14:21:08.128712218Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-8pvb8,Uid:dfda6d2b-ae63-4f45-abb5-6eb95ae8af85,Namespace:kube-system,Attempt:1,} returns sandbox id \"c476c51194df13d90244eff60e493988e83593b3fb1502c4743cd3dfc5996bb3\"" Dec 13 14:21:08.129000 audit[3853]: NETFILTER_CFG table=filter:103 family=2 entries=42 op=nft_register_chain pid=3853 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:21:08.129000 audit[3853]: SYSCALL arch=c000003e syscall=46 success=yes exit=21524 a0=3 a1=7ffc93db8000 a2=0 a3=7ffc93db7fec items=0 ppid=3358 pid=3853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:08.129000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:21:08.132158 env[1270]: time="2024-12-13T14:21:08.132139485Z" level=info msg="CreateContainer within sandbox \"c476c51194df13d90244eff60e493988e83593b3fb1502c4743cd3dfc5996bb3\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:21:08.148232 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4155324398.mount: Deactivated successfully. Dec 13 14:21:08.152626 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2336635793.mount: Deactivated successfully. Dec 13 14:21:08.154732 env[1270]: time="2024-12-13T14:21:08.154701169Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c756dccf-h6pbq,Uid:b00a720b-3e05-45c2-b017-4b0afa94be32,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"4a272e06193831e86f42cea2a349f8460cd3bf088b2711071c904d29429e625f\"" Dec 13 14:21:08.154968 env[1270]: time="2024-12-13T14:21:08.154951052Z" level=info msg="CreateContainer within sandbox \"c476c51194df13d90244eff60e493988e83593b3fb1502c4743cd3dfc5996bb3\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"ae56c9d9bf993c1baa2d94eb2d02d53e4340c93aa0f5a4cc9cb043b5361fca2b\"" Dec 13 14:21:08.155380 env[1270]: time="2024-12-13T14:21:08.155367645Z" level=info msg="StartContainer for \"ae56c9d9bf993c1baa2d94eb2d02d53e4340c93aa0f5a4cc9cb043b5361fca2b\"" Dec 13 14:21:08.165095 systemd[1]: Started cri-containerd-ae56c9d9bf993c1baa2d94eb2d02d53e4340c93aa0f5a4cc9cb043b5361fca2b.scope. Dec 13 14:21:08.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.176000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.176000 audit: BPF prog-id=167 op=LOAD Dec 13 14:21:08.176000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.176000 audit[3874]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3810 pid=3874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:08.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165353663396439626639393363316261613264393465623264303264 Dec 13 14:21:08.176000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.176000 audit[3874]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3810 pid=3874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:08.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165353663396439626639393363316261613264393465623264303264 Dec 13 14:21:08.177000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.177000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.177000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.177000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.177000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.177000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.177000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.177000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.177000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.177000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.177000 audit: BPF prog-id=168 op=LOAD Dec 13 14:21:08.177000 audit[3874]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000216c20 items=0 ppid=3810 pid=3874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:08.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165353663396439626639393363316261613264393465623264303264 Dec 13 14:21:08.177000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.177000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.177000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.177000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.177000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.177000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.177000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.177000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.177000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.177000 audit: BPF prog-id=169 op=LOAD Dec 13 14:21:08.177000 audit[3874]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000216c68 items=0 ppid=3810 pid=3874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:08.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165353663396439626639393363316261613264393465623264303264 Dec 13 14:21:08.177000 audit: BPF prog-id=169 op=UNLOAD Dec 13 14:21:08.177000 audit: BPF prog-id=168 op=UNLOAD Dec 13 14:21:08.178000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.178000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.178000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.178000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.178000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.178000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.178000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.178000 audit[3874]: AVC avc: denied { perfmon } for pid=3874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.178000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.178000 audit[3874]: AVC avc: denied { bpf } for pid=3874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:08.178000 audit: BPF prog-id=170 op=LOAD Dec 13 14:21:08.178000 audit[3874]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000217078 items=0 ppid=3810 pid=3874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:08.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165353663396439626639393363316261613264393465623264303264 Dec 13 14:21:08.189031 env[1270]: time="2024-12-13T14:21:08.189000713Z" level=info msg="StartContainer for \"ae56c9d9bf993c1baa2d94eb2d02d53e4340c93aa0f5a4cc9cb043b5361fca2b\" returns successfully" Dec 13 14:21:08.599619 systemd-networkd[1063]: calid05843ec86b: Gained IPv6LL Dec 13 14:21:08.830162 env[1270]: time="2024-12-13T14:21:08.830131645Z" level=info msg="StopPodSandbox for \"cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15\"" Dec 13 14:21:08.850505 env[1270]: time="2024-12-13T14:21:08.850272620Z" level=info msg="StopPodSandbox for \"97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80\"" Dec 13 14:21:08.995627 env[1270]: 2024-12-13 14:21:08.951 [INFO][3939] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" Dec 13 14:21:08.995627 env[1270]: 2024-12-13 14:21:08.951 [INFO][3939] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" iface="eth0" netns="/var/run/netns/cni-1dda7477-c7a3-623b-ffc4-8042c7231da9" Dec 13 14:21:08.995627 env[1270]: 2024-12-13 14:21:08.951 [INFO][3939] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" iface="eth0" netns="/var/run/netns/cni-1dda7477-c7a3-623b-ffc4-8042c7231da9" Dec 13 14:21:08.995627 env[1270]: 2024-12-13 14:21:08.951 [INFO][3939] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" iface="eth0" netns="/var/run/netns/cni-1dda7477-c7a3-623b-ffc4-8042c7231da9" Dec 13 14:21:08.995627 env[1270]: 2024-12-13 14:21:08.951 [INFO][3939] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" Dec 13 14:21:08.995627 env[1270]: 2024-12-13 14:21:08.951 [INFO][3939] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" Dec 13 14:21:08.995627 env[1270]: 2024-12-13 14:21:08.968 [INFO][3947] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" HandleID="k8s-pod-network.97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" Workload="localhost-k8s-calico--kube--controllers--5948cc9557--vwt48-eth0" Dec 13 14:21:08.995627 env[1270]: 2024-12-13 14:21:08.968 [INFO][3947] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:21:08.995627 env[1270]: 2024-12-13 14:21:08.968 [INFO][3947] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:21:08.995627 env[1270]: 2024-12-13 14:21:08.984 [WARNING][3947] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" HandleID="k8s-pod-network.97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" Workload="localhost-k8s-calico--kube--controllers--5948cc9557--vwt48-eth0" Dec 13 14:21:08.995627 env[1270]: 2024-12-13 14:21:08.984 [INFO][3947] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" HandleID="k8s-pod-network.97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" Workload="localhost-k8s-calico--kube--controllers--5948cc9557--vwt48-eth0" Dec 13 14:21:08.995627 env[1270]: 2024-12-13 14:21:08.992 [INFO][3947] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:21:08.995627 env[1270]: 2024-12-13 14:21:08.993 [INFO][3939] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" Dec 13 14:21:08.996313 env[1270]: time="2024-12-13T14:21:08.996288767Z" level=info msg="TearDown network for sandbox \"97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80\" successfully" Dec 13 14:21:08.996374 env[1270]: time="2024-12-13T14:21:08.996361357Z" level=info msg="StopPodSandbox for \"97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80\" returns successfully" Dec 13 14:21:09.018980 env[1270]: time="2024-12-13T14:21:09.018393853Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5948cc9557-vwt48,Uid:c3c31618-9087-40ec-ac13-e264b487ba1e,Namespace:calico-system,Attempt:1,}" Dec 13 14:21:09.033367 env[1270]: 2024-12-13 14:21:08.987 [INFO][3935] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" Dec 13 14:21:09.033367 env[1270]: 2024-12-13 14:21:08.987 [INFO][3935] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" iface="eth0" netns="/var/run/netns/cni-127c1121-b4df-b37b-ae06-d6dac971c087" Dec 13 14:21:09.033367 env[1270]: 2024-12-13 14:21:08.988 [INFO][3935] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" iface="eth0" netns="/var/run/netns/cni-127c1121-b4df-b37b-ae06-d6dac971c087" Dec 13 14:21:09.033367 env[1270]: 2024-12-13 14:21:08.994 [INFO][3935] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" iface="eth0" netns="/var/run/netns/cni-127c1121-b4df-b37b-ae06-d6dac971c087" Dec 13 14:21:09.033367 env[1270]: 2024-12-13 14:21:08.994 [INFO][3935] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" Dec 13 14:21:09.033367 env[1270]: 2024-12-13 14:21:08.994 [INFO][3935] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" Dec 13 14:21:09.033367 env[1270]: 2024-12-13 14:21:09.022 [INFO][3954] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" HandleID="k8s-pod-network.cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" Workload="localhost-k8s-coredns--7db6d8ff4d--bgsrp-eth0" Dec 13 14:21:09.033367 env[1270]: 2024-12-13 14:21:09.022 [INFO][3954] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:21:09.033367 env[1270]: 2024-12-13 14:21:09.022 [INFO][3954] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:21:09.033367 env[1270]: 2024-12-13 14:21:09.029 [WARNING][3954] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" HandleID="k8s-pod-network.cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" Workload="localhost-k8s-coredns--7db6d8ff4d--bgsrp-eth0" Dec 13 14:21:09.033367 env[1270]: 2024-12-13 14:21:09.029 [INFO][3954] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" HandleID="k8s-pod-network.cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" Workload="localhost-k8s-coredns--7db6d8ff4d--bgsrp-eth0" Dec 13 14:21:09.033367 env[1270]: 2024-12-13 14:21:09.030 [INFO][3954] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:21:09.033367 env[1270]: 2024-12-13 14:21:09.032 [INFO][3935] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" Dec 13 14:21:09.042285 env[1270]: time="2024-12-13T14:21:09.033584205Z" level=info msg="TearDown network for sandbox \"cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15\" successfully" Dec 13 14:21:09.042285 env[1270]: time="2024-12-13T14:21:09.033615884Z" level=info msg="StopPodSandbox for \"cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15\" returns successfully" Dec 13 14:21:09.042366 kubelet[2196]: I1213 14:21:09.042243 2196 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-8pvb8" podStartSLOduration=33.042230753 podStartE2EDuration="33.042230753s" podCreationTimestamp="2024-12-13 14:20:36 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:21:09.017437994 +0000 UTC m=+47.372457783" watchObservedRunningTime="2024-12-13 14:21:09.042230753 +0000 UTC m=+47.397250536" Dec 13 14:21:09.043247 env[1270]: time="2024-12-13T14:21:09.043218987Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-bgsrp,Uid:ad4098cd-e162-4f9f-8435-adb35d1aa4c7,Namespace:kube-system,Attempt:1,}" Dec 13 14:21:09.112430 systemd[1]: run-netns-cni\x2d1dda7477\x2dc7a3\x2d623b\x2dffc4\x2d8042c7231da9.mount: Deactivated successfully. Dec 13 14:21:09.112515 systemd[1]: run-netns-cni\x2d127c1121\x2db4df\x2db37b\x2dae06\x2dd6dac971c087.mount: Deactivated successfully. Dec 13 14:21:09.175664 systemd-networkd[1063]: calib7c3848073b: Gained IPv6LL Dec 13 14:21:09.249000 audit[3966]: NETFILTER_CFG table=filter:104 family=2 entries=16 op=nft_register_rule pid=3966 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:21:09.249000 audit[3966]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe95ad96b0 a2=0 a3=7ffe95ad969c items=0 ppid=2329 pid=3966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:09.249000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:09.253000 audit[3966]: NETFILTER_CFG table=nat:105 family=2 entries=14 op=nft_register_rule pid=3966 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:21:09.253000 audit[3966]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffe95ad96b0 a2=0 a3=0 items=0 ppid=2329 pid=3966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:09.253000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:09.351304 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:21:09.351400 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali66c43b208f7: link becomes ready Dec 13 14:21:09.349829 systemd-networkd[1063]: cali66c43b208f7: Link UP Dec 13 14:21:09.351839 systemd-networkd[1063]: cali66c43b208f7: Gained carrier Dec 13 14:21:09.372027 env[1270]: 2024-12-13 14:21:09.266 [INFO][3961] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--5948cc9557--vwt48-eth0 calico-kube-controllers-5948cc9557- calico-system c3c31618-9087-40ec-ac13-e264b487ba1e 811 0 2024-12-13 14:20:42 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:5948cc9557 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-5948cc9557-vwt48 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali66c43b208f7 [] []}} ContainerID="75edddca96a3925a258f8379e20a5c79c40acadcdcea8274a9b371f0a71b2dcb" Namespace="calico-system" Pod="calico-kube-controllers-5948cc9557-vwt48" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5948cc9557--vwt48-" Dec 13 14:21:09.372027 env[1270]: 2024-12-13 14:21:09.266 [INFO][3961] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="75edddca96a3925a258f8379e20a5c79c40acadcdcea8274a9b371f0a71b2dcb" Namespace="calico-system" Pod="calico-kube-controllers-5948cc9557-vwt48" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5948cc9557--vwt48-eth0" Dec 13 14:21:09.372027 env[1270]: 2024-12-13 14:21:09.310 [INFO][3979] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="75edddca96a3925a258f8379e20a5c79c40acadcdcea8274a9b371f0a71b2dcb" HandleID="k8s-pod-network.75edddca96a3925a258f8379e20a5c79c40acadcdcea8274a9b371f0a71b2dcb" Workload="localhost-k8s-calico--kube--controllers--5948cc9557--vwt48-eth0" Dec 13 14:21:09.372027 env[1270]: 2024-12-13 14:21:09.328 [INFO][3979] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="75edddca96a3925a258f8379e20a5c79c40acadcdcea8274a9b371f0a71b2dcb" HandleID="k8s-pod-network.75edddca96a3925a258f8379e20a5c79c40acadcdcea8274a9b371f0a71b2dcb" Workload="localhost-k8s-calico--kube--controllers--5948cc9557--vwt48-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000290b70), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-5948cc9557-vwt48", "timestamp":"2024-12-13 14:21:09.31060686 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:21:09.372027 env[1270]: 2024-12-13 14:21:09.328 [INFO][3979] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:21:09.372027 env[1270]: 2024-12-13 14:21:09.328 [INFO][3979] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:21:09.372027 env[1270]: 2024-12-13 14:21:09.328 [INFO][3979] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:21:09.372027 env[1270]: 2024-12-13 14:21:09.329 [INFO][3979] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.75edddca96a3925a258f8379e20a5c79c40acadcdcea8274a9b371f0a71b2dcb" host="localhost" Dec 13 14:21:09.372027 env[1270]: 2024-12-13 14:21:09.332 [INFO][3979] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:21:09.372027 env[1270]: 2024-12-13 14:21:09.335 [INFO][3979] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:21:09.372027 env[1270]: 2024-12-13 14:21:09.336 [INFO][3979] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:21:09.372027 env[1270]: 2024-12-13 14:21:09.337 [INFO][3979] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:21:09.372027 env[1270]: 2024-12-13 14:21:09.337 [INFO][3979] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.75edddca96a3925a258f8379e20a5c79c40acadcdcea8274a9b371f0a71b2dcb" host="localhost" Dec 13 14:21:09.372027 env[1270]: 2024-12-13 14:21:09.338 [INFO][3979] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.75edddca96a3925a258f8379e20a5c79c40acadcdcea8274a9b371f0a71b2dcb Dec 13 14:21:09.372027 env[1270]: 2024-12-13 14:21:09.340 [INFO][3979] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.75edddca96a3925a258f8379e20a5c79c40acadcdcea8274a9b371f0a71b2dcb" host="localhost" Dec 13 14:21:09.372027 env[1270]: 2024-12-13 14:21:09.344 [INFO][3979] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.75edddca96a3925a258f8379e20a5c79c40acadcdcea8274a9b371f0a71b2dcb" host="localhost" Dec 13 14:21:09.372027 env[1270]: 2024-12-13 14:21:09.345 [INFO][3979] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.75edddca96a3925a258f8379e20a5c79c40acadcdcea8274a9b371f0a71b2dcb" host="localhost" Dec 13 14:21:09.372027 env[1270]: 2024-12-13 14:21:09.345 [INFO][3979] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:21:09.372027 env[1270]: 2024-12-13 14:21:09.345 [INFO][3979] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="75edddca96a3925a258f8379e20a5c79c40acadcdcea8274a9b371f0a71b2dcb" HandleID="k8s-pod-network.75edddca96a3925a258f8379e20a5c79c40acadcdcea8274a9b371f0a71b2dcb" Workload="localhost-k8s-calico--kube--controllers--5948cc9557--vwt48-eth0" Dec 13 14:21:09.372688 env[1270]: 2024-12-13 14:21:09.348 [INFO][3961] cni-plugin/k8s.go 386: Populated endpoint ContainerID="75edddca96a3925a258f8379e20a5c79c40acadcdcea8274a9b371f0a71b2dcb" Namespace="calico-system" Pod="calico-kube-controllers-5948cc9557-vwt48" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5948cc9557--vwt48-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5948cc9557--vwt48-eth0", GenerateName:"calico-kube-controllers-5948cc9557-", Namespace:"calico-system", SelfLink:"", UID:"c3c31618-9087-40ec-ac13-e264b487ba1e", ResourceVersion:"811", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 20, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5948cc9557", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-5948cc9557-vwt48", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali66c43b208f7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:21:09.372688 env[1270]: 2024-12-13 14:21:09.348 [INFO][3961] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="75edddca96a3925a258f8379e20a5c79c40acadcdcea8274a9b371f0a71b2dcb" Namespace="calico-system" Pod="calico-kube-controllers-5948cc9557-vwt48" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5948cc9557--vwt48-eth0" Dec 13 14:21:09.372688 env[1270]: 2024-12-13 14:21:09.348 [INFO][3961] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali66c43b208f7 ContainerID="75edddca96a3925a258f8379e20a5c79c40acadcdcea8274a9b371f0a71b2dcb" Namespace="calico-system" Pod="calico-kube-controllers-5948cc9557-vwt48" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5948cc9557--vwt48-eth0" Dec 13 14:21:09.372688 env[1270]: 2024-12-13 14:21:09.351 [INFO][3961] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="75edddca96a3925a258f8379e20a5c79c40acadcdcea8274a9b371f0a71b2dcb" Namespace="calico-system" Pod="calico-kube-controllers-5948cc9557-vwt48" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5948cc9557--vwt48-eth0" Dec 13 14:21:09.372688 env[1270]: 2024-12-13 14:21:09.352 [INFO][3961] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="75edddca96a3925a258f8379e20a5c79c40acadcdcea8274a9b371f0a71b2dcb" Namespace="calico-system" Pod="calico-kube-controllers-5948cc9557-vwt48" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5948cc9557--vwt48-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5948cc9557--vwt48-eth0", GenerateName:"calico-kube-controllers-5948cc9557-", Namespace:"calico-system", SelfLink:"", UID:"c3c31618-9087-40ec-ac13-e264b487ba1e", ResourceVersion:"811", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 20, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5948cc9557", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"75edddca96a3925a258f8379e20a5c79c40acadcdcea8274a9b371f0a71b2dcb", Pod:"calico-kube-controllers-5948cc9557-vwt48", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali66c43b208f7", MAC:"3a:32:8f:ae:b3:69", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:21:09.372688 env[1270]: 2024-12-13 14:21:09.364 [INFO][3961] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="75edddca96a3925a258f8379e20a5c79c40acadcdcea8274a9b371f0a71b2dcb" Namespace="calico-system" Pod="calico-kube-controllers-5948cc9557-vwt48" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5948cc9557--vwt48-eth0" Dec 13 14:21:09.415901 systemd-networkd[1063]: cali4265f588a2e: Link UP Dec 13 14:21:09.417519 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4265f588a2e: link becomes ready Dec 13 14:21:09.417486 systemd-networkd[1063]: cali4265f588a2e: Gained carrier Dec 13 14:21:09.423000 audit[4015]: NETFILTER_CFG table=filter:106 family=2 entries=46 op=nft_register_chain pid=4015 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:21:09.423000 audit[4015]: SYSCALL arch=c000003e syscall=46 success=yes exit=22712 a0=3 a1=7ffe93134d90 a2=0 a3=7ffe93134d7c items=0 ppid=3358 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:09.423000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:21:09.431140 env[1270]: 2024-12-13 14:21:09.306 [INFO][3975] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7db6d8ff4d--bgsrp-eth0 coredns-7db6d8ff4d- kube-system ad4098cd-e162-4f9f-8435-adb35d1aa4c7 812 0 2024-12-13 14:20:36 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7db6d8ff4d-bgsrp eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali4265f588a2e [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="50d1c7acab3ed1bf7c1a5aa2e18ebe09f9dde7aed52541973faf4eb3c99e5b51" Namespace="kube-system" Pod="coredns-7db6d8ff4d-bgsrp" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--bgsrp-" Dec 13 14:21:09.431140 env[1270]: 2024-12-13 14:21:09.306 [INFO][3975] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="50d1c7acab3ed1bf7c1a5aa2e18ebe09f9dde7aed52541973faf4eb3c99e5b51" Namespace="kube-system" Pod="coredns-7db6d8ff4d-bgsrp" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--bgsrp-eth0" Dec 13 14:21:09.431140 env[1270]: 2024-12-13 14:21:09.353 [INFO][3993] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="50d1c7acab3ed1bf7c1a5aa2e18ebe09f9dde7aed52541973faf4eb3c99e5b51" HandleID="k8s-pod-network.50d1c7acab3ed1bf7c1a5aa2e18ebe09f9dde7aed52541973faf4eb3c99e5b51" Workload="localhost-k8s-coredns--7db6d8ff4d--bgsrp-eth0" Dec 13 14:21:09.431140 env[1270]: 2024-12-13 14:21:09.366 [INFO][3993] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="50d1c7acab3ed1bf7c1a5aa2e18ebe09f9dde7aed52541973faf4eb3c99e5b51" HandleID="k8s-pod-network.50d1c7acab3ed1bf7c1a5aa2e18ebe09f9dde7aed52541973faf4eb3c99e5b51" Workload="localhost-k8s-coredns--7db6d8ff4d--bgsrp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002e5710), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7db6d8ff4d-bgsrp", "timestamp":"2024-12-13 14:21:09.353570021 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:21:09.431140 env[1270]: 2024-12-13 14:21:09.366 [INFO][3993] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:21:09.431140 env[1270]: 2024-12-13 14:21:09.366 [INFO][3993] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:21:09.431140 env[1270]: 2024-12-13 14:21:09.366 [INFO][3993] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:21:09.431140 env[1270]: 2024-12-13 14:21:09.367 [INFO][3993] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.50d1c7acab3ed1bf7c1a5aa2e18ebe09f9dde7aed52541973faf4eb3c99e5b51" host="localhost" Dec 