Dec 16 13:18:13.986781 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 16 13:18:13.986824 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 16 13:18:13.986846 kernel: BIOS-provided physical RAM map: Dec 16 13:18:13.986857 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Dec 16 13:18:13.986867 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Dec 16 13:18:13.986878 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Dec 16 13:18:13.986891 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdafff] usable Dec 16 13:18:13.986901 kernel: BIOS-e820: [mem 0x000000007ffdb000-0x000000007fffffff] reserved Dec 16 13:18:13.986915 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Dec 16 13:18:13.986926 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Dec 16 13:18:13.986938 kernel: NX (Execute Disable) protection: active Dec 16 13:18:13.986951 kernel: SMBIOS 2.8 present. Dec 16 13:18:13.986962 kernel: DMI: DigitalOcean Droplet/Droplet, BIOS 20171212 12/12/2017 Dec 16 13:18:13.986973 kernel: Hypervisor detected: KVM Dec 16 13:18:13.986987 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 16 13:18:13.987003 kernel: kvm-clock: cpu 0, msr 5b19a001, primary cpu clock Dec 16 13:18:13.987016 kernel: kvm-clock: using sched offset of 3603237882 cycles Dec 16 13:18:13.987029 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 16 13:18:13.987041 kernel: tsc: Detected 2494.140 MHz processor Dec 16 13:18:13.987053 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 16 13:18:13.987066 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 16 13:18:13.987084 kernel: last_pfn = 0x7ffdb max_arch_pfn = 0x400000000 Dec 16 13:18:13.987098 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 16 13:18:13.987115 kernel: ACPI: Early table checksum verification disabled Dec 16 13:18:13.987129 kernel: ACPI: RSDP 0x00000000000F5950 000014 (v00 BOCHS ) Dec 16 13:18:13.987142 kernel: ACPI: RSDT 0x000000007FFE1986 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 16 13:18:13.987156 kernel: ACPI: FACP 0x000000007FFE176A 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 16 13:18:13.987168 kernel: ACPI: DSDT 0x000000007FFE0040 00172A (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 16 13:18:13.987179 kernel: ACPI: FACS 0x000000007FFE0000 000040 Dec 16 13:18:13.987191 kernel: ACPI: APIC 0x000000007FFE17DE 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 16 13:18:13.987202 kernel: ACPI: HPET 0x000000007FFE185E 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 16 13:18:13.987215 kernel: ACPI: SRAT 0x000000007FFE1896 0000C8 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 16 13:18:13.987232 kernel: ACPI: WAET 0x000000007FFE195E 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 16 13:18:13.987243 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe176a-0x7ffe17dd] Dec 16 13:18:13.987254 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe1769] Dec 16 13:18:13.987267 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] Dec 16 13:18:13.987295 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17de-0x7ffe185d] Dec 16 13:18:13.987346 kernel: ACPI: Reserving HPET table memory at [mem 0x7ffe185e-0x7ffe1895] Dec 16 13:18:13.987387 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe1896-0x7ffe195d] Dec 16 13:18:13.987401 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe195e-0x7ffe1985] Dec 16 13:18:13.987425 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 16 13:18:13.987438 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 16 13:18:13.987451 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Dec 16 13:18:13.987465 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Dec 16 13:18:13.987479 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdafff] -> [mem 0x00000000-0x7ffdafff] Dec 16 13:18:13.987492 kernel: NODE_DATA(0) allocated [mem 0x7ffd5000-0x7ffdafff] Dec 16 13:18:13.987512 kernel: Zone ranges: Dec 16 13:18:13.987524 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 16 13:18:13.987537 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdafff] Dec 16 13:18:13.987549 kernel: Normal empty Dec 16 13:18:13.987562 kernel: Movable zone start for each node Dec 16 13:18:13.987576 kernel: Early memory node ranges Dec 16 13:18:13.987588 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Dec 16 13:18:13.987601 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdafff] Dec 16 13:18:13.987614 