13 14:21:09.431140 env[1270]: 2024-12-13 14:21:09.370 [INFO][3993] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:21:09.431140 env[1270]: 2024-12-13 14:21:09.376 [INFO][3993] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:21:09.431140 env[1270]: 2024-12-13 14:21:09.381 [INFO][3993] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:21:09.431140 env[1270]: 2024-12-13 14:21:09.384 [INFO][3993] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:21:09.431140 env[1270]: 2024-12-13 14:21:09.384 [INFO][3993] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.50d1c7acab3ed1bf7c1a5aa2e18ebe09f9dde7aed52541973faf4eb3c99e5b51" host="localhost" Dec 13 14:21:09.431140 env[1270]: 2024-12-13 14:21:09.385 [INFO][3993] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.50d1c7acab3ed1bf7c1a5aa2e18ebe09f9dde7aed52541973faf4eb3c99e5b51 Dec 13 14:21:09.431140 env[1270]: 2024-12-13 14:21:09.389 [INFO][3993] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.50d1c7acab3ed1bf7c1a5aa2e18ebe09f9dde7aed52541973faf4eb3c99e5b51" host="localhost" Dec 13 14:21:09.431140 env[1270]: 2024-12-13 14:21:09.406 [INFO][3993] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.50d1c7acab3ed1bf7c1a5aa2e18ebe09f9dde7aed52541973faf4eb3c99e5b51" host="localhost" Dec 13 14:21:09.431140 env[1270]: 2024-12-13 14:21:09.406 [INFO][3993] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.50d1c7acab3ed1bf7c1a5aa2e18ebe09f9dde7aed52541973faf4eb3c99e5b51" host="localhost" Dec 13 14:21:09.431140 env[1270]: 2024-12-13 14:21:09.406 [INFO][3993] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:21:09.431140 env[1270]: 2024-12-13 14:21:09.406 [INFO][3993] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="50d1c7acab3ed1bf7c1a5aa2e18ebe09f9dde7aed52541973faf4eb3c99e5b51" HandleID="k8s-pod-network.50d1c7acab3ed1bf7c1a5aa2e18ebe09f9dde7aed52541973faf4eb3c99e5b51" Workload="localhost-k8s-coredns--7db6d8ff4d--bgsrp-eth0" Dec 13 14:21:09.431628 env[1270]: 2024-12-13 14:21:09.407 [INFO][3975] cni-plugin/k8s.go 386: Populated endpoint ContainerID="50d1c7acab3ed1bf7c1a5aa2e18ebe09f9dde7aed52541973faf4eb3c99e5b51" Namespace="kube-system" Pod="coredns-7db6d8ff4d-bgsrp" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--bgsrp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--bgsrp-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"ad4098cd-e162-4f9f-8435-adb35d1aa4c7", ResourceVersion:"812", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 20, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7db6d8ff4d-bgsrp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4265f588a2e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:21:09.431628 env[1270]: 2024-12-13 14:21:09.407 [INFO][3975] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="50d1c7acab3ed1bf7c1a5aa2e18ebe09f9dde7aed52541973faf4eb3c99e5b51" Namespace="kube-system" Pod="coredns-7db6d8ff4d-bgsrp" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--bgsrp-eth0" Dec 13 14:21:09.431628 env[1270]: 2024-12-13 14:21:09.407 [INFO][3975] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4265f588a2e ContainerID="50d1c7acab3ed1bf7c1a5aa2e18ebe09f9dde7aed52541973faf4eb3c99e5b51" Namespace="kube-system" Pod="coredns-7db6d8ff4d-bgsrp" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--bgsrp-eth0" Dec 13 14:21:09.431628 env[1270]: 2024-12-13 14:21:09.418 [INFO][3975] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="50d1c7acab3ed1bf7c1a5aa2e18ebe09f9dde7aed52541973faf4eb3c99e5b51" Namespace="kube-system" Pod="coredns-7db6d8ff4d-bgsrp" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--bgsrp-eth0" Dec 13 14:21:09.431628 env[1270]: 2024-12-13 14:21:09.418 [INFO][3975] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="50d1c7acab3ed1bf7c1a5aa2e18ebe09f9dde7aed52541973faf4eb3c99e5b51" Namespace="kube-system" Pod="coredns-7db6d8ff4d-bgsrp" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--bgsrp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--bgsrp-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"ad4098cd-e162-4f9f-8435-adb35d1aa4c7", ResourceVersion:"812", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 20, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"50d1c7acab3ed1bf7c1a5aa2e18ebe09f9dde7aed52541973faf4eb3c99e5b51", Pod:"coredns-7db6d8ff4d-bgsrp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4265f588a2e", MAC:"f2:b4:a2:84:0a:73", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:21:09.431628 env[1270]: 2024-12-13 14:21:09.430 [INFO][3975] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="50d1c7acab3ed1bf7c1a5aa2e18ebe09f9dde7aed52541973faf4eb3c99e5b51" Namespace="kube-system" Pod="coredns-7db6d8ff4d-bgsrp" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--bgsrp-eth0" Dec 13 14:21:09.444824 env[1270]: time="2024-12-13T14:21:09.436504316Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:21:09.444824 env[1270]: time="2024-12-13T14:21:09.436524982Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:21:09.444824 env[1270]: time="2024-12-13T14:21:09.436531936Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:21:09.444824 env[1270]: time="2024-12-13T14:21:09.436611997Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/75edddca96a3925a258f8379e20a5c79c40acadcdcea8274a9b371f0a71b2dcb pid=4024 runtime=io.containerd.runc.v2 Dec 13 14:21:09.473536 env[1270]: time="2024-12-13T14:21:09.468907873Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:21:09.473536 env[1270]: time="2024-12-13T14:21:09.468928831Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:21:09.473536 env[1270]: time="2024-12-13T14:21:09.468939811Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:21:09.473536 env[1270]: time="2024-12-13T14:21:09.469017660Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/50d1c7acab3ed1bf7c1a5aa2e18ebe09f9dde7aed52541973faf4eb3c99e5b51 pid=4055 runtime=io.containerd.runc.v2 Dec 13 14:21:09.486111 systemd[1]: Started cri-containerd-50d1c7acab3ed1bf7c1a5aa2e18ebe09f9dde7aed52541973faf4eb3c99e5b51.scope. Dec 13 14:21:09.501144 systemd[1]: Started cri-containerd-75edddca96a3925a258f8379e20a5c79c40acadcdcea8274a9b371f0a71b2dcb.scope. Dec 13 14:21:09.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.525000 audit: BPF prog-id=171 op=LOAD Dec 13 14:21:09.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.526000 audit: BPF prog-id=172 op=LOAD Dec 13 14:21:09.526000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.526000 audit[4067]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4055 pid=4067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:09.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530643163376163616233656431626637633161356161326531386562 Dec 13 14:21:09.526000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.526000 audit[4067]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4055 pid=4067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:09.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530643163376163616233656431626637633161356161326531386562 Dec 13 14:21:09.526000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.526000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.526000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.526000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.526000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.526000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.526000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.526000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.526000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.526000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.526000 audit: BPF prog-id=173 op=LOAD Dec 13 14:21:09.526000 audit[4067]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003d2920 items=0 ppid=4055 pid=4067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:09.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530643163376163616233656431626637633161356161326531386562 Dec 13 14:21:09.527000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit: BPF prog-id=174 op=LOAD Dec 13 14:21:09.527000 audit[4067]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003d2968 items=0 ppid=4055 pid=4067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:09.527000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530643163376163616233656431626637633161356161326531386562 Dec 13 14:21:09.527000 audit: BPF prog-id=174 op=UNLOAD Dec 13 14:21:09.527000 audit: BPF prog-id=173 op=UNLOAD Dec 13 14:21:09.527000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit[4067]: AVC avc: denied { perfmon } for pid=4067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit[4045]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4024 pid=4045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:09.527000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735656464646361393661333932356132353866383337396532306135 Dec 13 14:21:09.527000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit[4067]: AVC avc: denied { bpf } for pid=4067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit: BPF prog-id=175 op=LOAD Dec 13 14:21:09.527000 audit[4067]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003d2d78 items=0 ppid=4055 pid=4067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:09.527000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530643163376163616233656431626637633161356161326531386562 Dec 13 14:21:09.527000 audit[4045]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4024 pid=4045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:09.527000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735656464646361393661333932356132353866383337396532306135 Dec 13 14:21:09.527000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit: BPF prog-id=176 op=LOAD Dec 13 14:21:09.527000 audit[4045]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002b3e30 items=0 ppid=4024 pid=4045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:09.527000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735656464646361393661333932356132353866383337396532306135 Dec 13 14:21:09.527000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.527000 audit: BPF prog-id=177 op=LOAD Dec 13 14:21:09.527000 audit[4045]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002b3e78 items=0 ppid=4024 pid=4045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:09.527000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735656464646361393661333932356132353866383337396532306135 Dec 13 14:21:09.528000 audit: BPF prog-id=177 op=UNLOAD Dec 13 14:21:09.528000 audit: BPF prog-id=176 op=UNLOAD Dec 13 14:21:09.528000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.528000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.528000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.528000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.528000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.528000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.528000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.528000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.528000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.528000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.528000 audit: BPF prog-id=178 op=LOAD Dec 13 14:21:09.528000 audit[4045]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000332288 items=0 ppid=4024 pid=4045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:09.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735656464646361393661333932356132353866383337396532306135 Dec 13 14:21:09.537666 systemd-resolved[1205]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:21:09.571891 systemd-resolved[1205]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:21:09.586000 audit[4044]: NETFILTER_CFG table=filter:107 family=2 entries=42 op=nft_register_chain pid=4044 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:21:09.586000 audit[4044]: SYSCALL arch=c000003e syscall=46 success=yes exit=20596 a0=3 a1=7ffe0b0f47e0 a2=0 a3=7ffe0b0f47cc items=0 ppid=3358 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:09.586000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:21:09.612013 env[1270]: time="2024-12-13T14:21:09.611538824Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5948cc9557-vwt48,Uid:c3c31618-9087-40ec-ac13-e264b487ba1e,Namespace:calico-system,Attempt:1,} returns sandbox id \"75edddca96a3925a258f8379e20a5c79c40acadcdcea8274a9b371f0a71b2dcb\"" Dec 13 14:21:09.614202 env[1270]: time="2024-12-13T14:21:09.614181499Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-bgsrp,Uid:ad4098cd-e162-4f9f-8435-adb35d1aa4c7,Namespace:kube-system,Attempt:1,} returns sandbox id \"50d1c7acab3ed1bf7c1a5aa2e18ebe09f9dde7aed52541973faf4eb3c99e5b51\"" Dec 13 14:21:09.627882 env[1270]: time="2024-12-13T14:21:09.624116204Z" level=info msg="CreateContainer within sandbox \"50d1c7acab3ed1bf7c1a5aa2e18ebe09f9dde7aed52541973faf4eb3c99e5b51\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:21:09.659183 env[1270]: time="2024-12-13T14:21:09.659153503Z" level=info msg="CreateContainer within sandbox \"50d1c7acab3ed1bf7c1a5aa2e18ebe09f9dde7aed52541973faf4eb3c99e5b51\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"8751eafe1518f30a2e7406e97a074e6463ede3257367d127f37bc47541da4475\"" Dec 13 14:21:09.660305 env[1270]: time="2024-12-13T14:21:09.660287914Z" level=info msg="StartContainer for \"8751eafe1518f30a2e7406e97a074e6463ede3257367d127f37bc47541da4475\"" Dec 13 14:21:09.686121 systemd[1]: Started cri-containerd-8751eafe1518f30a2e7406e97a074e6463ede3257367d127f37bc47541da4475.scope. Dec 13 14:21:09.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.698000 audit: BPF prog-id=179 op=LOAD Dec 13 14:21:09.699000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.699000 audit[4114]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4055 pid=4114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:09.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837353165616665313531386633306132653734303665393761303734 Dec 13 14:21:09.699000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.699000 audit[4114]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4055 pid=4114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:09.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837353165616665313531386633306132653734303665393761303734 Dec 13 14:21:09.700000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.700000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.700000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.700000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.700000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.700000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.700000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.700000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.700000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.700000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.700000 audit: BPF prog-id=180 op=LOAD Dec 13 14:21:09.700000 audit[4114]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00028f780 items=0 ppid=4055 pid=4114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:09.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837353165616665313531386633306132653734303665393761303734 Dec 13 14:21:09.700000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.700000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.700000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.700000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.700000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.700000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.700000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.700000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.700000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.700000 audit: BPF prog-id=181 op=LOAD Dec 13 14:21:09.700000 audit[4114]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00028f7c8 items=0 ppid=4055 pid=4114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:09.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837353165616665313531386633306132653734303665393761303734 Dec 13 14:21:09.701000 audit: BPF prog-id=181 op=UNLOAD Dec 13 14:21:09.701000 audit: BPF prog-id=180 op=UNLOAD Dec 13 14:21:09.701000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.701000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.701000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.701000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.701000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.701000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.701000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.701000 audit[4114]: AVC avc: denied { perfmon } for pid=4114 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.701000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.701000 audit[4114]: AVC avc: denied { bpf } for pid=4114 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:09.701000 audit: BPF prog-id=182 op=LOAD Dec 13 14:21:09.701000 audit[4114]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00028fbd8 items=0 ppid=4055 pid=4114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:09.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837353165616665313531386633306132653734303665393761303734 Dec 13 14:21:09.714929 env[1270]: time="2024-12-13T14:21:09.714903800Z" level=info msg="StartContainer for \"8751eafe1518f30a2e7406e97a074e6463ede3257367d127f37bc47541da4475\" returns successfully" Dec 13 14:21:09.943644 systemd-networkd[1063]: cali2e8ba23fe98: Gained IPv6LL Dec 13 14:21:10.013431 kubelet[2196]: I1213 14:21:10.013399 2196 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-bgsrp" podStartSLOduration=34.013374721 podStartE2EDuration="34.013374721s" podCreationTimestamp="2024-12-13 14:20:36 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:21:09.979424367 +0000 UTC m=+48.334444153" watchObservedRunningTime="2024-12-13 14:21:10.013374721 +0000 UTC m=+48.368394505" Dec 13 14:21:10.041000 audit[4144]: NETFILTER_CFG table=filter:108 family=2 entries=13 op=nft_register_rule pid=4144 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:21:10.041000 audit[4144]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fffbb3bc3a0 a2=0 a3=7fffbb3bc38c items=0 ppid=2329 pid=4144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:10.041000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:10.047000 audit[4144]: NETFILTER_CFG table=nat:109 family=2 entries=35 op=nft_register_chain pid=4144 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:21:10.047000 audit[4144]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fffbb3bc3a0 a2=0 a3=7fffbb3bc38c items=0 ppid=2329 pid=4144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:10.047000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:10.188895 env[1270]: time="2024-12-13T14:21:10.188856448Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:10.190713 env[1270]: time="2024-12-13T14:21:10.190687492Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:10.192091 env[1270]: time="2024-12-13T14:21:10.192073226Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:10.193297 env[1270]: time="2024-12-13T14:21:10.193260007Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:10.194619 env[1270]: time="2024-12-13T14:21:10.194598019Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 14:21:10.198225 env[1270]: time="2024-12-13T14:21:10.197814399Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:21:10.202457 env[1270]: time="2024-12-13T14:21:10.202423616Z" level=info msg="CreateContainer within sandbox \"e39611e7796ee42eadfb10d638eaf3e6ec8e8950835e601639543ee903a66409\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:21:10.215606 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount753173032.mount: Deactivated successfully. Dec 13 14:21:10.231735 env[1270]: time="2024-12-13T14:21:10.231706319Z" level=info msg="CreateContainer within sandbox \"e39611e7796ee42eadfb10d638eaf3e6ec8e8950835e601639543ee903a66409\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"9ae3c7fc24f936fba1d1bcf2f06c5ac1f6b6c57f46f1926cf28dde81d7e01457\"" Dec 13 14:21:10.232362 env[1270]: time="2024-12-13T14:21:10.232344778Z" level=info msg="StartContainer for \"9ae3c7fc24f936fba1d1bcf2f06c5ac1f6b6c57f46f1926cf28dde81d7e01457\"" Dec 13 14:21:10.257959 systemd[1]: Started cri-containerd-9ae3c7fc24f936fba1d1bcf2f06c5ac1f6b6c57f46f1926cf28dde81d7e01457.scope. Dec 13 14:21:10.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.270000 audit: BPF prog-id=183 op=LOAD Dec 13 14:21:10.270000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.270000 audit[4153]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=3625 pid=4153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:10.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961653363376663323466393336666261316431626366326630366335 Dec 13 14:21:10.271000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.271000 audit[4153]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=3625 pid=4153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:10.271000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961653363376663323466393336666261316431626366326630366335 Dec 13 14:21:10.271000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.271000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.271000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.271000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.271000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.271000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.271000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.271000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.271000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.271000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.271000 audit: BPF prog-id=184 op=LOAD Dec 13 14:21:10.271000 audit[4153]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c0002851e0 items=0 ppid=3625 pid=4153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:10.271000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961653363376663323466393336666261316431626366326630366335 Dec 13 14:21:10.271000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.271000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.271000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.271000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.271000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.271000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.271000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.271000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.271000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.271000 audit: BPF prog-id=185 op=LOAD Dec 13 14:21:10.271000 audit[4153]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c000285228 items=0 ppid=3625 pid=4153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:10.271000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961653363376663323466393336666261316431626366326630366335 Dec 13 14:21:10.272000 audit: BPF prog-id=185 op=UNLOAD Dec 13 14:21:10.272000 audit: BPF prog-id=184 op=UNLOAD Dec 13 14:21:10.272000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.272000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.272000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.272000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.272000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.272000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.272000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.272000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.272000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.272000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.272000 audit: BPF prog-id=186 op=LOAD Dec 13 14:21:10.272000 audit[4153]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c000285638 items=0 ppid=3625 pid=4153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:10.272000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961653363376663323466393336666261316431626366326630366335 Dec 13 14:21:10.322163 env[1270]: time="2024-12-13T14:21:10.322127708Z" level=info msg="StartContainer for \"9ae3c7fc24f936fba1d1bcf2f06c5ac1f6b6c57f46f1926cf28dde81d7e01457\" returns successfully" Dec 13 14:21:10.593706 env[1270]: time="2024-12-13T14:21:10.593683304Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:10.598136 env[1270]: time="2024-12-13T14:21:10.598116016Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:10.601316 env[1270]: time="2024-12-13T14:21:10.601286198Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:10.602316 env[1270]: time="2024-12-13T14:21:10.602301856Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:10.602592 env[1270]: time="2024-12-13T14:21:10.602560408Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 14:21:10.603889 env[1270]: time="2024-12-13T14:21:10.603877684Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 14:21:10.634110 env[1270]: time="2024-12-13T14:21:10.634085819Z" level=info msg="CreateContainer within sandbox \"4a272e06193831e86f42cea2a349f8460cd3bf088b2711071c904d29429e625f\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:21:10.667178 env[1270]: time="2024-12-13T14:21:10.667144001Z" level=info msg="CreateContainer within sandbox \"4a272e06193831e86f42cea2a349f8460cd3bf088b2711071c904d29429e625f\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"e950dd499a19b61928126ba50376e7504ad17bf8b787a08d32984cf1ec902d3e\"" Dec 13 14:21:10.667785 env[1270]: time="2024-12-13T14:21:10.667767332Z" level=info msg="StartContainer for \"e950dd499a19b61928126ba50376e7504ad17bf8b787a08d32984cf1ec902d3e\"" Dec 13 14:21:10.678896 systemd[1]: Started cri-containerd-e950dd499a19b61928126ba50376e7504ad17bf8b787a08d32984cf1ec902d3e.scope. Dec 13 14:21:10.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.701000 audit: BPF prog-id=187 op=LOAD Dec 13 14:21:10.702000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.702000 audit[4191]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3769 pid=4191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:10.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539353064643439396131396236313932383132366261353033373665 Dec 13 14:21:10.702000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.702000 audit[4191]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3769 pid=4191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:10.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539353064643439396131396236313932383132366261353033373665 Dec 13 14:21:10.702000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.702000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.702000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.702000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.702000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.702000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.702000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.702000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.702000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.702000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.702000 audit: BPF prog-id=188 op=LOAD Dec 13 14:21:10.702000 audit[4191]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000255d10 items=0 ppid=3769 pid=4191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:10.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539353064643439396131396236313932383132366261353033373665 Dec 13 14:21:10.702000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.702000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.702000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.702000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.702000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.702000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.702000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.702000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.702000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.702000 audit: BPF prog-id=189 op=LOAD Dec 13 14:21:10.702000 audit[4191]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000255d58 items=0 ppid=3769 pid=4191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:10.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539353064643439396131396236313932383132366261353033373665 Dec 13 14:21:10.702000 audit: BPF prog-id=189 op=UNLOAD Dec 13 14:21:10.702000 audit: BPF prog-id=188 op=UNLOAD Dec 13 14:21:10.702000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.702000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.702000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.702000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.702000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.702000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.702000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.702000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.702000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.702000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:10.702000 audit: BPF prog-id=190 op=LOAD Dec 13 14:21:10.702000 audit[4191]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000358168 items=0 ppid=3769 pid=4191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:10.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539353064643439396131396236313932383132366261353033373665 Dec 13 14:21:10.711592 systemd-networkd[1063]: cali4265f588a2e: Gained IPv6LL Dec 13 14:21:10.731051 env[1270]: time="2024-12-13T14:21:10.731012541Z" level=info msg="StartContainer for \"e950dd499a19b61928126ba50376e7504ad17bf8b787a08d32984cf1ec902d3e\" returns successfully" Dec 13 14:21:10.823027 env[1270]: time="2024-12-13T14:21:10.822995122Z" level=info msg="StopPodSandbox for \"444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b\"" Dec 13 14:21:10.884000 audit[4163]: AVC avc: denied { watch } for pid=4163 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_20_54.808679544/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c258 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c248,c258 tclass=file permissive=0 Dec 13 14:21:10.884000 audit[4163]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c26340 a2=fc6 a3=0 items=0 ppid=3625 pid=4163 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c258 key=(null) Dec 13 14:21:10.884000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:21:10.997760 kubelet[2196]: I1213 14:21:10.997723 2196 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-c756dccf-qwttr" podStartSLOduration=26.104833145 podStartE2EDuration="28.997710156s" podCreationTimestamp="2024-12-13 14:20:42 +0000 UTC" firstStartedPulling="2024-12-13 14:21:07.30449498 +0000 UTC m=+45.659514761" lastFinishedPulling="2024-12-13 14:21:10.197371995 +0000 UTC m=+48.552391772" observedRunningTime="2024-12-13 14:21:10.978595953 +0000 UTC m=+49.333615743" watchObservedRunningTime="2024-12-13 14:21:10.997710156 +0000 UTC m=+49.352729939" Dec 13 14:21:10.998112 kubelet[2196]: I1213 14:21:10.997783 2196 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-c756dccf-h6pbq" podStartSLOduration=26.551591267 podStartE2EDuration="28.997778438s" podCreationTimestamp="2024-12-13 14:20:42 +0000 UTC" firstStartedPulling="2024-12-13 14:21:08.157021368 +0000 UTC m=+46.512041148" lastFinishedPulling="2024-12-13 14:21:10.603208537 +0000 UTC m=+48.958228319" observedRunningTime="2024-12-13 14:21:10.997347941 +0000 UTC m=+49.352367727" watchObservedRunningTime="2024-12-13 14:21:10.997778438 +0000 UTC m=+49.352798228" Dec 13 14:21:11.019000 audit[4241]: NETFILTER_CFG table=filter:110 family=2 entries=10 op=nft_register_rule pid=4241 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:21:11.019000 audit[4241]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe46a01170 a2=0 a3=7ffe46a0115c items=0 ppid=2329 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:11.019000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:11.056000 audit[4241]: NETFILTER_CFG table=nat:111 family=2 entries=56 op=nft_register_chain pid=4241 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:21:11.056000 audit[4241]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffe46a01170 a2=0 a3=7ffe46a0115c items=0 ppid=2329 pid=4241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:11.056000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:11.088041 env[1270]: 2024-12-13 14:21:11.041 [INFO][4235] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" Dec 13 14:21:11.088041 env[1270]: 2024-12-13 14:21:11.047 [INFO][4235] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" iface="eth0" netns="/var/run/netns/cni-de70e352-e369-fdc1-d8af-d1fc6038ddf3" Dec 13 14:21:11.088041 env[1270]: 2024-12-13 14:21:11.047 [INFO][4235] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" iface="eth0" netns="/var/run/netns/cni-de70e352-e369-fdc1-d8af-d1fc6038ddf3" Dec 13 14:21:11.088041 env[1270]: 2024-12-13 14:21:11.047 [INFO][4235] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" iface="eth0" netns="/var/run/netns/cni-de70e352-e369-fdc1-d8af-d1fc6038ddf3" Dec 13 14:21:11.088041 env[1270]: 2024-12-13 14:21:11.047 [INFO][4235] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" Dec 13 14:21:11.088041 env[1270]: 2024-12-13 14:21:11.047 [INFO][4235] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" Dec 13 14:21:11.088041 env[1270]: 2024-12-13 14:21:11.073 [INFO][4245] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" HandleID="k8s-pod-network.444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" Workload="localhost-k8s-csi--node--driver--l59ps-eth0" Dec 13 14:21:11.088041 env[1270]: 2024-12-13 14:21:11.073 [INFO][4245] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:21:11.088041 env[1270]: 2024-12-13 14:21:11.073 [INFO][4245] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:21:11.088041 env[1270]: 2024-12-13 14:21:11.083 [WARNING][4245] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" HandleID="k8s-pod-network.444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" Workload="localhost-k8s-csi--node--driver--l59ps-eth0" Dec 13 14:21:11.088041 env[1270]: 2024-12-13 14:21:11.083 [INFO][4245] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" HandleID="k8s-pod-network.444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" Workload="localhost-k8s-csi--node--driver--l59ps-eth0" Dec 13 14:21:11.088041 env[1270]: 2024-12-13 14:21:11.084 [INFO][4245] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:21:11.088041 env[1270]: 2024-12-13 14:21:11.086 [INFO][4235] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" Dec 13 14:21:11.090085 env[1270]: time="2024-12-13T14:21:11.088209545Z" level=info msg="TearDown network for sandbox \"444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b\" successfully" Dec 13 14:21:11.090085 env[1270]: time="2024-12-13T14:21:11.088235085Z" level=info msg="StopPodSandbox for \"444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b\" returns successfully" Dec 13 14:21:11.090085 env[1270]: time="2024-12-13T14:21:11.088696959Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-l59ps,Uid:ea4acfc8-bc78-49a6-862f-fde7fb7796eb,Namespace:calico-system,Attempt:1,}" Dec 13 14:21:11.112188 systemd[1]: run-containerd-runc-k8s.io-9ae3c7fc24f936fba1d1bcf2f06c5ac1f6b6c57f46f1926cf28dde81d7e01457-runc.g7Y7kn.mount: Deactivated successfully. Dec 13 14:21:11.112277 systemd[1]: run-netns-cni\x2dde70e352\x2de369\x2dfdc1\x2dd8af\x2dd1fc6038ddf3.mount: Deactivated successfully. Dec 13 14:21:11.235504 systemd-networkd[1063]: cali63b652fed73: Link UP Dec 13 14:21:11.238814 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:21:11.238861 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali63b652fed73: link becomes ready Dec 13 14:21:11.238716 systemd-networkd[1063]: cali63b652fed73: Gained carrier Dec 13 14:21:11.252111 env[1270]: 2024-12-13 14:21:11.141 [INFO][4251] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--l59ps-eth0 csi-node-driver- calico-system ea4acfc8-bc78-49a6-862f-fde7fb7796eb 856 0 2024-12-13 14:20:42 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:65bf684474 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-l59ps eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali63b652fed73 [] []}} ContainerID="4368338633bad042a80af24c1c93489f3ff614b53a2e1815b423195302b8eb2a" Namespace="calico-system" Pod="csi-node-driver-l59ps" WorkloadEndpoint="localhost-k8s-csi--node--driver--l59ps-" Dec 13 14:21:11.252111 env[1270]: 2024-12-13 14:21:11.141 [INFO][4251] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="4368338633bad042a80af24c1c93489f3ff614b53a2e1815b423195302b8eb2a" Namespace="calico-system" Pod="csi-node-driver-l59ps" WorkloadEndpoint="localhost-k8s-csi--node--driver--l59ps-eth0" Dec 13 14:21:11.252111 env[1270]: 2024-12-13 14:21:11.186 [INFO][4263] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4368338633bad042a80af24c1c93489f3ff614b53a2e1815b423195302b8eb2a" HandleID="k8s-pod-network.4368338633bad042a80af24c1c93489f3ff614b53a2e1815b423195302b8eb2a" Workload="localhost-k8s-csi--node--driver--l59ps-eth0" Dec 13 14:21:11.252111 env[1270]: 2024-12-13 14:21:11.193 [INFO][4263] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4368338633bad042a80af24c1c93489f3ff614b53a2e1815b423195302b8eb2a" HandleID="k8s-pod-network.4368338633bad042a80af24c1c93489f3ff614b53a2e1815b423195302b8eb2a" Workload="localhost-k8s-csi--node--driver--l59ps-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003ba530), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-l59ps", "timestamp":"2024-12-13 14:21:11.186616366 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:21:11.252111 env[1270]: 2024-12-13 14:21:11.194 [INFO][4263] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:21:11.252111 env[1270]: 2024-12-13 14:21:11.194 [INFO][4263] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:21:11.252111 env[1270]: 2024-12-13 14:21:11.194 [INFO][4263] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:21:11.252111 env[1270]: 2024-12-13 14:21:11.194 [INFO][4263] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4368338633bad042a80af24c1c93489f3ff614b53a2e1815b423195302b8eb2a" host="localhost" Dec 13 14:21:11.252111 env[1270]: 2024-12-13 14:21:11.196 [INFO][4263] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:21:11.252111 env[1270]: 2024-12-13 14:21:11.198 [INFO][4263] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:21:11.252111 env[1270]: 2024-12-13 14:21:11.199 [INFO][4263] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:21:11.252111 env[1270]: 2024-12-13 14:21:11.200 [INFO][4263] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:21:11.252111 env[1270]: 2024-12-13 14:21:11.200 [INFO][4263] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.4368338633bad042a80af24c1c93489f3ff614b53a2e1815b423195302b8eb2a" host="localhost" Dec 13 14:21:11.252111 env[1270]: 2024-12-13 14:21:11.212 [INFO][4263] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.4368338633bad042a80af24c1c93489f3ff614b53a2e1815b423195302b8eb2a Dec 13 14:21:11.252111 env[1270]: 2024-12-13 14:21:11.215 [INFO][4263] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.4368338633bad042a80af24c1c93489f3ff614b53a2e1815b423195302b8eb2a" host="localhost" Dec 13 14:21:11.252111 env[1270]: 2024-12-13 14:21:11.223 [INFO][4263] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.4368338633bad042a80af24c1c93489f3ff614b53a2e1815b423195302b8eb2a" host="localhost" Dec 13 14:21:11.252111 env[1270]: 2024-12-13 14:21:11.223 [INFO][4263] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.4368338633bad042a80af24c1c93489f3ff614b53a2e1815b423195302b8eb2a" host="localhost" Dec 13 14:21:11.252111 env[1270]: 2024-12-13 14:21:11.223 [INFO][4263] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:21:11.252111 env[1270]: 2024-12-13 14:21:11.223 [INFO][4263] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="4368338633bad042a80af24c1c93489f3ff614b53a2e1815b423195302b8eb2a" HandleID="k8s-pod-network.4368338633bad042a80af24c1c93489f3ff614b53a2e1815b423195302b8eb2a" Workload="localhost-k8s-csi--node--driver--l59ps-eth0" Dec 13 14:21:11.252843 env[1270]: 2024-12-13 14:21:11.233 [INFO][4251] cni-plugin/k8s.go 386: Populated endpoint ContainerID="4368338633bad042a80af24c1c93489f3ff614b53a2e1815b423195302b8eb2a" Namespace="calico-system" Pod="csi-node-driver-l59ps" WorkloadEndpoint="localhost-k8s-csi--node--driver--l59ps-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--l59ps-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ea4acfc8-bc78-49a6-862f-fde7fb7796eb", ResourceVersion:"856", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 20, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-l59ps", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali63b652fed73", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:21:11.252843 env[1270]: 2024-12-13 14:21:11.233 [INFO][4251] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="4368338633bad042a80af24c1c93489f3ff614b53a2e1815b423195302b8eb2a" Namespace="calico-system" Pod="csi-node-driver-l59ps" WorkloadEndpoint="localhost-k8s-csi--node--driver--l59ps-eth0" Dec 13 14:21:11.252843 env[1270]: 2024-12-13 14:21:11.233 [INFO][4251] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali63b652fed73 ContainerID="4368338633bad042a80af24c1c93489f3ff614b53a2e1815b423195302b8eb2a" Namespace="calico-system" Pod="csi-node-driver-l59ps" WorkloadEndpoint="localhost-k8s-csi--node--driver--l59ps-eth0" Dec 13 14:21:11.252843 env[1270]: 2024-12-13 14:21:11.236 [INFO][4251] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4368338633bad042a80af24c1c93489f3ff614b53a2e1815b423195302b8eb2a" Namespace="calico-system" Pod="csi-node-driver-l59ps" WorkloadEndpoint="localhost-k8s-csi--node--driver--l59ps-eth0" Dec 13 14:21:11.252843 env[1270]: 2024-12-13 14:21:11.239 [INFO][4251] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="4368338633bad042a80af24c1c93489f3ff614b53a2e1815b423195302b8eb2a" Namespace="calico-system" Pod="csi-node-driver-l59ps" WorkloadEndpoint="localhost-k8s-csi--node--driver--l59ps-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--l59ps-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ea4acfc8-bc78-49a6-862f-fde7fb7796eb", ResourceVersion:"856", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 20, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4368338633bad042a80af24c1c93489f3ff614b53a2e1815b423195302b8eb2a", Pod:"csi-node-driver-l59ps", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali63b652fed73", MAC:"be:c7:e7:ae:81:c8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:21:11.252843 env[1270]: 2024-12-13 14:21:11.250 [INFO][4251] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="4368338633bad042a80af24c1c93489f3ff614b53a2e1815b423195302b8eb2a" Namespace="calico-system" Pod="csi-node-driver-l59ps" WorkloadEndpoint="localhost-k8s-csi--node--driver--l59ps-eth0" Dec 13 14:21:11.267576 env[1270]: time="2024-12-13T14:21:11.267526705Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:21:11.267696 env[1270]: time="2024-12-13T14:21:11.267682256Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:21:11.267769 env[1270]: time="2024-12-13T14:21:11.267756100Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:21:11.268002 env[1270]: time="2024-12-13T14:21:11.267959717Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4368338633bad042a80af24c1c93489f3ff614b53a2e1815b423195302b8eb2a pid=4288 runtime=io.containerd.runc.v2 Dec 13 14:21:11.279684 systemd[1]: Started cri-containerd-4368338633bad042a80af24c1c93489f3ff614b53a2e1815b423195302b8eb2a.scope. Dec 13 14:21:11.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.298000 audit: BPF prog-id=191 op=LOAD Dec 13 14:21:11.299000 audit[4298]: AVC avc: denied { bpf } for pid=4298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.299000 audit[4298]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4288 pid=4298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:11.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433363833333836333362616430343261383061663234633163393334 Dec 13 14:21:11.299000 audit[4298]: AVC avc: denied { perfmon } for pid=4298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.299000 audit[4298]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4288 pid=4298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:11.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433363833333836333362616430343261383061663234633163393334 Dec 13 14:21:11.299000 audit[4298]: AVC avc: denied { bpf } for pid=4298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.299000 audit[4298]: AVC avc: denied { bpf } for pid=4298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.299000 audit[4298]: AVC avc: denied { bpf } for pid=4298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.299000 audit[4298]: AVC avc: denied { perfmon } for pid=4298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.299000 audit[4298]: AVC avc: denied { perfmon } for pid=4298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.299000 audit[4298]: AVC avc: denied { perfmon } for pid=4298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.299000 audit[4298]: AVC avc: denied { perfmon } for pid=4298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.299000 audit[4298]: AVC avc: denied { perfmon } for pid=4298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.299000 audit[4298]: AVC avc: denied { bpf } for pid=4298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.299000 audit[4298]: AVC avc: denied { bpf } for pid=4298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.299000 audit: BPF prog-id=192 op=LOAD Dec 13 14:21:11.294000 audit[4310]: NETFILTER_CFG table=filter:112 family=2 entries=56 op=nft_register_chain pid=4310 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:21:11.294000 audit[4310]: SYSCALL arch=c000003e syscall=46 success=yes exit=26244 a0=3 a1=7ffcc6ad7950 a2=0 a3=7ffcc6ad793c items=0 ppid=3358 pid=4310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:11.294000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:21:11.299000 audit[4298]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000385950 items=0 ppid=4288 pid=4298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:11.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433363833333836333362616430343261383061663234633163393334 Dec 13 14:21:11.300000 audit[4298]: AVC avc: denied { bpf } for pid=4298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.300000 audit[4298]: AVC avc: denied { bpf } for pid=4298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.300000 audit[4298]: AVC avc: denied { perfmon } for pid=4298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.300000 audit[4298]: AVC avc: denied { perfmon } for pid=4298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.300000 audit[4298]: AVC avc: denied { perfmon } for pid=4298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.300000 audit[4298]: AVC avc: denied { perfmon } for pid=4298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.300000 audit[4298]: AVC avc: denied { perfmon } for pid=4298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.300000 audit[4298]: AVC avc: denied { bpf } for pid=4298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.300000 audit[4298]: AVC avc: denied { bpf } for pid=4298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.300000 audit: BPF prog-id=193 op=LOAD Dec 13 14:21:11.300000 audit[4298]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000385998 items=0 ppid=4288 pid=4298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:11.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433363833333836333362616430343261383061663234633163393334 Dec 13 14:21:11.300000 audit: BPF prog-id=193 op=UNLOAD Dec 13 14:21:11.300000 audit: BPF prog-id=192 op=UNLOAD Dec 13 14:21:11.300000 audit[4298]: AVC avc: denied { bpf } for pid=4298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.300000 audit[4298]: AVC avc: denied { bpf } for pid=4298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.300000 audit[4298]: AVC avc: denied { bpf } for pid=4298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.300000 audit[4298]: AVC avc: denied { perfmon } for pid=4298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.300000 audit[4298]: AVC avc: denied { perfmon } for pid=4298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.300000 audit[4298]: AVC avc: denied { perfmon } for pid=4298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.300000 audit[4298]: AVC avc: denied { perfmon } for pid=4298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.300000 audit[4298]: AVC avc: denied { perfmon } for pid=4298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.300000 audit[4298]: AVC avc: denied { bpf } for pid=4298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.300000 audit[4298]: AVC avc: denied { bpf } for pid=4298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:11.300000 audit: BPF prog-id=194 op=LOAD Dec 13 14:21:11.300000 audit[4298]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000385da8 items=0 ppid=4288 pid=4298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:11.