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdafff] Dec 16 13:18:13.987632 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 16 13:18:13.987653 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Dec 16 13:18:13.987665 kernel: On node 0, zone DMA32: 37 pages in unavailable ranges Dec 16 13:18:13.987678 kernel: ACPI: PM-Timer IO Port: 0x608 Dec 16 13:18:13.987692 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 16 13:18:13.987705 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 16 13:18:13.987718 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 16 13:18:13.987729 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 16 13:18:13.987741 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 16 13:18:13.987759 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 16 13:18:13.987772 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 16 13:18:13.987786 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 16 13:18:13.987799 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Dec 16 13:18:13.987818 kernel: TSC deadline timer available Dec 16 13:18:13.987832 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 16 13:18:13.987845 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices Dec 16 13:18:13.987854 kernel: Booting paravirtualized kernel on KVM Dec 16 13:18:13.987863 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 16 13:18:13.987873 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 16 13:18:13.987890 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 16 13:18:13.987902 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 16 13:18:13.987913 kernel: pcpu-alloc: [0] 0 1 Dec 16 13:18:13.987925 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 Dec 16 13:18:13.987936 kernel: kvm-guest: PV spinlocks disabled, no host support Dec 16 13:18:13.987947 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515803 Dec 16 13:18:13.987959 kernel: Policy zone: DMA32 Dec 16 13:18:13.987972 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 16 13:18:13.987988 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 16 13:18:13.988000 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 16 13:18:13.988012 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 16 13:18:13.988026 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 16 13:18:13.988040 kernel: Memory: 1973276K/2096612K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 123076K reserved, 0K cma-reserved) Dec 16 13:18:13.988055 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 16 13:18:13.988066 kernel: Kernel/User page tables isolation: enabled Dec 16 13:18:13.988075 kernel: ftrace: allocating 34549 entries in 135 pages Dec 16 13:18:13.988087 kernel: ftrace: allocated 135 pages with 4 groups Dec 16 13:18:13.988096 kernel: rcu: Hierarchical RCU implementation. Dec 16 13:18:13.988106 kernel: rcu: RCU event tracing is enabled. Dec 16 13:18:13.988115 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 16 13:18:13.988124 kernel: Rude variant of Tasks RCU enabled. Dec 16 13:18:13.988132 kernel: Tracing variant of Tasks RCU enabled. Dec 16 13:18:13.988142 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 16 13:18:13.988151 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 16 13:18:13.988159 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Dec 16 13:18:13.988171 kernel: random: crng init done Dec 16 13:18:13.988179 kernel: Console: colour VGA+ 80x25 Dec 16 13:18:13.988188 kernel: printk: console [tty0] enabled Dec 16 13:18:13.988197 kernel: printk: console [ttyS0] enabled Dec 16 13:18:13.988206 kernel: ACPI: Core revision 20210730 Dec 16 13:18:13.988215 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Dec 16 13:18:13.988224 kernel: APIC: Switch to symmetric I/O mode setup Dec 16 13:18:13.988233 kernel: x2apic enabled Dec 16 13:18:13.988241 kernel: Switched APIC routing to physical x2apic. Dec 16 13:18:13.988250 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Dec 16 13:18:13.988262 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x23f39a1d859, max_idle_ns: 440795326830 ns Dec 16 13:18:13.988271 kernel: Calibrating delay loop (skipped) preset value.. 