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433363833333836333362616430343261383061663234633163393334 Dec 13 14:21:11.301521 systemd-resolved[1205]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:21:11.317357 env[1270]: time="2024-12-13T14:21:11.317322969Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-l59ps,Uid:ea4acfc8-bc78-49a6-862f-fde7fb7796eb,Namespace:calico-system,Attempt:1,} returns sandbox id \"4368338633bad042a80af24c1c93489f3ff614b53a2e1815b423195302b8eb2a\"" Dec 13 14:21:11.351607 systemd-networkd[1063]: cali66c43b208f7: Gained IPv6LL Dec 13 14:21:11.355000 audit[4201]: AVC avc: denied { watch } for pid=4201 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_20_54.3809385326/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c937 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c426,c937 tclass=file permissive=0 Dec 13 14:21:11.355000 audit[4201]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000bc4000 a2=fc6 a3=0 items=0 ppid=3769 pid=4201 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c937 key=(null) Dec 13 14:21:11.355000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:21:12.055307 kubelet[2196]: I1213 14:21:12.055274 2196 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:21:12.066000 audit[4325]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4325 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:21:12.066000 audit[4325]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe481ee3c0 a2=0 a3=7ffe481ee3ac items=0 ppid=2329 pid=4325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:12.066000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:12.071000 audit[4325]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4325 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:21:12.071000 audit[4325]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe481ee3c0 a2=0 a3=7ffe481ee3ac items=0 ppid=2329 pid=4325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:12.071000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:12.440438 kernel: kauditd_printk_skb: 608 callbacks suppressed Dec 13 14:21:12.440557 kernel: audit: type=1325 audit(1734099672.432:1287): table=filter:115 family=2 entries=9 op=nft_register_rule pid=4328 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:21:12.450108 kernel: audit: type=1300 audit(1734099672.432:1287): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff205b31b0 a2=0 a3=7fff205b319c items=0 ppid=2329 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:12.450159 kernel: audit: type=1327 audit(1734099672.432:1287): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:12.450177 kernel: audit: type=1325 audit(1734099672.446:1288): table=nat:116 family=2 entries=27 op=nft_register_chain pid=4328 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:21:12.432000 audit[4328]: NETFILTER_CFG table=filter:115 family=2 entries=9 op=nft_register_rule pid=4328 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:21:12.432000 audit[4328]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff205b31b0 a2=0 a3=7fff205b319c items=0 ppid=2329 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:12.432000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:12.446000 audit[4328]: NETFILTER_CFG table=nat:116 family=2 entries=27 op=nft_register_chain pid=4328 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:21:12.446000 audit[4328]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fff205b31b0 a2=0 a3=7fff205b319c items=0 ppid=2329 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:12.446000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:12.456669 kernel: audit: type=1300 audit(1734099672.446:1288): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fff205b31b0 a2=0 a3=7fff205b319c items=0 ppid=2329 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:12.456716 kernel: audit: type=1327 audit(1734099672.446:1288): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:12.631585 systemd-networkd[1063]: cali63b652fed73: Gained IPv6LL Dec 13 14:21:17.649255 env[1270]: time="2024-12-13T14:21:17.649195509Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:17.663000 audit[2022]: AVC avc: denied { watch } for pid=2022 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:21:17.663000 audit[2022]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c6ec80 a2=fc6 a3=0 items=0 ppid=1885 pid=2022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 key=(null) Dec 13 14:21:17.682959 kernel: audit: type=1400 audit(1734099677.663:1289): avc: denied { watch } for pid=2022 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:21:17.683043 kernel: audit: type=1300 audit(1734099677.663:1289): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c6ec80 a2=fc6 a3=0 items=0 ppid=1885 pid=2022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 key=(null) Dec 13 14:21:17.688249 kernel: audit: type=1327 audit(1734099677.663:1289): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:21:17.688285 kernel: audit: type=1400 audit(1734099677.671:1290): avc: denied { watch } for pid=2022 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:21:17.693125 kernel: audit: type=1300 audit(1734099677.671:1290): arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0022a76b0 a2=fc6 a3=0 items=0 ppid=1885 pid=2022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 key=(null) Dec 13 14:21:17.697382 kernel: audit: type=1327 audit(1734099677.671:1290): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:21:17.663000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:21:17.671000 audit[2022]: AVC avc: denied { watch } for pid=2022 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:21:17.671000 audit[2022]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0022a76b0 a2=fc6 a3=0 items=0 ppid=1885 pid=2022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 key=(null) Dec 13 14:21:17.671000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:21:17.702747 env[1270]: time="2024-12-13T14:21:17.676378363Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:17.702747 env[1270]: time="2024-12-13T14:21:17.681065402Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:17.702747 env[1270]: time="2024-12-13T14:21:17.689403184Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:17.702747 env[1270]: time="2024-12-13T14:21:17.689895557Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 14:21:17.707896 env[1270]: time="2024-12-13T14:21:17.707868151Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:21:18.249031 env[1270]: time="2024-12-13T14:21:18.248302769Z" level=info msg="CreateContainer within sandbox \"75edddca96a3925a258f8379e20a5c79c40acadcdcea8274a9b371f0a71b2dcb\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 14:21:18.274902 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3988567372.mount: Deactivated successfully. Dec 13 14:21:18.323225 env[1270]: time="2024-12-13T14:21:18.322972373Z" level=info msg="CreateContainer within sandbox \"75edddca96a3925a258f8379e20a5c79c40acadcdcea8274a9b371f0a71b2dcb\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"7eeeab92596f95fc6ee0aa8f0f39fdb328fe9d2eec70615390e278dcd0ba130b\"" Dec 13 14:21:18.329173 env[1270]: time="2024-12-13T14:21:18.323896413Z" level=info msg="StartContainer for \"7eeeab92596f95fc6ee0aa8f0f39fdb328fe9d2eec70615390e278dcd0ba130b\"" Dec 13 14:21:18.383442 systemd[1]: Started cri-containerd-7eeeab92596f95fc6ee0aa8f0f39fdb328fe9d2eec70615390e278dcd0ba130b.scope. Dec 13 14:21:18.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.418867 kernel: audit: type=1400 audit(1734099678.401:1291): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.418904 kernel: audit: type=1400 audit(1734099678.401:1292): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.418921 kernel: audit: type=1400 audit(1734099678.401:1293): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.427693 kernel: audit: type=1400 audit(1734099678.401:1294): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.401000 audit: BPF prog-id=195 op=LOAD Dec 13 14:21:18.401000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.401000 audit[4351]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4024 pid=4351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:18.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765656561623932353936663935666336656530616138663066333966 Dec 13 14:21:18.401000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.401000 audit[4351]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=4024 pid=4351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:18.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765656561623932353936663935666336656530616138663066333966 Dec 13 14:21:18.401000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.401000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.401000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.401000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.401000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.401000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.401000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.401000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.401000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.401000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.401000 audit: BPF prog-id=196 op=LOAD Dec 13 14:21:18.401000 audit[4351]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001b3ec0 items=0 ppid=4024 pid=4351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:18.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765656561623932353936663935666336656530616138663066333966 Dec 13 14:21:18.405000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.405000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.405000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.405000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.405000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.405000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.405000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.405000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.405000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.405000 audit: BPF prog-id=197 op=LOAD Dec 13 14:21:18.405000 audit[4351]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0001b3f08 items=0 ppid=4024 pid=4351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:18.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765656561623932353936663935666336656530616138663066333966 Dec 13 14:21:18.405000 audit: BPF prog-id=197 op=UNLOAD Dec 13 14:21:18.405000 audit: BPF prog-id=196 op=UNLOAD Dec 13 14:21:18.405000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.405000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.405000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.405000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.405000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.405000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.405000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.405000 audit[4351]: AVC avc: denied { perfmon } for pid=4351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.405000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.405000 audit[4351]: AVC avc: denied { bpf } for pid=4351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:18.405000 audit: BPF prog-id=198 op=LOAD Dec 13 14:21:18.405000 audit[4351]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003a4318 items=0 ppid=4024 pid=4351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:18.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765656561623932353936663935666336656530616138663066333966 Dec 13 14:21:18.486919 env[1270]: time="2024-12-13T14:21:18.449795186Z" level=info msg="StartContainer for \"7eeeab92596f95fc6ee0aa8f0f39fdb328fe9d2eec70615390e278dcd0ba130b\" returns successfully" Dec 13 14:21:18.517000 audit[2030]: AVC avc: denied { watch } for pid=2030 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:21:18.517000 audit[2030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00a319ce0 a2=fc6 a3=0 items=0 ppid=1899 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c888 key=(null) Dec 13 14:21:18.517000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:21:18.517000 audit[2030]: AVC avc: denied { watch } for pid=2030 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:21:18.517000 audit[2030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00a308c90 a2=fc6 a3=0 items=0 ppid=1899 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c888 key=(null) Dec 13 14:21:18.517000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:21:18.522000 audit[2030]: AVC avc: denied { watch } for pid=2030 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:21:18.522000 audit[2030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00a319d00 a2=fc6 a3=0 items=0 ppid=1899 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c888 key=(null) Dec 13 14:21:18.522000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:21:18.533000 audit[2030]: AVC avc: denied { watch } for pid=2030 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:21:18.533000 audit[2030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00a308d20 a2=fc6 a3=0 items=0 ppid=1899 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c888 key=(null) Dec 13 14:21:18.533000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:21:18.545000 audit[2030]: AVC avc: denied { watch } for pid=2030 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:21:18.545000 audit[2030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00a404db0 a2=fc6 a3=0 items=0 ppid=1899 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c888 key=(null) Dec 13 14:21:18.545000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:21:18.545000 audit[2030]: AVC avc: denied { watch } for pid=2030 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:21:18.545000 audit[2030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00a404e10 a2=fc6 a3=0 items=0 ppid=1899 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c888 key=(null) Dec 13 14:21:18.545000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:21:19.449444 systemd[1]: run-containerd-runc-k8s.io-5ccbdc925327601363e1ffcc509b8da46637121d645002c9e4ddd4466d783d3a-runc.jmL5NF.mount: Deactivated successfully. Dec 13 14:21:19.522957 kubelet[2196]: I1213 14:21:19.497267 2196 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-5948cc9557-vwt48" podStartSLOduration=29.365116058 podStartE2EDuration="37.44697301s" podCreationTimestamp="2024-12-13 14:20:42 +0000 UTC" firstStartedPulling="2024-12-13 14:21:09.612944352 +0000 UTC m=+47.967964132" lastFinishedPulling="2024-12-13 14:21:17.694801304 +0000 UTC m=+56.049821084" observedRunningTime="2024-12-13 14:21:19.428068564 +0000 UTC m=+57.783088353" watchObservedRunningTime="2024-12-13 14:21:19.44697301 +0000 UTC m=+57.801992803" Dec 13 14:21:19.700837 env[1270]: time="2024-12-13T14:21:19.700734443Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:19.784497 env[1270]: time="2024-12-13T14:21:19.784463563Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:19.957520 env[1270]: time="2024-12-13T14:21:19.957439398Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:20.022066 env[1270]: time="2024-12-13T14:21:20.022019288Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:20.022809 env[1270]: time="2024-12-13T14:21:20.022778984Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 14:21:20.056681 env[1270]: time="2024-12-13T14:21:20.056654526Z" level=info msg="CreateContainer within sandbox \"4368338633bad042a80af24c1c93489f3ff614b53a2e1815b423195302b8eb2a\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:21:20.121186 env[1270]: time="2024-12-13T14:21:20.121156872Z" level=info msg="CreateContainer within sandbox \"4368338633bad042a80af24c1c93489f3ff614b53a2e1815b423195302b8eb2a\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"a5a2a257cca89173c4724dc70abcdb15fbe01bb8b22eb92ad644f106b19efd11\"" Dec 13 14:21:20.152022 env[1270]: time="2024-12-13T14:21:20.151998815Z" level=info msg="StartContainer for \"a5a2a257cca89173c4724dc70abcdb15fbe01bb8b22eb92ad644f106b19efd11\"" Dec 13 14:21:20.171843 systemd[1]: Started cri-containerd-a5a2a257cca89173c4724dc70abcdb15fbe01bb8b22eb92ad644f106b19efd11.scope. Dec 13 14:21:20.179000 audit[4408]: AVC avc: denied { perfmon } for pid=4408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:20.179000 audit[4408]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f453060fff8 items=0 ppid=4288 pid=4408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:20.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135613261323537636361383931373363343732346463373061626364 Dec 13 14:21:20.179000 audit[4408]: AVC avc: denied { bpf } for pid=4408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:20.179000 audit[4408]: AVC avc: denied { bpf } for pid=4408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:20.179000 audit[4408]: AVC avc: denied { bpf } for pid=4408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:20.179000 audit[4408]: AVC avc: denied { perfmon } for pid=4408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:20.179000 audit[4408]: AVC avc: denied { perfmon } for pid=4408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:20.179000 audit[4408]: AVC avc: denied { perfmon } for pid=4408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:20.179000 audit[4408]: AVC avc: denied { perfmon } for pid=4408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:20.179000 audit[4408]: AVC avc: denied { perfmon } for pid=4408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:20.179000 audit[4408]: AVC avc: denied { bpf } for pid=4408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:20.179000 audit[4408]: AVC avc: denied { bpf } for pid=4408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:20.179000 audit: BPF prog-id=199 op=LOAD Dec 13 14:21:20.179000 audit[4408]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000392568 items=0 ppid=4288 pid=4408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:20.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135613261323537636361383931373363343732346463373061626364 Dec 13 14:21:20.179000 audit[4408]: AVC avc: denied { bpf } for pid=4408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:20.179000 audit[4408]: AVC avc: denied { bpf } for pid=4408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:20.179000 audit[4408]: AVC avc: denied { perfmon } for pid=4408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:20.179000 audit[4408]: AVC avc: denied { perfmon } for pid=4408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:20.179000 audit[4408]: AVC avc: denied { perfmon } for pid=4408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:20.179000 audit[4408]: AVC avc: denied { perfmon } for pid=4408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:20.179000 audit[4408]: AVC avc: denied { perfmon } for pid=4408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:20.179000 audit[4408]: AVC avc: denied { bpf } for pid=4408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:20.179000 audit[4408]: AVC avc: denied { bpf } for pid=4408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:20.179000 audit: BPF prog-id=200 op=LOAD Dec 13 14:21:20.179000 audit[4408]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003925b8 items=0 ppid=4288 pid=4408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:20.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135613261323537636361383931373363343732346463373061626364 Dec 13 14:21:20.179000 audit: BPF prog-id=200 op=UNLOAD Dec 13 14:21:20.179000 audit: BPF prog-id=199 op=UNLOAD Dec 13 14:21:20.179000 audit[4408]: AVC avc: denied { bpf } for pid=4408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:20.179000 audit[4408]: AVC avc: denied { bpf } for pid=4408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:20.179000 audit[4408]: AVC avc: denied { bpf } for pid=4408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:20.179000 audit[4408]: AVC avc: denied { perfmon } for pid=4408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:20.179000 audit[4408]: AVC avc: denied { perfmon } for pid=4408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:20.179000 audit[4408]: AVC avc: denied { perfmon } for pid=4408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:20.179000 audit[4408]: AVC avc: denied { perfmon } for pid=4408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:20.179000 audit[4408]: AVC avc: denied { perfmon } for pid=4408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:20.179000 audit[4408]: AVC avc: denied { bpf } for pid=4408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:20.179000 audit[4408]: AVC avc: denied { bpf } for pid=4408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:20.179000 audit: BPF prog-id=201 op=LOAD Dec 13 14:21:20.179000 audit[4408]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000392648 items=0 ppid=4288 pid=4408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:20.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135613261323537636361383931373363343732346463373061626364 Dec 13 14:21:20.235033 env[1270]: time="2024-12-13T14:21:20.210388503Z" level=info msg="StartContainer for \"a5a2a257cca89173c4724dc70abcdb15fbe01bb8b22eb92ad644f106b19efd11\" returns successfully" Dec 13 14:21:20.228266 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2622897268.mount: Deactivated successfully. Dec 13 14:21:20.313307 env[1270]: time="2024-12-13T14:21:20.313278993Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:21:20.357871 systemd[1]: run-containerd-runc-k8s.io-7eeeab92596f95fc6ee0aa8f0f39fdb328fe9d2eec70615390e278dcd0ba130b-runc.xd96C6.mount: Deactivated successfully. Dec 13 14:21:21.959000 audit[2022]: AVC avc: denied { watch } for pid=2022 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:21:21.959000 audit[2022]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c6f960 a2=fc6 a3=0 items=0 ppid=1885 pid=2022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 key=(null) Dec 13 14:21:21.959000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:21:21.967000 audit[2022]: AVC avc: denied { watch } for pid=2022 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:21:21.967000 audit[2022]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c6f9a0 a2=fc6 a3=0 items=0 ppid=1885 pid=2022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 key=(null) Dec 13 14:21:21.967000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:21:21.967000 audit[2022]: AVC avc: denied { watch } for pid=2022 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:21:21.967000 audit[2022]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c6f9e0 a2=fc6 a3=0 items=0 ppid=1885 pid=2022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 key=(null) Dec 13 14:21:21.967000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:21:21.994000 audit[2022]: AVC avc: denied { watch } for pid=2022 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:21:21.994000 audit[2022]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0015f9be0 a2=fc6 a3=0 items=0 ppid=1885 pid=2022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 key=(null) Dec 13 14:21:21.994000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:21:22.238093 env[1270]: time="2024-12-13T14:21:22.238023866Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:22.255988 env[1270]: time="2024-12-13T14:21:22.255939977Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:22.264156 env[1270]: time="2024-12-13T14:21:22.259666650Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:22.265481 env[1270]: time="2024-12-13T14:21:22.265441636Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:21:22.270221 env[1270]: time="2024-12-13T14:21:22.265888565Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 14:21:23.618551 kubelet[2196]: E1213 14:21:23.618522 2196 kubelet.go:2511] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="1.168s" Dec 13 14:21:24.882922 env[1270]: time="2024-12-13T14:21:24.882785520Z" level=info msg="CreateContainer within sandbox \"4368338633bad042a80af24c1c93489f3ff614b53a2e1815b423195302b8eb2a\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:21:24.911602 env[1270]: time="2024-12-13T14:21:24.911495948Z" level=info msg="StopPodSandbox for \"cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15\"" Dec 13 14:21:25.058085 env[1270]: time="2024-12-13T14:21:25.058049269Z" level=info msg="CreateContainer within sandbox \"4368338633bad042a80af24c1c93489f3ff614b53a2e1815b423195302b8eb2a\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"5e8583d4eff3db803a57f3e33288875cea97503c6a2e409e1358f32458f51c2d\"" Dec 13 14:21:25.065472 systemd[1]: run-containerd-runc-k8s.io-7eeeab92596f95fc6ee0aa8f0f39fdb328fe9d2eec70615390e278dcd0ba130b-runc.fAOaSG.mount: Deactivated successfully. Dec 13 14:21:25.343053 env[1270]: time="2024-12-13T14:21:25.343025094Z" level=info msg="StartContainer for \"5e8583d4eff3db803a57f3e33288875cea97503c6a2e409e1358f32458f51c2d\"" Dec 13 14:21:25.360815 systemd[1]: Started cri-containerd-5e8583d4eff3db803a57f3e33288875cea97503c6a2e409e1358f32458f51c2d.scope. Dec 13 14:21:25.381955 kernel: kauditd_printk_skb: 126 callbacks suppressed Dec 13 14:21:25.382005 kernel: audit: type=1400 audit(1734099685.372:1325): avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.382025 kernel: audit: type=1300 audit(1734099685.372:1325): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fa19d0c5638 items=0 ppid=4288 pid=4509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:25.421088 kernel: audit: type=1327 audit(1734099685.372:1325): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565383538336434656666336462383033613537663365333332383838 Dec 13 14:21:25.421146 kernel: audit: type=1400 audit(1734099685.372:1326): avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.421169 kernel: audit: type=1400 audit(1734099685.372:1326): avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.421192 kernel: audit: type=1400 audit(1734099685.372:1326): avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.421216 kernel: audit: type=1400 audit(1734099685.372:1326): avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.434087 kernel: audit: type=1400 audit(1734099685.372:1326): avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.434257 kernel: audit: type=1400 audit(1734099685.372:1326): avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.434290 kernel: audit: type=1400 audit(1734099685.372:1326): avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.372000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.372000 audit[4509]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fa19d0c5638 items=0 ppid=4288 pid=4509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:25.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565383538336434656666336462383033613537663365333332383838 Dec 13 14:21:25.372000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.372000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.372000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.372000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.372000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.372000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.372000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.372000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.372000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.372000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.372000 audit: BPF prog-id=202 op=LOAD Dec 13 14:21:25.372000 audit[4509]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002d5b98 items=0 ppid=4288 pid=4509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:25.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565383538336434656666336462383033613537663365333332383838 Dec 13 14:21:25.372000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.372000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.372000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.372000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.372000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.372000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.372000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.372000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.372000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.372000 audit: BPF prog-id=203 op=LOAD Dec 13 14:21:25.372000 audit[4509]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002d5be8 items=0 ppid=4288 pid=4509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:25.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565383538336434656666336462383033613537663365333332383838 Dec 13 14:21:25.372000 audit: BPF prog-id=203 op=UNLOAD Dec 13 14:21:25.372000 audit: BPF prog-id=202 op=UNLOAD Dec 13 14:21:25.372000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.372000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.372000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.372000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.372000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.372000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.372000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.372000 audit[4509]: AVC avc: denied { perfmon } for pid=4509 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.372000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.372000 audit[4509]: AVC avc: denied { bpf } for pid=4509 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:21:25.372000 audit: BPF prog-id=204 op=LOAD Dec 13 14:21:25.372000 audit[4509]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002d5c78 items=0 ppid=4288 pid=4509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:25.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565383538336434656666336462383033613537663365333332383838 Dec 13 14:21:25.471063 env[1270]: time="2024-12-13T14:21:25.429467635Z" level=info msg="StartContainer for \"5e8583d4eff3db803a57f3e33288875cea97503c6a2e409e1358f32458f51c2d\" returns successfully" Dec 13 14:21:25.875838 kubelet[2196]: I1213 14:21:25.874439 2196 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:21:25.876141 kubelet[2196]: I1213 14:21:25.875852 2196 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:21:27.968552 env[1270]: 2024-12-13 14:21:26.785 [WARNING][4537] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--bgsrp-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"ad4098cd-e162-4f9f-8435-adb35d1aa4c7", ResourceVersion:"834", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 20, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"50d1c7acab3ed1bf7c1a5aa2e18ebe09f9dde7aed52541973faf4eb3c99e5b51", Pod:"coredns-7db6d8ff4d-bgsrp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4265f588a2e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:21:27.968552 env[1270]: 2024-12-13 14:21:26.787 [INFO][4537] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" Dec 13 14:21:27.968552 env[1270]: 2024-12-13 14:21:26.787 [INFO][4537] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" iface="eth0" netns="" Dec 13 14:21:27.968552 env[1270]: 2024-12-13 14:21:26.787 [INFO][4537] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" Dec 13 14:21:27.968552 env[1270]: 2024-12-13 14:21:26.787 [INFO][4537] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" Dec 13 14:21:27.968552 env[1270]: 2024-12-13 14:21:27.843 [INFO][4546] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" HandleID="k8s-pod-network.cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" Workload="localhost-k8s-coredns--7db6d8ff4d--bgsrp-eth0" Dec 13 14:21:27.968552 env[1270]: 2024-12-13 14:21:27.868 [INFO][4546] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:21:27.968552 env[1270]: 2024-12-13 14:21:27.870 [INFO][4546] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:21:27.968552 env[1270]: 2024-12-13 14:21:27.964 [WARNING][4546] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" HandleID="k8s-pod-network.cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" Workload="localhost-k8s-coredns--7db6d8ff4d--bgsrp-eth0" Dec 13 14:21:27.968552 env[1270]: 2024-12-13 14:21:27.964 [INFO][4546] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" HandleID="k8s-pod-network.cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" Workload="localhost-k8s-coredns--7db6d8ff4d--bgsrp-eth0" Dec 13 14:21:27.968552 env[1270]: 2024-12-13 14:21:27.965 [INFO][4546] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:21:27.968552 env[1270]: 2024-12-13 14:21:27.967 [INFO][4537] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" Dec 13 14:21:28.003955 env[1270]: time="2024-12-13T14:21:27.968568995Z" level=info msg="TearDown network for sandbox \"cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15\" successfully" Dec 13 14:21:28.003955 env[1270]: time="2024-12-13T14:21:27.968592539Z" level=info msg="StopPodSandbox for \"cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15\" returns successfully" Dec 13 14:21:28.003955 env[1270]: time="2024-12-13T14:21:27.969370776Z" level=info msg="RemovePodSandbox for \"cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15\"" Dec 13 14:21:28.003955 env[1270]: time="2024-12-13T14:21:27.969401968Z" level=info msg="Forcibly stopping sandbox \"cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15\"" Dec 13 14:21:28.120391 env[1270]: 2024-12-13 14:21:28.074 [WARNING][4566] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--bgsrp-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"ad4098cd-e162-4f9f-8435-adb35d1aa4c7", ResourceVersion:"834", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 20, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"50d1c7acab3ed1bf7c1a5aa2e18ebe09f9dde7aed52541973faf4eb3c99e5b51", Pod:"coredns-7db6d8ff4d-bgsrp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4265f588a2e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:21:28.120391 env[1270]: 2024-12-13 14:21:28.074 [INFO][4566] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" Dec 13 14:21:28.120391 env[1270]: 2024-12-13 14:21:28.074 [INFO][4566] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" iface="eth0" netns="" Dec 13 14:21:28.120391 env[1270]: 2024-12-13 14:21:28.074 [INFO][4566] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" Dec 13 14:21:28.120391 env[1270]: 2024-12-13 14:21:28.074 [INFO][4566] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" Dec 13 14:21:28.120391 env[1270]: 2024-12-13 14:21:28.110 [INFO][4572] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" HandleID="k8s-pod-network.cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" Workload="localhost-k8s-coredns--7db6d8ff4d--bgsrp-eth0" Dec 13 14:21:28.120391 env[1270]: 2024-12-13 14:21:28.110 [INFO][4572] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:21:28.120391 env[1270]: 2024-12-13 14:21:28.110 [INFO][4572] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:21:28.120391 env[1270]: 2024-12-13 14:21:28.114 [WARNING][4572] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" HandleID="k8s-pod-network.cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" Workload="localhost-k8s-coredns--7db6d8ff4d--bgsrp-eth0" Dec 13 14:21:28.120391 env[1270]: 2024-12-13 14:21:28.114 [INFO][4572] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" HandleID="k8s-pod-network.cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" Workload="localhost-k8s-coredns--7db6d8ff4d--bgsrp-eth0" Dec 13 14:21:28.120391 env[1270]: 2024-12-13 14:21:28.115 [INFO][4572] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:21:28.120391 env[1270]: 2024-12-13 14:21:28.117 [INFO][4566] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15" Dec 13 14:21:28.125497 env[1270]: time="2024-12-13T14:21:28.120412006Z" level=info msg="TearDown network for sandbox \"cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15\" successfully" Dec 13 14:21:28.129157 env[1270]: time="2024-12-13T14:21:28.129130657Z" level=info msg="RemovePodSandbox \"cffea623c96f80dc977567ae4860244096131c0001542cccff9cd0ec3cd35f15\" returns successfully" Dec 13 14:21:28.129652 env[1270]: time="2024-12-13T14:21:28.129634677Z" level=info msg="StopPodSandbox for \"444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b\"" Dec 13 14:21:28.226041 env[1270]: 2024-12-13 14:21:28.167 [WARNING][4590] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--l59ps-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ea4acfc8-bc78-49a6-862f-fde7fb7796eb", ResourceVersion:"918", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 20, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4368338633bad042a80af24c1c93489f3ff614b53a2e1815b423195302b8eb2a", Pod:"csi-node-driver-l59ps", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali63b652fed73", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:21:28.226041 env[1270]: 2024-12-13 14:21:28.167 [INFO][4590] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" Dec 13 14:21:28.226041 env[1270]: 2024-12-13 14:21:28.167 [INFO][4590] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" iface="eth0" netns="" Dec 13 14:21:28.226041 env[1270]: 2024-12-13 14:21:28.167 [INFO][4590] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" Dec 13 14:21:28.226041 env[1270]: 2024-12-13 14:21:28.167 [INFO][4590] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" Dec 13 14:21:28.226041 env[1270]: 2024-12-13 14:21:28.218 [INFO][4596] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" HandleID="k8s-pod-network.444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" Workload="localhost-k8s-csi--node--driver--l59ps-eth0" Dec 13 14:21:28.226041 env[1270]: 2024-12-13 14:21:28.218 [INFO][4596] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:21:28.226041 env[1270]: 2024-12-13 14:21:28.218 [INFO][4596] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:21:28.226041 env[1270]: 2024-12-13 14:21:28.222 [WARNING][4596] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" HandleID="k8s-pod-network.444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" Workload="localhost-k8s-csi--node--driver--l59ps-eth0" Dec 13 14:21:28.226041 env[1270]: 2024-12-13 14:21:28.222 [INFO][4596] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" HandleID="k8s-pod-network.444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" Workload="localhost-k8s-csi--node--driver--l59ps-eth0" Dec 13 14:21:28.226041 env[1270]: 2024-12-13 14:21:28.223 [INFO][4596] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:21:28.226041 env[1270]: 2024-12-13 14:21:28.224 [INFO][4590] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" Dec 13 14:21:28.237412 env[1270]: time="2024-12-13T14:21:28.226021362Z" level=info msg="TearDown network for sandbox \"444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b\" successfully" Dec 13 14:21:28.237412 env[1270]: time="2024-12-13T14:21:28.226056336Z" level=info msg="StopPodSandbox for \"444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b\" returns successfully" Dec 13 14:21:28.237412 env[1270]: time="2024-12-13T14:21:28.226999006Z" level=info msg="RemovePodSandbox for \"444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b\"" Dec 13 14:21:28.237412 env[1270]: time="2024-12-13T14:21:28.227033277Z" level=info msg="Forcibly stopping sandbox \"444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b\"" Dec 13 14:21:28.294073 env[1270]: 2024-12-13 14:21:28.265 [WARNING][4614] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--l59ps-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ea4acfc8-bc78-49a6-862f-fde7fb7796eb", ResourceVersion:"918", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 20, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4368338633bad042a80af24c1c93489f3ff614b53a2e1815b423195302b8eb2a", Pod:"csi-node-driver-l59ps", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali63b652fed73", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:21:28.294073 env[1270]: 2024-12-13 14:21:28.265 [INFO][4614] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" Dec 13 14:21:28.294073 env[1270]: 2024-12-13 14:21:28.266 [INFO][4614] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" iface="eth0" netns="" Dec 13 14:21:28.294073 env[1270]: 2024-12-13 14:21:28.266 [INFO][4614] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" Dec 13 14:21:28.294073 env[1270]: 2024-12-13 14:21:28.266 [INFO][4614] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" Dec 13 14:21:28.294073 env[1270]: 2024-12-13 14:21:28.286 [INFO][4620] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" HandleID="k8s-pod-network.444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" Workload="localhost-k8s-csi--node--driver--l59ps-eth0" Dec 13 14:21:28.294073 env[1270]: 2024-12-13 14:21:28.286 [INFO][4620] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:21:28.294073 env[1270]: 2024-12-13 14:21:28.286 [INFO][4620] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:21:28.294073 env[1270]: 2024-12-13 14:21:28.290 [WARNING][4620] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" HandleID="k8s-pod-network.444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" Workload="localhost-k8s-csi--node--driver--l59ps-eth0" Dec 13 14:21:28.294073 env[1270]: 2024-12-13 14:21:28.290 [INFO][4620] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" HandleID="k8s-pod-network.444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" Workload="localhost-k8s-csi--node--driver--l59ps-eth0" Dec 13 14:21:28.294073 env[1270]: 2024-12-13 14:21:28.291 [INFO][4620] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:21:28.294073 env[1270]: 2024-12-13 14:21:28.293 [INFO][4614] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b" Dec 13 14:21:28.303186 env[1270]: time="2024-12-13T14:21:28.294493852Z" level=info msg="TearDown network for sandbox \"444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b\" successfully" Dec 13 14:21:28.314834 env[1270]: time="2024-12-13T14:21:28.314810049Z" level=info msg="RemovePodSandbox \"444506ef6ecde51a767dde33b56ab4d90418fe65834bd73a54ed07ca9431150b\" returns successfully" Dec 13 14:21:28.324904 env[1270]: time="2024-12-13T14:21:28.324880044Z" level=info msg="StopPodSandbox for \"120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb\"" Dec 13 14:21:28.386498 env[1270]: 2024-12-13 14:21:28.361 [WARNING][4638] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--c756dccf--qwttr-eth0", GenerateName:"calico-apiserver-c756dccf-", Namespace:"calico-apiserver", SelfLink:"", UID:"84d16462-4f19-45fc-87e0-9537b5b2290a", ResourceVersion:"850", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 20, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c756dccf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e39611e7796ee42eadfb10d638eaf3e6ec8e8950835e601639543ee903a66409", Pod:"calico-apiserver-c756dccf-qwttr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid05843ec86b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:21:28.386498 env[1270]: 2024-12-13 14:21:28.361 [INFO][4638] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" Dec 13 14:21:28.386498 env[1270]: 2024-12-13 14:21:28.361 [INFO][4638] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" iface="eth0" netns="" Dec 13 14:21:28.386498 env[1270]: 2024-12-13 14:21:28.361 [INFO][4638] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" Dec 13 14:21:28.386498 env[1270]: 2024-12-13 14:21:28.361 [INFO][4638] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" Dec 13 14:21:28.386498 env[1270]: 2024-12-13 14:21:28.375 [INFO][4645] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" HandleID="k8s-pod-network.120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" Workload="localhost-k8s-calico--apiserver--c756dccf--qwttr-eth0" Dec 13 14:21:28.386498 env[1270]: 2024-12-13 14:21:28.375 [INFO][4645] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:21:28.386498 env[1270]: 2024-12-13 14:21:28.375 [INFO][4645] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:21:28.386498 env[1270]: 2024-12-13 14:21:28.382 [WARNING][4645] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" HandleID="k8s-pod-network.120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" Workload="localhost-k8s-calico--apiserver--c756dccf--qwttr-eth0" Dec 13 14:21:28.386498 env[1270]: 2024-12-13 14:21:28.383 [INFO][4645] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" HandleID="k8s-pod-network.120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" Workload="localhost-k8s-calico--apiserver--c756dccf--qwttr-eth0" Dec 13 14:21:28.386498 env[1270]: 2024-12-13 14:21:28.383 [INFO][4645] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:21:28.386498 env[1270]: 2024-12-13 14:21:28.385 [INFO][4638] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" Dec 13 14:21:28.390401 env[1270]: time="2024-12-13T14:21:28.386510473Z" level=info msg="TearDown network for sandbox \"120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb\" successfully" Dec 13 14:21:28.390401 env[1270]: time="2024-12-13T14:21:28.386538315Z" level=info msg="StopPodSandbox for \"120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb\" returns successfully" Dec 13 14:21:28.390401 env[1270]: time="2024-12-13T14:21:28.386848314Z" level=info msg="RemovePodSandbox for \"120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb\"" Dec 13 14:21:28.390401 env[1270]: time="2024-12-13T14:21:28.386868618Z" level=info msg="Forcibly stopping sandbox \"120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb\"" Dec 13 14:21:28.478218 env[1270]: 2024-12-13 14:21:28.416 [WARNING][4664] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--c756dccf--qwttr-eth0", GenerateName:"calico-apiserver-c756dccf-", Namespace:"calico-apiserver", SelfLink:"", UID:"84d16462-4f19-45fc-87e0-9537b5b2290a", ResourceVersion:"850", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 20, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c756dccf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e39611e7796ee42eadfb10d638eaf3e6ec8e8950835e601639543ee903a66409", Pod:"calico-apiserver-c756dccf-qwttr", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid05843ec86b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:21:28.478218 env[1270]: 2024-12-13 14:21:28.416 [INFO][4664] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" Dec 13 14:21:28.478218 env[1270]: 2024-12-13 14:21:28.416 [INFO][4664] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" iface="eth0" netns="" Dec 13 14:21:28.478218 env[1270]: 2024-12-13 14:21:28.416 [INFO][4664] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" Dec 13 14:21:28.478218 env[1270]: 2024-12-13 14:21:28.416 [INFO][4664] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" Dec 13 14:21:28.478218 env[1270]: 2024-12-13 14:21:28.441 [INFO][4670] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" HandleID="k8s-pod-network.120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" Workload="localhost-k8s-calico--apiserver--c756dccf--qwttr-eth0" Dec 13 14:21:28.478218 env[1270]: 2024-12-13 14:21:28.441 [INFO][4670] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:21:28.478218 env[1270]: 2024-12-13 14:21:28.442 [INFO][4670] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:21:28.478218 env[1270]: 2024-12-13 14:21:28.474 [WARNING][4670] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" HandleID="k8s-pod-network.120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" Workload="localhost-k8s-calico--apiserver--c756dccf--qwttr-eth0" Dec 13 14:21:28.478218 env[1270]: 2024-12-13 14:21:28.474 [INFO][4670] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" HandleID="k8s-pod-network.120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" Workload="localhost-k8s-calico--apiserver--c756dccf--qwttr-eth0" Dec 13 14:21:28.478218 env[1270]: 2024-12-13 14:21:28.475 [INFO][4670] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:21:28.478218 env[1270]: 2024-12-13 14:21:28.476 [INFO][4664] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb" Dec 13 14:21:28.490465 env[1270]: time="2024-12-13T14:21:28.478588335Z" level=info msg="TearDown network for sandbox \"120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb\" successfully" Dec 13 14:21:28.521121 env[1270]: time="2024-12-13T14:21:28.521094708Z" level=info msg="RemovePodSandbox \"120b588bc36025f2e1cc837a3708e29d80778653f383370542618a7927cf0bdb\" returns successfully" Dec 13 14:21:28.521912 env[1270]: time="2024-12-13T14:21:28.521481576Z" level=info msg="StopPodSandbox for \"97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80\"" Dec 13 14:21:28.568965 env[1270]: 2024-12-13 14:21:28.547 [WARNING][4688] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5948cc9557--vwt48-eth0", GenerateName:"calico-kube-controllers-5948cc9557-", Namespace:"calico-system", SelfLink:"", UID:"c3c31618-9087-40ec-ac13-e264b487ba1e", ResourceVersion:"898", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 20, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5948cc9557", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"75edddca96a3925a258f8379e20a5c79c40acadcdcea8274a9b371f0a71b2dcb", Pod:"calico-kube-controllers-5948cc9557-vwt48", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali66c43b208f7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:21:28.568965 env[1270]: 2024-12-13 14:21:28.547 [INFO][4688] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" Dec 13 14:21:28.568965 env[1270]: 2024-12-13 14:21:28.547 [INFO][4688] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" iface="eth0" netns="" Dec 13 14:21:28.568965 env[1270]: 2024-12-13 14:21:28.547 [INFO][4688] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" Dec 13 14:21:28.568965 env[1270]: 2024-12-13 14:21:28.547 [INFO][4688] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" Dec 13 14:21:28.568965 env[1270]: 2024-12-13 14:21:28.561 [INFO][4694] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" HandleID="k8s-pod-network.97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" Workload="localhost-k8s-calico--kube--controllers--5948cc9557--vwt48-eth0" Dec 