4988.28 BogoMIPS (lpj=2494140) Dec 16 13:18:13.996409 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Dec 16 13:18:13.996444 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Dec 16 13:18:13.996458 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 16 13:18:13.996476 kernel: Spectre V2 : Mitigation: Retpolines Dec 16 13:18:13.996491 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 16 13:18:13.996504 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 16 13:18:13.996530 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls Dec 16 13:18:13.996557 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 16 13:18:13.996567 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 16 13:18:13.996579 kernel: MDS: Mitigation: Clear CPU buffers Dec 16 13:18:13.996588 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 16 13:18:13.996597 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 16 13:18:13.996607 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 16 13:18:13.996616 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 16 13:18:13.996625 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 16 13:18:13.996635 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 16 13:18:13.996646 kernel: Freeing SMP alternatives memory: 32K Dec 16 13:18:13.996655 kernel: pid_max: default: 32768 minimum: 301 Dec 16 13:18:13.996664 kernel: LSM: Security Framework initializing Dec 16 13:18:13.996674 kernel: SELinux: Initializing. Dec 16 13:18:13.996683 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 16 13:18:13.996692 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 16 13:18:13.996701 kernel: smpboot: CPU0: Intel DO-Regular (family: 0x6, model: 0x4f, stepping: 0x1) Dec 16 13:18:13.996713 kernel: Performance Events: unsupported p6 CPU model 79 no PMU driver, software events only. Dec 16 13:18:13.996722 kernel: signal: max sigframe size: 1776 Dec 16 13:18:13.996731 kernel: rcu: Hierarchical SRCU implementation. Dec 16 13:18:13.996741 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 16 13:18:13.996750 kernel: smp: Bringing up secondary CPUs ... Dec 16 13:18:13.996759 kernel: x86: Booting SMP configuration: Dec 16 13:18:13.996768 kernel: .... node #0, CPUs: #1 Dec 16 13:18:13.996777 kernel: kvm-clock: cpu 1, msr 5b19a041, secondary cpu clock Dec 16 13:18:13.996787 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 Dec 16 13:18:13.996799 kernel: smp: Brought up 1 node, 2 CPUs Dec 16 13:18:13.996813 kernel: smpboot: Max logical packages: 1 Dec 16 13:18:13.996827 kernel: smpboot: Total of 2 processors activated (9976.56 BogoMIPS) Dec 16 13:18:13.996839 kernel: devtmpfs: initialized Dec 16 13:18:13.996853 kernel: x86/mm: Memory block size: 128MB Dec 16 13:18:13.996866 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 16 13:18:13.996881 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 16 13:18:13.996896 kernel: pinctrl core: initialized pinctrl subsystem Dec 16 13:18:13.996905 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 16 13:18:13.996918 kernel: audit: initializing netlink subsys (disabled) Dec 16 13:18:13.996927 kernel: audit: type=2000 audit(1734355092.832:1): state=initialized audit_enabled=0 res=1 Dec 16 13:18:13.996937 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 16 13:18:13.996946 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 16 13:18:13.996955 kernel: cpuidle: using governor menu Dec 16 13:18:13.996965 kernel: ACPI: bus type PCI registered Dec 16 13:18:13.996979 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 16 13:18:13.996991 kernel: dca service started, version 1.12.1 Dec 16 13:18:13.997002 kernel: PCI: Using configuration type 1 for base access Dec 16 13:18:13.997025 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 16 13:18:13.997039 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 16 13:18:13.997052 kernel: ACPI: Added _OSI(Module Device) Dec 16 13:18:13.997065 kernel: ACPI: Added _OSI(Processor Device) Dec 16 13:18:13.997078 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 16 13:18:13.997091 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 16 13:18:13.997102 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 16 13:18:13.997116 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 16 13:18:13.997129 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 16 13:18:13.997147 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 16 13:18:13.997159 kernel: ACPI: Interpreter enabled Dec 16 13:18:13.997171 kernel: ACPI: PM: (supports S0 S5) Dec 16 13:18:13.997184 kernel: ACPI: Using IOAPIC for interrupt routing Dec 16 13:18:13.997197 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 16 13:18:13.997209 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Dec 16 