13 14:21:28.568965 env[1270]: 2024-12-13 14:21:28.561 [INFO][4694] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:21:28.568965 env[1270]: 2024-12-13 14:21:28.561 [INFO][4694] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:21:28.568965 env[1270]: 2024-12-13 14:21:28.565 [WARNING][4694] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" HandleID="k8s-pod-network.97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" Workload="localhost-k8s-calico--kube--controllers--5948cc9557--vwt48-eth0" Dec 13 14:21:28.568965 env[1270]: 2024-12-13 14:21:28.565 [INFO][4694] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" HandleID="k8s-pod-network.97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" Workload="localhost-k8s-calico--kube--controllers--5948cc9557--vwt48-eth0" Dec 13 14:21:28.568965 env[1270]: 2024-12-13 14:21:28.566 [INFO][4694] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:21:28.568965 env[1270]: 2024-12-13 14:21:28.567 [INFO][4688] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" Dec 13 14:21:28.595080 env[1270]: time="2024-12-13T14:21:28.569363667Z" level=info msg="TearDown network for sandbox \"97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80\" successfully" Dec 13 14:21:28.595080 env[1270]: time="2024-12-13T14:21:28.569383897Z" level=info msg="StopPodSandbox for \"97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80\" returns successfully" Dec 13 14:21:28.595080 env[1270]: time="2024-12-13T14:21:28.570282407Z" level=info msg="RemovePodSandbox for \"97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80\"" Dec 13 14:21:28.595080 env[1270]: time="2024-12-13T14:21:28.570316076Z" level=info msg="Forcibly stopping sandbox \"97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80\"" Dec 13 14:21:28.634655 env[1270]: 2024-12-13 14:21:28.599 [WARNING][4712] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5948cc9557--vwt48-eth0", GenerateName:"calico-kube-controllers-5948cc9557-", Namespace:"calico-system", SelfLink:"", UID:"c3c31618-9087-40ec-ac13-e264b487ba1e", ResourceVersion:"898", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 20, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5948cc9557", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"75edddca96a3925a258f8379e20a5c79c40acadcdcea8274a9b371f0a71b2dcb", Pod:"calico-kube-controllers-5948cc9557-vwt48", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali66c43b208f7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:21:28.634655 env[1270]: 2024-12-13 14:21:28.599 [INFO][4712] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" Dec 13 14:21:28.634655 env[1270]: 2024-12-13 14:21:28.599 [INFO][4712] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" iface="eth0" netns="" Dec 13 14:21:28.634655 env[1270]: 2024-12-13 14:21:28.599 [INFO][4712] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" Dec 13 14:21:28.634655 env[1270]: 2024-12-13 14:21:28.599 [INFO][4712] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" Dec 13 14:21:28.634655 env[1270]: 2024-12-13 14:21:28.625 [INFO][4718] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" HandleID="k8s-pod-network.97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" Workload="localhost-k8s-calico--kube--controllers--5948cc9557--vwt48-eth0" Dec 13 14:21:28.634655 env[1270]: 2024-12-13 14:21:28.625 [INFO][4718] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:21:28.634655 env[1270]: 2024-12-13 14:21:28.625 [INFO][4718] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:21:28.634655 env[1270]: 2024-12-13 14:21:28.630 [WARNING][4718] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" HandleID="k8s-pod-network.97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" Workload="localhost-k8s-calico--kube--controllers--5948cc9557--vwt48-eth0" Dec 13 14:21:28.634655 env[1270]: 2024-12-13 14:21:28.630 [INFO][4718] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" HandleID="k8s-pod-network.97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" Workload="localhost-k8s-calico--kube--controllers--5948cc9557--vwt48-eth0" Dec 13 14:21:28.634655 env[1270]: 2024-12-13 14:21:28.631 [INFO][4718] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:21:28.634655 env[1270]: 2024-12-13 14:21:28.633 [INFO][4712] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80" Dec 13 14:21:28.636200 env[1270]: time="2024-12-13T14:21:28.634682722Z" level=info msg="TearDown network for sandbox \"97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80\" successfully" Dec 13 14:21:28.636665 env[1270]: time="2024-12-13T14:21:28.636644551Z" level=info msg="RemovePodSandbox \"97a3e1672cca5105846f0be08d2cc2ef0efe7a3724789163acded0acc3f84a80\" returns successfully" Dec 13 14:21:28.637352 env[1270]: time="2024-12-13T14:21:28.637057558Z" level=info msg="StopPodSandbox for \"a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d\"" Dec 13 14:21:28.702413 env[1270]: 2024-12-13 14:21:28.666 [WARNING][4736] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--8pvb8-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"dfda6d2b-ae63-4f45-abb5-6eb95ae8af85", ResourceVersion:"814", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 20, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c476c51194df13d90244eff60e493988e83593b3fb1502c4743cd3dfc5996bb3", Pod:"coredns-7db6d8ff4d-8pvb8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib7c3848073b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:21:28.702413 env[1270]: 2024-12-13 14:21:28.666 [INFO][4736] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" Dec 13 14:21:28.702413 env[1270]: 2024-12-13 14:21:28.666 [INFO][4736] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" iface="eth0" netns="" Dec 13 14:21:28.702413 env[1270]: 2024-12-13 14:21:28.666 [INFO][4736] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" Dec 13 14:21:28.702413 env[1270]: 2024-12-13 14:21:28.666 [INFO][4736] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" Dec 13 14:21:28.702413 env[1270]: 2024-12-13 14:21:28.692 [INFO][4744] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" HandleID="k8s-pod-network.a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" Workload="localhost-k8s-coredns--7db6d8ff4d--8pvb8-eth0" Dec 13 14:21:28.702413 env[1270]: 2024-12-13 14:21:28.692 [INFO][4744] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:21:28.702413 env[1270]: 2024-12-13 14:21:28.692 [INFO][4744] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:21:28.702413 env[1270]: 2024-12-13 14:21:28.699 [WARNING][4744] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" HandleID="k8s-pod-network.a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" Workload="localhost-k8s-coredns--7db6d8ff4d--8pvb8-eth0" Dec 13 14:21:28.702413 env[1270]: 2024-12-13 14:21:28.699 [INFO][4744] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" HandleID="k8s-pod-network.a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" Workload="localhost-k8s-coredns--7db6d8ff4d--8pvb8-eth0" Dec 13 14:21:28.702413 env[1270]: 2024-12-13 14:21:28.700 [INFO][4744] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:21:28.702413 env[1270]: 2024-12-13 14:21:28.701 [INFO][4736] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" Dec 13 14:21:28.702808 env[1270]: time="2024-12-13T14:21:28.702427148Z" level=info msg="TearDown network for sandbox \"a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d\" successfully" Dec 13 14:21:28.702808 env[1270]: time="2024-12-13T14:21:28.702451413Z" level=info msg="StopPodSandbox for \"a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d\" returns successfully" Dec 13 14:21:28.702808 env[1270]: time="2024-12-13T14:21:28.702647066Z" level=info msg="RemovePodSandbox for \"a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d\"" Dec 13 14:21:28.702808 env[1270]: time="2024-12-13T14:21:28.702661786Z" level=info msg="Forcibly stopping sandbox \"a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d\"" Dec 13 14:21:28.781652 env[1270]: 2024-12-13 14:21:28.734 [WARNING][4762] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--8pvb8-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"dfda6d2b-ae63-4f45-abb5-6eb95ae8af85", ResourceVersion:"814", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 20, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c476c51194df13d90244eff60e493988e83593b3fb1502c4743cd3dfc5996bb3", Pod:"coredns-7db6d8ff4d-8pvb8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib7c3848073b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:21:28.781652 env[1270]: 2024-12-13 14:21:28.734 [INFO][4762] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" Dec 13 14:21:28.781652 env[1270]: 2024-12-13 14:21:28.734 [INFO][4762] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" iface="eth0" netns="" Dec 13 14:21:28.781652 env[1270]: 2024-12-13 14:21:28.734 [INFO][4762] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" Dec 13 14:21:28.781652 env[1270]: 2024-12-13 14:21:28.734 [INFO][4762] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" Dec 13 14:21:28.781652 env[1270]: 2024-12-13 14:21:28.765 [INFO][4768] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" HandleID="k8s-pod-network.a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" Workload="localhost-k8s-coredns--7db6d8ff4d--8pvb8-eth0" Dec 13 14:21:28.781652 env[1270]: 2024-12-13 14:21:28.765 [INFO][4768] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:21:28.781652 env[1270]: 2024-12-13 14:21:28.765 [INFO][4768] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:21:28.781652 env[1270]: 2024-12-13 14:21:28.772 [WARNING][4768] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" HandleID="k8s-pod-network.a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" Workload="localhost-k8s-coredns--7db6d8ff4d--8pvb8-eth0" Dec 13 14:21:28.781652 env[1270]: 2024-12-13 14:21:28.772 [INFO][4768] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" HandleID="k8s-pod-network.a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" Workload="localhost-k8s-coredns--7db6d8ff4d--8pvb8-eth0" Dec 13 14:21:28.781652 env[1270]: 2024-12-13 14:21:28.777 [INFO][4768] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:21:28.781652 env[1270]: 2024-12-13 14:21:28.780 [INFO][4762] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d" Dec 13 14:21:28.793659 env[1270]: time="2024-12-13T14:21:28.781663870Z" level=info msg="TearDown network for sandbox \"a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d\" successfully" Dec 13 14:21:28.838275 env[1270]: time="2024-12-13T14:21:28.838225978Z" level=info msg="RemovePodSandbox \"a13c8ee26868926ff9ea43aceeda475b054e406d6e2c417d75185fecf58e118d\" returns successfully" Dec 13 14:21:28.838707 env[1270]: time="2024-12-13T14:21:28.838669010Z" level=info msg="StopPodSandbox for \"6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72\"" Dec 13 14:21:28.896772 env[1270]: 2024-12-13 14:21:28.865 [WARNING][4787] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--c756dccf--h6pbq-eth0", GenerateName:"calico-apiserver-c756dccf-", Namespace:"calico-apiserver", SelfLink:"", UID:"b00a720b-3e05-45c2-b017-4b0afa94be32", ResourceVersion:"863", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 20, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c756dccf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4a272e06193831e86f42cea2a349f8460cd3bf088b2711071c904d29429e625f", Pod:"calico-apiserver-c756dccf-h6pbq", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2e8ba23fe98", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:21:28.896772 env[1270]: 2024-12-13 14:21:28.865 [INFO][4787] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" Dec 13 14:21:28.896772 env[1270]: 2024-12-13 14:21:28.865 [INFO][4787] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" iface="eth0" netns="" Dec 13 14:21:28.896772 env[1270]: 2024-12-13 14:21:28.865 [INFO][4787] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" Dec 13 14:21:28.896772 env[1270]: 2024-12-13 14:21:28.865 [INFO][4787] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" Dec 13 14:21:28.896772 env[1270]: 2024-12-13 14:21:28.887 [INFO][4793] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" HandleID="k8s-pod-network.6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" Workload="localhost-k8s-calico--apiserver--c756dccf--h6pbq-eth0" Dec 13 14:21:28.896772 env[1270]: 2024-12-13 14:21:28.888 [INFO][4793] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:21:28.896772 env[1270]: 2024-12-13 14:21:28.888 [INFO][4793] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:21:28.896772 env[1270]: 2024-12-13 14:21:28.892 [WARNING][4793] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" HandleID="k8s-pod-network.6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" Workload="localhost-k8s-calico--apiserver--c756dccf--h6pbq-eth0" Dec 13 14:21:28.896772 env[1270]: 2024-12-13 14:21:28.892 [INFO][4793] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" HandleID="k8s-pod-network.6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" Workload="localhost-k8s-calico--apiserver--c756dccf--h6pbq-eth0" Dec 13 14:21:28.896772 env[1270]: 2024-12-13 14:21:28.893 [INFO][4793] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:21:28.896772 env[1270]: 2024-12-13 14:21:28.895 [INFO][4787] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" Dec 13 14:21:28.898098 env[1270]: time="2024-12-13T14:21:28.896790880Z" level=info msg="TearDown network for sandbox \"6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72\" successfully" Dec 13 14:21:28.898098 env[1270]: time="2024-12-13T14:21:28.896817446Z" level=info msg="StopPodSandbox for \"6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72\" returns successfully" Dec 13 14:21:28.898098 env[1270]: time="2024-12-13T14:21:28.897309108Z" level=info msg="RemovePodSandbox for \"6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72\"" Dec 13 14:21:28.898098 env[1270]: time="2024-12-13T14:21:28.897336610Z" level=info msg="Forcibly stopping sandbox \"6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72\"" Dec 13 14:21:28.955097 env[1270]: 2024-12-13 14:21:28.926 [WARNING][4811] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--c756dccf--h6pbq-eth0", GenerateName:"calico-apiserver-c756dccf-", Namespace:"calico-apiserver", SelfLink:"", UID:"b00a720b-3e05-45c2-b017-4b0afa94be32", ResourceVersion:"863", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 20, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c756dccf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4a272e06193831e86f42cea2a349f8460cd3bf088b2711071c904d29429e625f", Pod:"calico-apiserver-c756dccf-h6pbq", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2e8ba23fe98", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:21:28.955097 env[1270]: 2024-12-13 14:21:28.926 [INFO][4811] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" Dec 13 14:21:28.955097 env[1270]: 2024-12-13 14:21:28.926 [INFO][4811] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" iface="eth0" netns="" Dec 13 14:21:28.955097 env[1270]: 2024-12-13 14:21:28.926 [INFO][4811] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" Dec 13 14:21:28.955097 env[1270]: 2024-12-13 14:21:28.926 [INFO][4811] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" Dec 13 14:21:28.955097 env[1270]: 2024-12-13 14:21:28.944 [INFO][4817] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" HandleID="k8s-pod-network.6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" Workload="localhost-k8s-calico--apiserver--c756dccf--h6pbq-eth0" Dec 13 14:21:28.955097 env[1270]: 2024-12-13 14:21:28.948 [INFO][4817] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:21:28.955097 env[1270]: 2024-12-13 14:21:28.948 [INFO][4817] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:21:28.955097 env[1270]: 2024-12-13 14:21:28.952 [WARNING][4817] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" HandleID="k8s-pod-network.6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" Workload="localhost-k8s-calico--apiserver--c756dccf--h6pbq-eth0" Dec 13 14:21:28.955097 env[1270]: 2024-12-13 14:21:28.952 [INFO][4817] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" HandleID="k8s-pod-network.6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" Workload="localhost-k8s-calico--apiserver--c756dccf--h6pbq-eth0" Dec 13 14:21:28.955097 env[1270]: 2024-12-13 14:21:28.952 [INFO][4817] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:21:28.955097 env[1270]: 2024-12-13 14:21:28.954 [INFO][4811] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72" Dec 13 14:21:28.962596 env[1270]: time="2024-12-13T14:21:28.955333657Z" level=info msg="TearDown network for sandbox \"6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72\" successfully" Dec 13 14:21:29.046444 env[1270]: time="2024-12-13T14:21:29.046374088Z" level=info msg="RemovePodSandbox \"6bd67adacf487f5221d436b87f286a82935acbe2344f12430038f3c6bdf7fd72\" returns successfully" Dec 13 14:21:39.982466 kubelet[2196]: I1213 14:21:39.977732 2196 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:21:40.166270 kubelet[2196]: I1213 14:21:40.166224 2196 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-l59ps" podStartSLOduration=46.264968784 podStartE2EDuration="58.158708598s" podCreationTimestamp="2024-12-13 14:20:42 +0000 UTC" firstStartedPulling="2024-12-13 14:21:11.318397657 +0000 UTC m=+49.673417442" lastFinishedPulling="2024-12-13 14:21:23.212137471 +0000 UTC m=+61.567157256" observedRunningTime="2024-12-13 14:21:25.677896788 +0000 UTC m=+64.032916584" watchObservedRunningTime="2024-12-13 14:21:40.158708598 +0000 UTC m=+78.513728382" Dec 13 14:21:40.305472 kernel: kauditd_printk_skb: 33 callbacks suppressed Dec 13 14:21:40.305942 kernel: audit: type=1325 audit(1734099700.303:1331): table=filter:117 family=2 entries=8 op=nft_register_rule pid=4830 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:21:40.303000 audit[4830]: NETFILTER_CFG table=filter:117 family=2 entries=8 op=nft_register_rule pid=4830 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:21:40.303000 audit[4830]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcd440f810 a2=0 a3=7ffcd440f7fc items=0 ppid=2329 pid=4830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:40.311300 kernel: audit: type=1300 audit(1734099700.303:1331): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcd440f810 a2=0 a3=7ffcd440f7fc items=0 ppid=2329 pid=4830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:40.311325 kernel: audit: type=1327 audit(1734099700.303:1331): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:40.303000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:40.316000 audit[4830]: NETFILTER_CFG table=nat:118 family=2 entries=34 op=nft_register_chain pid=4830 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:21:40.316000 audit[4830]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffcd440f810 a2=0 a3=7ffcd440f7fc items=0 ppid=2329 pid=4830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:40.323059 kernel: audit: type=1325 audit(1734099700.316:1332): table=nat:118 family=2 entries=34 op=nft_register_chain pid=4830 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:21:40.323127 kernel: audit: type=1300 audit(1734099700.316:1332): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffcd440f810 a2=0 a3=7ffcd440f7fc items=0 ppid=2329 pid=4830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:40.323567 kernel: audit: type=1327 audit(1734099700.316:1332): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:40.316000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:21:44.058488 systemd[1]: Started sshd@7-139.178.70.104:22-147.75.109.163:40876.service. Dec 13 14:21:44.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.104:22-147.75.109.163:40876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:44.065558 kernel: audit: type=1130 audit(1734099704.059:1333): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.104:22-147.75.109.163:40876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:44.173000 audit[4844]: USER_ACCT pid=4844 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:44.175406 sshd[4844]: Accepted publickey for core from 147.75.109.163 port 40876 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:21:44.178531 kernel: audit: type=1101 audit(1734099704.173:1334): pid=4844 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:44.178000 audit[4844]: CRED_ACQ pid=4844 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:44.185714 kernel: audit: type=1103 audit(1734099704.178:1335): pid=4844 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:44.185841 kernel: audit: type=1006 audit(1734099704.178:1336): pid=4844 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Dec 13 14:21:44.178000 audit[4844]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc52df410 a2=3 a3=0 items=0 ppid=1 pid=4844 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:44.178000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:21:44.187245 sshd[4844]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:21:44.201824 systemd-logind[1241]: New session 10 of user core. Dec 13 14:21:44.208961 systemd[1]: Started session-10.scope. Dec 13 14:21:44.214000 audit[4844]: USER_START pid=4844 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:44.215000 audit[4847]: CRED_ACQ pid=4847 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:45.399800 sshd[4844]: pam_unix(sshd:session): session closed for user core Dec 13 14:21:45.409287 kernel: kauditd_printk_skb: 4 callbacks suppressed Dec 13 14:21:45.409470 kernel: audit: type=1106 audit(1734099705.400:1339): pid=4844 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:45.409505 kernel: audit: type=1104 audit(1734099705.401:1340): pid=4844 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:45.400000 audit[4844]: USER_END pid=4844 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:45.401000 audit[4844]: CRED_DISP pid=4844 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:45.410212 systemd[1]: sshd@7-139.178.70.104:22-147.75.109.163:40876.service: Deactivated successfully. Dec 13 14:21:45.410000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.104:22-147.75.109.163:40876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:45.411866 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 14:21:45.415742 kernel: audit: type=1131 audit(1734099705.410:1341): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.104:22-147.75.109.163:40876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:45.415483 systemd-logind[1241]: Session 10 logged out. Waiting for processes to exit. Dec 13 14:21:45.416531 systemd-logind[1241]: Removed session 10. Dec 13 14:21:50.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.104:22-147.75.109.163:35872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:50.433038 kernel: audit: type=1130 audit(1734099710.414:1342): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.104:22-147.75.109.163:35872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:50.415223 systemd[1]: Started sshd@8-139.178.70.104:22-147.75.109.163:35872.service. Dec 13 14:21:50.752647 sshd[4880]: Accepted publickey for core from 147.75.109.163 port 35872 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:21:50.752000 audit[4880]: USER_ACCT pid=4880 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:50.757555 kernel: audit: type=1101 audit(1734099710.752:1343): pid=4880 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:50.757000 audit[4880]: CRED_ACQ pid=4880 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:50.763844 kernel: audit: type=1103 audit(1734099710.757:1344): pid=4880 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:50.764063 kernel: audit: type=1006 audit(1734099710.761:1345): pid=4880 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Dec 13 14:21:50.767565 kernel: audit: type=1300 audit(1734099710.761:1345): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbb2b2c00 a2=3 a3=0 items=0 ppid=1 pid=4880 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.761000 audit[4880]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbb2b2c00 a2=3 a3=0 items=0 ppid=1 pid=4880 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:50.761000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:21:50.769367 sshd[4880]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:21:50.770338 kernel: audit: type=1327 audit(1734099710.761:1345): proctitle=737368643A20636F7265205B707269765D Dec 13 14:21:50.777336 systemd-logind[1241]: New session 11 of user core. Dec 13 14:21:50.778682 systemd[1]: Started session-11.scope. Dec 13 14:21:50.786000 audit[4880]: USER_START pid=4880 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:50.788000 audit[4882]: CRED_ACQ pid=4882 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:50.794196 kernel: audit: type=1105 audit(1734099710.786:1346): pid=4880 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:50.794877 kernel: audit: type=1103 audit(1734099710.788:1347): pid=4882 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:51.225775 sshd[4880]: pam_unix(sshd:session): session closed for user core Dec 13 14:21:51.227000 audit[4880]: USER_END pid=4880 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:51.229095 systemd[1]: sshd@8-139.178.70.104:22-147.75.109.163:35872.service: Deactivated successfully. Dec 13 14:21:51.229712 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 14:21:51.235835 kernel: audit: type=1106 audit(1734099711.227:1348): pid=4880 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:51.235887 kernel: audit: type=1104 audit(1734099711.227:1349): pid=4880 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:51.227000 audit[4880]: CRED_DISP pid=4880 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:51.227000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.104:22-147.75.109.163:35872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:51.236413 systemd-logind[1241]: Session 11 logged out. Waiting for processes to exit. Dec 13 14:21:51.237779 systemd-logind[1241]: Removed session 11. Dec 13 14:21:55.008644 systemd[1]: run-containerd-runc-k8s.io-7eeeab92596f95fc6ee0aa8f0f39fdb328fe9d2eec70615390e278dcd0ba130b-runc.S9ZYBx.mount: Deactivated successfully. Dec 13 14:21:56.227759 systemd[1]: Started sshd@9-139.178.70.104:22-147.75.109.163:46626.service. Dec 13 14:21:56.231463 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:21:56.232588 kernel: audit: type=1130 audit(1734099716.228:1351): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.104:22-147.75.109.163:46626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:56.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.104:22-147.75.109.163:46626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:56.296485 sshd[4934]: Accepted publickey for core from 147.75.109.163 port 46626 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:21:56.295000 audit[4934]: USER_ACCT pid=4934 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:56.300471 kernel: audit: type=1101 audit(1734099716.295:1352): pid=4934 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:56.301295 sshd[4934]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:21:56.300000 audit[4934]: CRED_ACQ pid=4934 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:56.307676 kernel: audit: type=1103 audit(1734099716.300:1353): pid=4934 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:56.307716 kernel: audit: type=1006 audit(1734099716.300:1354): pid=4934 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Dec 13 14:21:56.300000 audit[4934]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1abf5b10 a2=3 a3=0 items=0 ppid=1 pid=4934 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:56.311393 kernel: audit: type=1300 audit(1734099716.300:1354): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1abf5b10 a2=3 a3=0 items=0 ppid=1 pid=4934 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:56.300000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:21:56.315475 kernel: audit: type=1327 audit(1734099716.300:1354): proctitle=737368643A20636F7265205B707269765D Dec 13 14:21:56.316824 systemd[1]: Started session-12.scope. Dec 13 14:21:56.317757 systemd-logind[1241]: New session 12 of user core. Dec 13 14:21:56.321000 audit[4934]: USER_START pid=4934 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:56.325824 kernel: audit: type=1105 audit(1734099716.321:1355): pid=4934 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:56.324000 audit[4936]: CRED_ACQ pid=4936 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:56.332521 kernel: audit: type=1103 audit(1734099716.324:1356): pid=4936 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:56.630207 systemd[1]: Started sshd@10-139.178.70.104:22-147.75.109.163:46628.service. Dec 13 14:21:56.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.104:22-147.75.109.163:46628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:56.631705 sshd[4934]: pam_unix(sshd:session): session closed for user core Dec 13 14:21:56.634152 systemd-logind[1241]: Session 12 logged out. Waiting for processes to exit. Dec 13 14:21:56.634462 kernel: audit: type=1130 audit(1734099716.629:1357): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.104:22-147.75.109.163:46628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:56.630000 audit[4934]: USER_END pid=4934 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:56.635249 systemd[1]: sshd@9-139.178.70.104:22-147.75.109.163:46626.service: Deactivated successfully. Dec 13 14:21:56.635732 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 14:21:56.636882 systemd-logind[1241]: Removed session 12. Dec 13 14:21:56.639565 kernel: audit: type=1106 audit(1734099716.630:1358): pid=4934 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:56.630000 audit[4934]: CRED_DISP pid=4934 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:56.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.104:22-147.75.109.163:46626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:56.672000 audit[4946]: USER_ACCT pid=4946 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:56.673000 audit[4946]: CRED_ACQ pid=4946 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:56.673000 audit[4946]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed544aa60 a2=3 a3=0 items=0 ppid=1 pid=4946 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:56.673000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:21:56.680000 audit[4946]: USER_START pid=4946 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:56.681000 audit[4949]: CRED_ACQ pid=4949 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:56.677574 systemd[1]: Started session-13.scope. Dec 13 14:21:56.674565 sshd[4946]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:21:56.691824 sshd[4946]: Accepted publickey for core from 147.75.109.163 port 46628 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:21:56.678358 systemd-logind[1241]: New session 13 of user core. Dec 13 14:21:56.812887 sshd[4946]: pam_unix(sshd:session): session closed for user core Dec 13 14:21:56.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.104:22-147.75.109.163:46638 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:56.815437 systemd[1]: Started sshd@11-139.178.70.104:22-147.75.109.163:46638.service. Dec 13 14:21:56.824000 audit[4946]: USER_END pid=4946 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:56.824000 audit[4946]: CRED_DISP pid=4946 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:56.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.104:22-147.75.109.163:46628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:56.826901 systemd[1]: sshd@10-139.178.70.104:22-147.75.109.163:46628.service: Deactivated successfully. Dec 13 14:21:56.827413 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 14:21:56.828308 systemd-logind[1241]: Session 13 logged out. Waiting for processes to exit. Dec 13 14:21:56.828945 systemd-logind[1241]: Removed session 13. Dec 13 14:21:56.855124 sshd[4957]: Accepted publickey for core from 147.75.109.163 port 46638 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:21:56.856088 sshd[4957]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:21:56.854000 audit[4957]: USER_ACCT pid=4957 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:56.855000 audit[4957]: CRED_ACQ pid=4957 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:56.855000 audit[4957]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfd3078a0 a2=3 a3=0 items=0 ppid=1 pid=4957 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:21:56.855000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:21:56.859066 systemd[1]: Started session-14.scope. Dec 13 14:21:56.859533 systemd-logind[1241]: New session 14 of user core. Dec 13 14:21:56.862000 audit[4957]: USER_START pid=4957 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:56.863000 audit[4960]: CRED_ACQ pid=4960 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:56.976130 sshd[4957]: pam_unix(sshd:session): session closed for user core Dec 13 14:21:56.982000 audit[4957]: USER_END pid=4957 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:56.983000 audit[4957]: CRED_DISP pid=4957 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:21:56.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.104:22-147.75.109.163:46638 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:21:56.984544 systemd[1]: sshd@11-139.178.70.104:22-147.75.109.163:46638.service: Deactivated successfully. Dec 13 14:21:56.985063 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 14:21:56.985952 systemd-logind[1241]: Session 14 logged out. Waiting for processes to exit. Dec 13 14:21:56.986622 systemd-logind[1241]: Removed session 14. Dec 13 14:22:01.982598 kernel: kauditd_printk_skb: 23 callbacks suppressed Dec 13 14:22:01.982735 kernel: audit: type=1130 audit(1734099721.980:1378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.104:22-147.75.109.163:46652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:01.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.104:22-147.75.109.163:46652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:01.980703 systemd[1]: Started sshd@12-139.178.70.104:22-147.75.109.163:46652.service. Dec 13 14:22:02.363000 audit[4971]: USER_ACCT pid=4971 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:02.364529 sshd[4971]: Accepted publickey for core from 147.75.109.163 port 46652 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:22:02.367000 audit[4971]: CRED_ACQ pid=4971 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:02.368735 sshd[4971]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:02.371464 kernel: audit: type=1101 audit(1734099722.363:1379): pid=4971 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:02.371560 kernel: audit: type=1103 audit(1734099722.367:1380): pid=4971 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:02.373489 kernel: audit: type=1006 audit(1734099722.368:1381): pid=4971 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 14:22:02.368000 audit[4971]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8ac83510 a2=3 a3=0 items=0 ppid=1 pid=4971 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:02.368000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:02.378490 kernel: audit: type=1300 audit(1734099722.368:1381): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8ac83510 a2=3 a3=0 items=0 ppid=1 pid=4971 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:02.379185 kernel: audit: type=1327 audit(1734099722.368:1381): proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:02.379633 systemd-logind[1241]: New session 15 of user core. Dec 13 14:22:02.380216 systemd[1]: Started session-15.scope. Dec 13 14:22:02.383000 audit[4971]: USER_START pid=4971 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:02.384000 audit[4973]: CRED_ACQ pid=4973 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:02.390239 kernel: audit: type=1105 audit(1734099722.383:1382): pid=4971 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:02.390305 kernel: audit: type=1103 audit(1734099722.384:1383): pid=4973 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:02.500795 sshd[4971]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:02.501000 audit[4971]: USER_END pid=4971 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:02.503378 systemd[1]: sshd@12-139.178.70.104:22-147.75.109.163:46652.service: Deactivated successfully. Dec 13 14:22:02.503853 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 14:22:02.501000 audit[4971]: CRED_DISP pid=4971 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:02.508802 kernel: audit: type=1106 audit(1734099722.501:1384): pid=4971 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:02.509058 kernel: audit: type=1104 audit(1734099722.501:1385): pid=4971 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:02.503000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.104:22-147.75.109.163:46652 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:02.508972 systemd-logind[1241]: Session 15 logged out. Waiting for processes to exit. Dec 13 14:22:02.509518 systemd-logind[1241]: Removed session 15. Dec 13 14:22:07.504389 systemd[1]: Started sshd@13-139.178.70.104:22-147.75.109.163:39192.service. Dec 13 14:22:07.514078 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:22:07.514113 kernel: audit: type=1130 audit(1734099727.504:1387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.104:22-147.75.109.163:39192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:07.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.104:22-147.75.109.163:39192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:07.607000 audit[4986]: USER_ACCT pid=4986 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:07.609106 sshd[4986]: Accepted publickey for core from 147.75.109.163 port 39192 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:22:07.611000 audit[4986]: CRED_ACQ pid=4986 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:07.615171 kernel: audit: type=1101 audit(1734099727.607:1388): pid=4986 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:07.615301 kernel: audit: type=1103 audit(1734099727.611:1389): pid=4986 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:07.615328 kernel: audit: type=1006 audit(1734099727.611:1390): pid=4986 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 14:22:07.616062 sshd[4986]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:07.617129 kernel: audit: type=1300 audit(1734099727.611:1390): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe871c8890 a2=3 a3=0 items=0 ppid=1 pid=4986 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:07.611000 audit[4986]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe871c8890 a2=3 a3=0 items=0 ppid=1 pid=4986 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:07.611000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:07.622490 kernel: audit: type=1327 audit(1734099727.611:1390): proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:07.624038 systemd-logind[1241]: New session 16 of user core. Dec 13 14:22:07.624612 systemd[1]: Started session-16.scope. Dec 13 14:22:07.628000 audit[4986]: USER_START pid=4986 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:07.632000 audit[4990]: CRED_ACQ pid=4990 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:07.636476 kernel: audit: type=1105 audit(1734099727.628:1391): pid=4986 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:07.636588 kernel: audit: type=1103 audit(1734099727.632:1392): pid=4990 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:07.778800 sshd[4986]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:07.779000 audit[4986]: USER_END pid=4986 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:07.783000 audit[4986]: CRED_DISP pid=4986 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:07.786946 kernel: audit: type=1106 audit(1734099727.779:1393): pid=4986 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:07.787009 kernel: audit: type=1104 audit(1734099727.783:1394): pid=4986 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:07.787928 systemd-logind[1241]: Session 16 logged out. Waiting for processes to exit. Dec 13 14:22:07.788052 systemd[1]: sshd@13-139.178.70.104:22-147.75.109.163:39192.service: Deactivated successfully. Dec 13 14:22:07.788516 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 14:22:07.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.104:22-147.75.109.163:39192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:07.789071 systemd-logind[1241]: Removed session 16. Dec 13 14:22:10.890000 audit[4163]: AVC avc: denied { watch } for pid=4163 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_20_54.808679544/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c258 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c248,c258 tclass=file permissive=0 Dec 13 14:22:10.890000 audit[4163]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0009c8720 a2=fc6 a3=0 items=0 ppid=3625 pid=4163 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c258 key=(null) Dec 13 14:22:10.890000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:22:11.357000 audit[4201]: AVC avc: denied { watch } for pid=4201 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_20_54.3809385326/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c426,c937 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c426,c937 tclass=file permissive=0 Dec 13 14:22:11.357000 audit[4201]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000a352a0 a2=fc6 a3=0 items=0 ppid=3769 pid=4201 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c426,c937 key=(null) Dec 13 14:22:11.357000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:22:12.783462 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 14:22:12.783551 kernel: audit: type=1130 audit(1734099732.781:1398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.104:22-147.75.109.163:39206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.104:22-147.75.109.163:39206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.781918 systemd[1]: Started sshd@14-139.178.70.104:22-147.75.109.163:39206.service. Dec 13 14:22:12.819000 audit[5000]: USER_ACCT pid=5000 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:12.820720 sshd[5000]: Accepted publickey for core from 147.75.109.163 port 39206 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:22:12.825476 kernel: audit: type=1101 audit(1734099732.819:1399): pid=5000 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:12.825000 audit[5000]: CRED_ACQ pid=5000 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:12.825968 sshd[5000]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:12.832439 kernel: audit: type=1103 audit(1734099732.825:1400): pid=5000 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:12.832531 kernel: audit: type=1006 audit(1734099732.825:1401): pid=5000 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Dec 13 14:22:12.825000 audit[5000]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8adbc3f0 a2=3 a3=0 items=0 ppid=1 pid=5000 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:12.825000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:12.838185 kernel: audit: type=1300 audit(1734099732.825:1401): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8adbc3f0 a2=3 a3=0 items=0 ppid=1 pid=5000 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:12.838259 kernel: audit: type=1327 audit(1734099732.825:1401): proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:12.840412 systemd[1]: Started session-17.scope. Dec 13 14:22:12.841504 systemd-logind[1241]: New session 17 of user core. Dec 13 14:22:12.844000 audit[5000]: USER_START pid=5000 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:12.845000 audit[5002]: CRED_ACQ pid=5002 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:12.851469 kernel: audit: type=1105 audit(1734099732.844:1402): pid=5000 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:12.851528 kernel: audit: type=1103 audit(1734099732.845:1403): pid=5002 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:12.948045 sshd[5000]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:12.948000 audit[5000]: USER_END pid=5000 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:12.955608 kernel: audit: type=1106 audit(1734099732.948:1404): pid=5000 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:12.955639 kernel: audit: type=1104 audit(1734099732.952:1405): pid=5000 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:12.952000 audit[5000]: CRED_DISP pid=5000 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:12.953347 systemd[1]: sshd@14-139.178.70.104:22-147.75.109.163:39206.service: Deactivated successfully. Dec 13 14:22:12.953827 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 14:22:12.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.104:22-147.75.109.163:39206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:12.956053 systemd-logind[1241]: Session 17 logged out. Waiting for processes to exit. Dec 13 14:22:12.956640 systemd-logind[1241]: Removed session 17. Dec 13 14:22:17.712000 audit[2022]: AVC avc: denied { watch } for pid=2022 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:17.712000 audit[2022]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001676580 a2=fc6 a3=0 items=0 ppid=1885 pid=2022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 key=(null) Dec 13 14:22:17.712000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:22:17.713000 audit[2022]: AVC avc: denied { watch } for pid=2022 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:17.713000 audit[2022]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000fba810 a2=fc6 a3=0 items=0 ppid=1885 pid=2022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 key=(null) Dec 13 14:22:17.713000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:22:17.950343 systemd[1]: Started sshd@15-139.178.70.104:22-147.75.109.163:36178.service. Dec 13 14:22:17.951872 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 14:22:17.951914 kernel: audit: type=1130 audit(1734099737.950:1409): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.104:22-147.75.109.163:36178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:17.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.104:22-147.75.109.163:36178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:18.149000 audit[5014]: USER_ACCT pid=5014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:18.150414 sshd[5014]: Accepted publickey for core from 147.75.109.163 port 36178 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:22:18.153941 sshd[5014]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:18.153000 audit[5014]: CRED_ACQ pid=5014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:18.157151 kernel: audit: type=1101 audit(1734099738.149:1410): pid=5014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:18.157192 kernel: audit: type=1103 audit(1734099738.153:1411): pid=5014 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:18.157212 kernel: audit: type=1006 audit(1734099738.153:1412): pid=5014 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Dec 13 14:22:18.153000 audit[5014]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8221ef00 a2=3 a3=0 items=0 ppid=1 pid=5014 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:18.162324 kernel: audit: type=1300 audit(1734099738.153:1412): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8221ef00 a2=3 a3=0 items=0 ppid=1 pid=5014 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:18.162580 kernel: audit: type=1327 audit(1734099738.153:1412): proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:18.153000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:18.164378 systemd[1]: Started session-18.scope. Dec 13 14:22:18.164659 systemd-logind[1241]: New session 18 of user core. Dec 13 14:22:18.167000 audit[5014]: USER_START pid=5014 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:18.168000 audit[5016]: CRED_ACQ pid=5016 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:18.174613 kernel: audit: type=1105 audit(1734099738.167:1413): pid=5014 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:18.182266 kernel: audit: type=1103 audit(1734099738.168:1414): pid=5016 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:18.343689 sshd[5014]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:18.345908 systemd[1]: Started sshd@16-139.178.70.104:22-147.75.109.163:36188.service. Dec 13 14:22:18.