13:18:13.997222 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 16 13:18:14.002625 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Dec 16 13:18:14.002816 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Dec 16 13:18:14.002838 kernel: acpiphp: Slot [3] registered Dec 16 13:18:14.002852 kernel: acpiphp: Slot [4] registered Dec 16 13:18:14.002866 kernel: acpiphp: Slot [5] registered Dec 16 13:18:14.002879 kernel: acpiphp: Slot [6] registered Dec 16 13:18:14.002893 kernel: acpiphp: Slot [7] registered Dec 16 13:18:14.002907 kernel: acpiphp: Slot [8] registered Dec 16 13:18:14.002921 kernel: acpiphp: Slot [9] registered Dec 16 13:18:14.002934 kernel: acpiphp: Slot [10] registered Dec 16 13:18:14.002953 kernel: acpiphp: Slot [11] registered Dec 16 13:18:14.002964 kernel: acpiphp: Slot [12] registered Dec 16 13:18:14.002976 kernel: acpiphp: Slot [13] registered Dec 16 13:18:14.002989 kernel: acpiphp: Slot [14] registered Dec 16 13:18:14.003002 kernel: acpiphp: Slot [15] registered Dec 16 13:18:14.003014 kernel: acpiphp: Slot [16] registered Dec 16 13:18:14.003028 kernel: acpiphp: Slot [17] registered Dec 16 13:18:14.003043 kernel: acpiphp: Slot [18] registered Dec 16 13:18:14.003059 kernel: acpiphp: Slot [19] registered Dec 16 13:18:14.003086 kernel: acpiphp: Slot [20] registered Dec 16 13:18:14.003098 kernel: acpiphp: Slot [21] registered Dec 16 13:18:14.003111 kernel: acpiphp: Slot [22] registered Dec 16 13:18:14.003124 kernel: acpiphp: Slot [23] registered Dec 16 13:18:14.003137 kernel: acpiphp: Slot [24] registered Dec 16 13:18:14.003149 kernel: acpiphp: Slot [25] registered Dec 16 13:18:14.003161 kernel: acpiphp: Slot [26] registered Dec 16 13:18:14.003174 kernel: acpiphp: Slot [27] registered Dec 16 13:18:14.003186 kernel: acpiphp: Slot [28] registered Dec 16 13:18:14.003198 kernel: acpiphp: Slot [29] registered Dec 16 13:18:14.003215 kernel: acpiphp: Slot [30] registered Dec 16 13:18:14.003227 kernel: acpiphp: Slot [31] registered Dec 16 13:18:14.003240 kernel: PCI host bridge to bus 0000:00 Dec 16 13:18:14.003481 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 16 13:18:14.003616 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 16 13:18:14.003781 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 16 13:18:14.003907 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Dec 16 13:18:14.004058 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Dec 16 13:18:14.004185 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 16 13:18:14.006532 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Dec 16 13:18:14.006763 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Dec 16 13:18:14.006962 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Dec 16 13:18:14.007126 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc1e0-0xc1ef] Dec 16 13:18:14.008392 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Dec 16 13:18:14.008594 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Dec 16 13:18:14.008743 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Dec 16 13:18:14.008897 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Dec 16 13:18:14.009073 kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 Dec 16 13:18:14.009214 kernel: pci 0000:00:01.2: reg 0x20: [io 0xc180-0xc19f] Dec 16 13:18:14.009456 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Dec 16 13:18:14.009618 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Dec 16 13:18:14.009776 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Dec 16 13:18:14.009928 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Dec 16 13:18:14.010073 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Dec 16 13:18:14.010226 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Dec 16 13:18:14.018537 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfebf0000-0xfebf0fff] Dec 16 13:18:14.018732 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Dec 16 13:18:14.018902 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 16 13:18:14.019098 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Dec 16 13:18:14.019261 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc1a0-0xc1bf] Dec 16 13:18:14.021607 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebf1000-0xfebf1fff] Dec 16 13:18:14.021776 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Dec 16 13:18:14.021958 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Dec 16 13:18:14.022117 