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.104:22-147.75.109.163:36188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:18.349574 kernel: audit: type=1130 audit(1734099738.345:1415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.104:22-147.75.109.163:36188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:18.349000 audit[5014]: USER_END pid=5014 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:18.353472 kernel: audit: type=1106 audit(1734099738.349:1416): pid=5014 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:18.353000 audit[5014]: CRED_DISP pid=5014 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:18.355000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.104:22-147.75.109.163:36178 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:18.355509 systemd[1]: sshd@15-139.178.70.104:22-147.75.109.163:36178.service: Deactivated successfully. Dec 13 14:22:18.356306 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 14:22:18.357881 systemd-logind[1241]: Session 18 logged out. Waiting for processes to exit. Dec 13 14:22:18.358596 systemd-logind[1241]: Removed session 18. Dec 13 14:22:18.395000 audit[5025]: USER_ACCT pid=5025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:18.395897 sshd[5025]: Accepted publickey for core from 147.75.109.163 port 36188 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:22:18.396000 audit[5025]: CRED_ACQ pid=5025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:18.396000 audit[5025]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc00814650 a2=3 a3=0 items=0 ppid=1 pid=5025 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:18.396000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:18.397211 sshd[5025]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:18.401518 systemd[1]: Started session-19.scope. Dec 13 14:22:18.402521 systemd-logind[1241]: New session 19 of user core. Dec 13 14:22:18.405000 audit[5025]: USER_START pid=5025 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:18.406000 audit[5028]: CRED_ACQ pid=5028 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:18.538000 audit[2030]: AVC avc: denied { watch } for pid=2030 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:18.538000 audit[2030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c00b39c360 a2=fc6 a3=0 items=0 ppid=1899 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c888 key=(null) Dec 13 14:22:18.538000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:22:18.539000 audit[2030]: AVC avc: denied { watch } for pid=2030 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:18.539000 audit[2030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c009bb1620 a2=fc6 a3=0 items=0 ppid=1899 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c888 key=(null) Dec 13 14:22:18.539000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:22:18.547000 audit[2030]: AVC avc: denied { watch } for pid=2030 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8242 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:18.547000 audit[2030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c00b39c450 a2=fc6 a3=0 items=0 ppid=1899 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c888 key=(null) Dec 13 14:22:18.547000 audit[2030]: AVC avc: denied { watch } for pid=2030 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:18.547000 audit[2030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c009bb1640 a2=fc6 a3=0 items=0 ppid=1899 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c888 key=(null) Dec 13 14:22:18.547000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:22:18.547000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:22:18.552000 audit[2030]: AVC avc: denied { watch } for pid=2030 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8238 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:18.552000 audit[2030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c00a68d3e0 a2=fc6 a3=0 items=0 ppid=1899 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c888 key=(null) Dec 13 14:22:18.552000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:22:18.555000 audit[2030]: AVC avc: denied { watch } for pid=2030 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8244 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c888 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:18.555000 audit[2030]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c00b39c690 a2=fc6 a3=0 items=0 ppid=1899 pid=2030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c888 key=(null) Dec 13 14:22:18.555000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:22:18.985786 sshd[5025]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:18.986000 audit[5025]: USER_END pid=5025 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:18.987000 audit[5025]: CRED_DISP pid=5025 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:18.988021 systemd[1]: Started sshd@17-139.178.70.104:22-147.75.109.163:36194.service. Dec 13 14:22:18.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.104:22-147.75.109.163:36194 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:19.002566 systemd[1]: sshd@16-139.178.70.104:22-147.75.109.163:36188.service: Deactivated successfully. Dec 13 14:22:19.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.104:22-147.75.109.163:36188 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:19.003086 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 14:22:19.003822 systemd-logind[1241]: Session 19 logged out. Waiting for processes to exit. Dec 13 14:22:19.004335 systemd-logind[1241]: Removed session 19. Dec 13 14:22:19.047000 audit[5034]: USER_ACCT pid=5034 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:19.048277 sshd[5034]: Accepted publickey for core from 147.75.109.163 port 36194 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:22:19.048000 audit[5034]: CRED_ACQ pid=5034 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:19.048000 audit[5034]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd055f2dd0 a2=3 a3=0 items=0 ppid=1 pid=5034 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:19.048000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:19.049536 sshd[5034]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:19.052954 systemd[1]: Started session-20.scope. Dec 13 14:22:19.053296 systemd-logind[1241]: New session 20 of user core. Dec 13 14:22:19.056000 audit[5034]: USER_START pid=5034 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:19.056000 audit[5037]: CRED_ACQ pid=5037 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:19.246461 systemd[1]: run-containerd-runc-k8s.io-5ccbdc925327601363e1ffcc509b8da46637121d645002c9e4ddd4466d783d3a-runc.UmTMcy.mount: Deactivated successfully. Dec 13 14:22:20.798475 sshd[5034]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:20.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.104:22-147.75.109.163:36196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:20.810000 audit[5034]: USER_END pid=5034 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:20.812000 audit[5034]: CRED_DISP pid=5034 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:20.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.104:22-147.75.109.163:36194 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:20.807397 systemd[1]: Started sshd@18-139.178.70.104:22-147.75.109.163:36196.service. Dec 13 14:22:20.828222 systemd[1]: sshd@17-139.178.70.104:22-147.75.109.163:36194.service: Deactivated successfully. Dec 13 14:22:20.828833 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 14:22:20.829331 systemd-logind[1241]: Session 20 logged out. Waiting for processes to exit. Dec 13 14:22:20.829881 systemd-logind[1241]: Removed session 20. Dec 13 14:22:20.902160 sshd[5068]: Accepted publickey for core from 147.75.109.163 port 36196 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:22:20.900000 audit[5068]: USER_ACCT pid=5068 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:20.901000 audit[5068]: CRED_ACQ pid=5068 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:20.901000 audit[5068]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8ba77790 a2=3 a3=0 items=0 ppid=1 pid=5068 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:20.901000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:20.905310 sshd[5068]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:20.911931 systemd[1]: Started session-21.scope. Dec 13 14:22:20.912126 systemd-logind[1241]: New session 21 of user core. Dec 13 14:22:20.914000 audit[5068]: USER_START pid=5068 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:20.915000 audit[5073]: CRED_ACQ pid=5073 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:20.918000 audit[5072]: NETFILTER_CFG table=filter:119 family=2 entries=20 op=nft_register_rule pid=5072 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:20.918000 audit[5072]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe947c1870 a2=0 a3=7ffe947c185c items=0 ppid=2329 pid=5072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:20.918000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:20.923000 audit[5072]: NETFILTER_CFG table=nat:120 family=2 entries=22 op=nft_register_rule pid=5072 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:20.923000 audit[5072]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe947c1870 a2=0 a3=0 items=0 ppid=2329 pid=5072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:20.923000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:20.933000 audit[5075]: NETFILTER_CFG table=filter:121 family=2 entries=32 op=nft_register_rule pid=5075 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:20.933000 audit[5075]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffff8094370 a2=0 a3=7ffff809435c items=0 ppid=2329 pid=5075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:20.933000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:20.937000 audit[5075]: NETFILTER_CFG table=nat:122 family=2 entries=22 op=nft_register_rule pid=5075 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:20.937000 audit[5075]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffff8094370 a2=0 a3=0 items=0 ppid=2329 pid=5075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:20.937000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:21.403231 sshd[5068]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:21.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.104:22-147.75.109.163:36204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:21.405460 systemd[1]: Started sshd@19-139.178.70.104:22-147.75.109.163:36204.service. Dec 13 14:22:21.406000 audit[5068]: USER_END pid=5068 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:21.406000 audit[5068]: CRED_DISP pid=5068 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:21.409000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.104:22-147.75.109.163:36196 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:21.411237 systemd[1]: sshd@18-139.178.70.104:22-147.75.109.163:36196.service: Deactivated successfully. Dec 13 14:22:21.411718 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 14:22:21.411969 systemd-logind[1241]: Session 21 logged out. Waiting for processes to exit. Dec 13 14:22:21.412826 systemd-logind[1241]: Removed session 21. Dec 13 14:22:21.463000 audit[5081]: USER_ACCT pid=5081 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:21.465581 sshd[5081]: Accepted publickey for core from 147.75.109.163 port 36204 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:22:21.464000 audit[5081]: CRED_ACQ pid=5081 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:21.464000 audit[5081]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd38d1d0a0 a2=3 a3=0 items=0 ppid=1 pid=5081 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:21.464000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:21.466421 sshd[5081]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:21.469444 systemd[1]: Started session-22.scope. Dec 13 14:22:21.469872 systemd-logind[1241]: New session 22 of user core. Dec 13 14:22:21.474000 audit[5081]: USER_START pid=5081 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:21.475000 audit[5084]: CRED_ACQ pid=5084 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:21.587594 sshd[5081]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:21.586000 audit[5081]: USER_END pid=5081 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:21.586000 audit[5081]: CRED_DISP pid=5081 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:21.589490 systemd-logind[1241]: Session 22 logged out. Waiting for processes to exit. Dec 13 14:22:21.589698 systemd[1]: sshd@19-139.178.70.104:22-147.75.109.163:36204.service: Deactivated successfully. Dec 13 14:22:21.588000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.104:22-147.75.109.163:36204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:21.590137 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 14:22:21.590917 systemd-logind[1241]: Removed session 22. Dec 13 14:22:21.998000 audit[2022]: AVC avc: denied { watch } for pid=2022 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:21.998000 audit[2022]: AVC avc: denied { watch } for pid=2022 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:21.998000 audit[2022]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000c6e020 a2=fc6 a3=0 items=0 ppid=1885 pid=2022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 key=(null) Dec 13 14:22:21.998000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:22:21.998000 audit[2022]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000a6b8a0 a2=fc6 a3=0 items=0 ppid=1885 pid=2022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 key=(null) Dec 13 14:22:21.998000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:22:22.033000 audit[2022]: AVC avc: denied { watch } for pid=2022 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:22.033000 audit[2022]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=f a1=c000a6b920 a2=fc6 a3=0 items=0 ppid=1885 pid=2022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 key=(null) Dec 13 14:22:22.033000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:22:22.041000 audit[2022]: AVC avc: denied { watch } for pid=2022 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8236 scontext=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:22:22.041000 audit[2022]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c6e0c0 a2=fc6 a3=0 items=0 ppid=1885 pid=2022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c410,c756 key=(null) Dec 13 14:22:22.041000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:22:26.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.104:22-147.75.109.163:38154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:26.595818 kernel: kauditd_printk_skb: 87 callbacks suppressed Dec 13 14:22:26.602154 kernel: audit: type=1130 audit(1734099746.589:1468): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.104:22-147.75.109.163:38154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:26.591244 systemd[1]: Started sshd@20-139.178.70.104:22-147.75.109.163:38154.service. Dec 13 14:22:26.714000 audit[5121]: USER_ACCT pid=5121 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:26.716459 sshd[5121]: Accepted publickey for core from 147.75.109.163 port 38154 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:22:26.720507 kernel: audit: type=1101 audit(1734099746.714:1469): pid=5121 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:26.720780 kernel: audit: type=1103 audit(1734099746.719:1470): pid=5121 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:26.719000 audit[5121]: CRED_ACQ pid=5121 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:26.725791 kernel: audit: type=1006 audit(1734099746.719:1471): pid=5121 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Dec 13 14:22:26.719000 audit[5121]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc3b426f0 a2=3 a3=0 items=0 ppid=1 pid=5121 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:26.729151 kernel: audit: type=1300 audit(1734099746.719:1471): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc3b426f0 a2=3 a3=0 items=0 ppid=1 pid=5121 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:26.719000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:26.730325 kernel: audit: type=1327 audit(1734099746.719:1471): proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:26.730507 sshd[5121]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:26.735702 systemd[1]: Started session-23.scope. Dec 13 14:22:26.735879 systemd-logind[1241]: New session 23 of user core. Dec 13 14:22:26.738000 audit[5121]: USER_START pid=5121 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:26.739000 audit[5124]: NETFILTER_CFG table=filter:123 family=2 entries=20 op=nft_register_rule pid=5124 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:26.745565 kernel: audit: type=1105 audit(1734099746.738:1472): pid=5121 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:26.745599 kernel: audit: type=1325 audit(1734099746.739:1473): table=filter:123 family=2 entries=20 op=nft_register_rule pid=5124 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:26.739000 audit[5124]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc65c818e0 a2=0 a3=7ffc65c818cc items=0 ppid=2329 pid=5124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:26.749576 kernel: audit: type=1300 audit(1734099746.739:1473): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc65c818e0 a2=0 a3=7ffc65c818cc items=0 ppid=2329 pid=5124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:26.739000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:26.751476 kernel: audit: type=1327 audit(1734099746.739:1473): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:26.744000 audit[5125]: CRED_ACQ pid=5125 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:26.750000 audit[5124]: NETFILTER_CFG table=nat:124 family=2 entries=106 op=nft_register_chain pid=5124 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:22:26.750000 audit[5124]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffc65c818e0 a2=0 a3=7ffc65c818cc items=0 ppid=2329 pid=5124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:26.750000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:22:27.046599 sshd[5121]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:27.045000 audit[5121]: USER_END pid=5121 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:27.045000 audit[5121]: CRED_DISP pid=5121 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:27.048673 systemd[1]: sshd@20-139.178.70.104:22-147.75.109.163:38154.service: Deactivated successfully. Dec 13 14:22:27.047000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-139.178.70.104:22-147.75.109.163:38154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:27.049142 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 14:22:27.049576 systemd-logind[1241]: Session 23 logged out. Waiting for processes to exit. Dec 13 14:22:27.050022 systemd-logind[1241]: Removed session 23. Dec 13 14:22:32.051574 systemd[1]: Started sshd@21-139.178.70.104:22-147.75.109.163:38170.service. Dec 13 14:22:32.054188 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 14:22:32.054252 kernel: audit: type=1130 audit(1734099752.050:1479): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.104:22-147.75.109.163:38170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:32.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.104:22-147.75.109.163:38170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:32.124000 audit[5137]: USER_ACCT pid=5137 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:32.131242 sshd[5137]: Accepted publickey for core from 147.75.109.163 port 38170 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:22:32.131475 kernel: audit: type=1101 audit(1734099752.124:1480): pid=5137 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:32.130000 audit[5137]: CRED_ACQ pid=5137 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:32.138591 kernel: audit: type=1103 audit(1734099752.130:1481): pid=5137 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:32.138648 kernel: audit: type=1006 audit(1734099752.135:1482): pid=5137 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 14:22:32.135000 audit[5137]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff45bb170 a2=3 a3=0 items=0 ppid=1 pid=5137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:32.142396 kernel: audit: type=1300 audit(1734099752.135:1482): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff45bb170 a2=3 a3=0 items=0 ppid=1 pid=5137 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:32.135000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:32.142884 sshd[5137]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:32.144458 kernel: audit: type=1327 audit(1734099752.135:1482): proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:32.147068 systemd[1]: Started session-24.scope. Dec 13 14:22:32.148044 systemd-logind[1241]: New session 24 of user core. Dec 13 14:22:32.149000 audit[5137]: USER_START pid=5137 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:32.153000 audit[5139]: CRED_ACQ pid=5139 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:32.158106 kernel: audit: type=1105 audit(1734099752.149:1483): pid=5137 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:32.159087 kernel: audit: type=1103 audit(1734099752.153:1484): pid=5139 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:32.404926 sshd[5137]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:32.405000 audit[5137]: USER_END pid=5137 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:32.405000 audit[5137]: CRED_DISP pid=5137 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:32.413715 kernel: audit: type=1106 audit(1734099752.405:1485): pid=5137 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:32.413754 kernel: audit: type=1104 audit(1734099752.405:1486): pid=5137 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:32.419442 systemd-logind[1241]: Session 24 logged out. Waiting for processes to exit. Dec 13 14:22:32.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-139.178.70.104:22-147.75.109.163:38170 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:32.420395 systemd[1]: sshd@21-139.178.70.104:22-147.75.109.163:38170.service: Deactivated successfully. Dec 13 14:22:32.420895 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 14:22:32.421740 systemd-logind[1241]: Removed session 24. Dec 13 14:22:37.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.104:22-147.75.109.163:56980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:37.426382 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:22:37.444369 kernel: audit: type=1130 audit(1734099757.407:1488): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.104:22-147.75.109.163:56980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:37.409228 systemd[1]: Started sshd@22-139.178.70.104:22-147.75.109.163:56980.service. Dec 13 14:22:37.687000 audit[5153]: USER_ACCT pid=5153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:37.689483 sshd[5153]: Accepted publickey for core from 147.75.109.163 port 56980 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:22:37.693499 kernel: audit: type=1101 audit(1734099757.687:1489): pid=5153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:37.698020 kernel: audit: type=1103 audit(1734099757.693:1490): pid=5153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:37.693000 audit[5153]: CRED_ACQ pid=5153 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:37.701360 kernel: audit: type=1006 audit(1734099757.693:1491): pid=5153 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 13 14:22:37.713038 kernel: audit: type=1300 audit(1734099757.693:1491): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe95f81a80 a2=3 a3=0 items=0 ppid=1 pid=5153 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:37.713071 kernel: audit: type=1327 audit(1734099757.693:1491): proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:37.693000 audit[5153]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe95f81a80 a2=3 a3=0 items=0 ppid=1 pid=5153 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:22:37.693000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:22:37.712910 sshd[5153]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:22:37.736216 systemd[1]: Started session-25.scope. Dec 13 14:22:37.736515 systemd-logind[1241]: New session 25 of user core. Dec 13 14:22:37.740000 audit[5153]: USER_START pid=5153 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:37.745000 audit[5157]: CRED_ACQ pid=5157 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:37.751168 kernel: audit: type=1105 audit(1734099757.740:1492): pid=5153 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:37.751217 kernel: audit: type=1103 audit(1734099757.745:1493): pid=5157 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:38.420599 sshd[5153]: pam_unix(sshd:session): session closed for user core Dec 13 14:22:38.420000 audit[5153]: USER_END pid=5153 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:38.423140 systemd[1]: sshd@22-139.178.70.104:22-147.75.109.163:56980.service: Deactivated successfully. Dec 13 14:22:38.423632 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 14:22:38.420000 audit[5153]: CRED_DISP pid=5153 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:38.426018 systemd-logind[1241]: Session 25 logged out. Waiting for processes to exit. Dec 13 14:22:38.429067 kernel: audit: type=1106 audit(1734099758.420:1494): pid=5153 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:38.429120 kernel: audit: type=1104 audit(1734099758.420:1495): pid=5153 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:22:38.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-139.178.70.104:22-147.75.109.163:56980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:22:38.430044 systemd-logind[1241]: Removed session 25.