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc1c0-0xc1df] Dec 16 13:18:14.022257 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebf2000-0xfebf2fff] Dec 16 13:18:14.022471 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Dec 16 13:18:14.022655 kernel: pci 0000:00:05.0: [1af4:1004] type 00 class 0x010000 Dec 16 13:18:14.022811 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc100-0xc13f] Dec 16 13:18:14.022960 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xfebf3000-0xfebf3fff] Dec 16 13:18:14.023126 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Dec 16 13:18:14.023354 kernel: pci 0000:00:06.0: [1af4:1001] type 00 class 0x010000 Dec 16 13:18:14.023525 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc000-0xc07f] Dec 16 13:18:14.023666 kernel: pci 0000:00:06.0: reg 0x14: [mem 0xfebf4000-0xfebf4fff] Dec 16 13:18:14.023806 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Dec 16 13:18:14.023972 kernel: pci 0000:00:07.0: [1af4:1001] type 00 class 0x010000 Dec 16 13:18:14.024112 kernel: pci 0000:00:07.0: reg 0x10: [io 0xc080-0xc0ff] Dec 16 13:18:14.024253 kernel: pci 0000:00:07.0: reg 0x14: [mem 0xfebf5000-0xfebf5fff] Dec 16 13:18:14.026749 kernel: pci 0000:00:07.0: reg 0x20: [mem 0xfe814000-0xfe817fff 64bit pref] Dec 16 13:18:14.026979 kernel: pci 0000:00:08.0: [1af4:1002] type 00 class 0x00ff00 Dec 16 13:18:14.027131 kernel: pci 0000:00:08.0: reg 0x10: [io 0xc140-0xc17f] Dec 16 13:18:14.031370 kernel: pci 0000:00:08.0: reg 0x20: [mem 0xfe818000-0xfe81bfff 64bit pref] Dec 16 13:18:14.031430 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 16 13:18:14.031446 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 16 13:18:14.031461 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 16 13:18:14.031493 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 16 13:18:14.031521 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Dec 16 13:18:14.031537 kernel: iommu: Default domain type: Translated Dec 16 13:18:14.031552 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 16 13:18:14.031805 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Dec 16 13:18:14.031978 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 16 13:18:14.032140 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Dec 16 13:18:14.032162 kernel: vgaarb: loaded Dec 16 13:18:14.032176 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 16 13:18:14.032202 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 16 13:18:14.032214 kernel: PTP clock support registered Dec 16 13:18:14.032227 kernel: PCI: Using ACPI for IRQ routing Dec 16 13:18:14.032238 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 16 13:18:14.032252 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Dec 16 13:18:14.032267 kernel: e820: reserve RAM buffer [mem 0x7ffdb000-0x7fffffff] Dec 16 13:18:14.032280 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Dec 16 13:18:14.032292 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Dec 16 13:18:14.032325 kernel: clocksource: Switched to clocksource kvm-clock Dec 16 13:18:14.032344 kernel: VFS: Disk quotas dquot_6.6.0 Dec 16 13:18:14.032356 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 16 13:18:14.032371 kernel: pnp: PnP ACPI init Dec 16 13:18:14.032385 kernel: pnp: PnP ACPI: found 4 devices Dec 16 13:18:14.032398 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 16 13:18:14.032411 kernel: NET: Registered PF_INET protocol family Dec 16 13:18:14.032423 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 16 13:18:14.032437 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Dec 16 13:18:14.032455 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 16 13:18:14.032468 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 16 13:18:14.032482 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 16 13:18:14.032496 kernel: TCP: Hash tables configured (established 16384 bind 16384) Dec 16 13:18:14.032510 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 16 13:18:14.032523 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 16 13:18:14.032535 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 16 13:18:14.032548 kernel: NET: Registered PF_XDP protocol family Dec 16 13:18:14.032741 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 16 13:18:14.032890 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 16 13:18:14.033017 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 16 13:18:14.033143 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Dec 16 13:18:14.033290 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Dec 16 13:18:14.033447 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Dec 16 13:18:14.033606 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 16 13:18:14.033741 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Dec 16 13:18:14.033777 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Dec 16 13:18:14.033925 kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x730 took 661860 usecs Dec 16 13:18:14.033944 kernel: PCI: CLS 0 bytes, default 64 Dec 16 13:18:14.033957 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 16 13:18:14.033973 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x23f39a1d859, max_idle_ns: 440795326830 ns Dec 16 13:18:14.033989 kernel: Initialise system trusted keyrings Dec 16 13:18:14.034004 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Dec 16 13:18:14.034020 kernel: Key type asymmetric registered Dec 16 13:18:14.034035 kernel: Asymmetric key parser 'x509' registered Dec 16 13:18:14.034050 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 16 13:18:14.034072 kernel: io scheduler mq-deadline registered Dec 16 13:18:14.034087 kernel: io scheduler kyber registered Dec 16 13:18:14.034102 kernel: io scheduler bfq registered Dec 16 13:18:14.034117 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 16 13:18:14.034134 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Dec 16 13:18:14.034149 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Dec 16 13:18:14.034165 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Dec 16 13:18:14.034180 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 16 13:18:14.034196 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 16 13:18:14.034216 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 16 13:18:14.034232 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 16 13:18:14.034244 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 16 13:18:14.034483 kernel: rtc_cmos 00:03: RTC can wake from S4 Dec 16 13:18:14.034507 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 16 13:18:14.034640 kernel: rtc_cmos 00:03: registered as rtc0 Dec 16 13:18:14.034765 kernel: rtc_cmos 00:03: setting system clock to 2024-12-16T13:18:13 UTC (1734355093) Dec 16 13:18:14.034885 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Dec 16 13:18:14.034909 kernel: intel_pstate: CPU model not supported Dec 16 13:18:14.034922 kernel: NET: Registered PF_INET6 protocol family Dec 16 13:18:14.034935 kernel: Segment Routing with IPv6 Dec 16 13:18:14.034947 kernel: In-situ OAM (IOAM) with IPv6 Dec 16 13:18:14.034960 kernel: NET: Registered PF_PACKET protocol family Dec 16 13:18:14.034972 kernel: Key type dns_resolver registered Dec 16 13:18:14.034984 kernel: IPI shorthand broadcast: enabled Dec 16 13:18:14.034997 kernel: sched_clock: Marking stable (1329391060, 84949417)->(1546018102, -131677625) Dec 16 13:18:14.035010 kernel: registered taskstats version 1 Dec 16 13:18:14.035027 kernel: Loading compiled-in X.509 certificates Dec 16 13:18:14.035039 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 16 13:18:14.035051 kernel: Key type .fscrypt registered Dec 16 13:18:14.035063 kernel: Key type fscrypt-provisioning registered Dec 16 13:18:14.035076 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 16 13:18:14.035089 kernel: ima: Allocated hash algorithm: sha1 Dec 16 13:18:14.035102 kernel: ima: No architecture policies found Dec 16 13:18:14.035115 kernel: clk: Disabling unused clocks Dec 16 13:18:14.035132 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 16 13:18:14.035145 kernel: Write protecting the kernel read-only data: 28672k Dec 16 13:18:14.035157 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 16 13:18:14.035171 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 16 13:18:14.035183 kernel: Run /init as init process Dec 16 13:18:14.035196 kernel: with arguments: Dec 16 13:18:14.035236 kernel: /init Dec 16 13:18:14.035254 kernel: with environment: Dec 16 13:18:14.035267 kernel: HOME=/ Dec 16 13:18:14.038375 kernel: TERM=linux Dec 16 13:18:14.038411 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 16 13:18:14.038435 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 16 13:18:14.038456 systemd[1]: Detected virtualization kvm. Dec 16 13:18:14.038474 systemd[1]: Detected architecture x86-64. Dec 16 13:18:14.038491 systemd[1]: Running in initrd. Dec 16 13:18:14.038507 systemd[1]: No hostname configured, using default hostname. Dec 16 13:18:14.038524 systemd[1]: Hostname set to . Dec 16 13:18:14.038546 systemd[1]: Initializing machine ID from VM UUID. Dec 16 13:18:14.038564 systemd[1]: Queued start job for default target initrd.target. Dec 16 13:18:14.038580 systemd[1]: Started systemd-ask-password-console.path. Dec 16 13:18:14.038597 systemd[1]: Reached target cryptsetup.target. Dec 16 13:18:14.038614 systemd[1]: Reached target paths.target. Dec 16 13:18:14.038632 systemd[1]: Reached target slices.target. Dec 16 13:18:14.038648 systemd[1]: Reached target swap.target. Dec 16 13:18:14.038665 systemd[1]: Reached target timers.target. Dec 16 13:18:14.038687 systemd[1]: Listening on iscsid.socket. Dec 16 13:18:14.038705 systemd[1]: Listening on iscsiuio.socket. Dec 16 13:18:14.038722 systemd[1]: Listening on systemd-journald-audit.socket. Dec 16 13:18:14.038739 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 16 13:18:14.038757 systemd[1]: Listening on systemd-journald.socket. Dec 16 13:18:14.038774 systemd[1]: Listening on systemd-networkd.socket. Dec 16 13:18:14.038791 systemd[1]: Listening on systemd-udevd-control.socket. Dec 16 13:18:14.038809 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 16 13:18:14.038831 systemd[1]: Reached target sockets.target. Dec 16 13:18:14.038849 systemd[1]: Starting kmod-static-nodes.service... Dec 16 13:18:14.038869 systemd[1]: Finished network-cleanup.service. Dec 16 13:18:14.038893 systemd[1]: Starting systemd-fsck-usr.service... Dec 16 13:18:14.038910 systemd[1]: Starting systemd-journald.service... Dec 16 13:18:14.038931 systemd[1]: Starting systemd-modules-load.service... Dec 16 13:18:14.038949 systemd[1]: Starting systemd-resolved.service... Dec 16 13:18:14.038966 systemd[1]: Starting systemd-vconsole-setup.service... Dec 16 13:18:14.038984 systemd[1]: Finished kmod-static-nodes.service. Dec 16 13:18:14.039008 systemd-journald[186]: Journal started Dec 16 13:18:14.039121 systemd-journald[186]: Runtime Journal (/run/log/journal/1e5b280a973e40f68ccb6ee63613e8e4) is 4.9M, max 39.5M, 34.5M free. Dec 16 13:18:13.995735 systemd-modules-load[187]: Inserted module 'overlay' Dec 16 13:18:14.061881 kernel: audit: type=1130 audit(1734355094.056:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:14.061920 systemd[1]: Started systemd-journald.service. Dec 16 13:18:14.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:14.052802 systemd-resolved[188]: Positive Trust Anchors: Dec 16 13:18:14.052820 systemd-resolved[188]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 16 13:18:14.065923 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 16 13:18:14.052879 systemd-resolved[188]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 16 13:18:14.060917 systemd-resolved[188]: Defaulting to hostname 'linux'. Dec 16 13:18:14.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:14.070049 systemd[1]: Started systemd-resolved.service. Dec 16 13:18:14.082059 kernel: audit: type=1130 audit(1734355094.069:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:14.082100 kernel: Bridge firewalling registered Dec 16 13:18:14.082120 kernel: audit: type=1130 audit(1734355094.074:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:14.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:14.073876 systemd-modules-load[187]: Inserted module 'br_netfilter' Dec 16 13:18:14.089185 kernel: audit: type=1130 audit(1734355094.081:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:14.089229 kernel: audit: type=1130 audit(1734355094.082:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:14.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:14.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:14.075373 systemd[1]: Finished systemd-fsck-usr.service. Dec 16 13:18:14.081892 systemd[1]: Finished systemd-vconsole-setup.service. Dec 16 13:18:14.082709 systemd[1]: Reached target nss-lookup.target. Dec 16 13:18:14.090892 systemd[1]: Starting dracut-cmdline-ask.service... Dec 16 13:18:14.092889 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 16 13:18:14.107329 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 16 13:18:14.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:14.112327 kernel: audit: type=1130 audit(1734355094.107:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:14.119329 kernel: SCSI subsystem initialized Dec 16 13:18:14.123402 systemd[1]: Finished dracut-cmdline-ask.service. Dec 16 13:18:14.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:14.128342 kernel: audit: type=1130 audit(1734355094.124:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:14.128663 systemd[1]: Starting dracut-cmdline.service... Dec 16 13:18:14.141008 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 16 13:18:14.141095 kernel: device-mapper: uevent: version 1.0.3 Dec 16 13:18:14.142475 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 16 13:18:14.146874 systemd-modules-load[187]: Inserted module 'dm_multipath' Dec 16 13:18:14.148318 dracut-cmdline[203]: dracut-dracut-053 Dec 16 13:18:14.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:14.157021 systemd[1]: Finished systemd-modules-load.service. Dec 16 13:18:14.162766 kernel: audit: type=1130 audit(1734355094.157:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:14.162798 dracut-cmdline[203]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 16 13:18:14.158447 systemd[1]: Starting systemd-sysctl.service... Dec 16 13:18:14.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:14.172243 systemd[1]: Finished systemd-sysctl.service. Dec 16 13:18:14.175420 kernel: audit: type=1130 audit(1734355094.172:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:14.257312 kernel: Loading iSCSI transport class v2.0-870. Dec 16 13:18:14.283331 kernel: iscsi: registered transport (tcp) Dec 16 13:18:14.309634 kernel: iscsi: registered transport (qla4xxx) Dec 16 13:18:14.309720 kernel: QLogic iSCSI HBA Driver Dec 16 13:18:14.362373 systemd[1]: Finished dracut-cmdline.service. Dec 16 13:18:14.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:14.364460 systemd[1]: Starting dracut-pre-udev.service... Dec 16 13:18:14.430364 kernel: raid6: avx2x4 gen() 13574 MB/s Dec 16 13:18:14.447393 kernel: raid6: avx2x4 xor() 5311 MB/s Dec 16 13:18:14.464352 kernel: raid6: avx2x2 gen() 13735 MB/s Dec 16 13:18:14.481355 kernel: raid6: avx2x2 xor() 16967 MB/s Dec 16 13:18:14.498353 kernel: raid6: avx2x1 gen() 11390 MB/s Dec 16 13:18:14.515375 kernel: raid6: avx2x1 xor() 11726 MB/s Dec 16 13:18:14.532355 kernel: raid6: sse2x4 gen() 9263 MB/s Dec 16 13:18:14.549353 kernel: raid6: sse2x4 xor() 5638 MB/s Dec 16 13:18:14.566355 kernel: raid6: sse2x2 gen() 10415 MB/s Dec 16 13:18:14.583399 kernel: raid6: sse2x2 xor() 6523 MB/s Dec 16 13:18:14.600353 kernel: raid6: sse2x1 gen() 8020 MB/s Dec 16 13:18:14.618126 kernel: raid6: sse2x1 xor() 4924 MB/s Dec 16 13:18:14.618217 kernel: raid6: using algorithm avx2x2 gen() 13735 MB/s Dec 16 13:18:14.618238 kernel: raid6: .... xor() 16967 MB/s, rmw enabled Dec 16 13:18:14.618987 kernel: raid6: using avx2x2 recovery algorithm Dec 16 13:18:14.637328 kernel: xor: automatically using best checksumming function avx Dec 16 13:18:14.783353 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 16 13:18:14.797972 systemd[1]: Finished dracut-pre-udev.service. Dec 16 13:18:14.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:14.798000 audit: BPF prog-id=7 op=LOAD Dec 16 13:18:14.798000 audit: BPF prog-id=8 op=LOAD Dec 16 13:18:14.799968 systemd[1]: Starting systemd-udevd.service... Dec 16 13:18:14.822390 systemd-udevd[385]: Using default interface naming scheme 'v252'. Dec 16 13:18:14.831457 systemd[1]: Started systemd-udevd.service. Dec 16 13:18:14.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:14.833489 systemd[1]: Starting dracut-pre-trigger.service... Dec 16 13:18:14.856061 dracut-pre-trigger[387]: rd.md=0: removing MD RAID activation Dec 16 13:18:14.910936 systemd[1]: Finished dracut-pre-trigger.service. Dec 16 13:18:14.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:14.912864 systemd[1]: Starting systemd-udev-trigger.service... Dec 16 13:18:14.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:14.983589 systemd[1]: Finished systemd-udev-trigger.service. Dec 16 13:18:15.045701 kernel: virtio_blk virtio4: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Dec 16 13:18:15.107895 kernel: scsi host0: Virtio SCSI HBA Dec 16 13:18:15.108107 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 16 13:18:15.108131 kernel: GPT:9289727 != 125829119 Dec 16 13:18:15.108147 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 16 13:18:15.108158 kernel: GPT:9289727 != 125829119 Dec 16 13:18:15.108175 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 16 13:18:15.108191 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 16 13:18:15.108208 kernel: cryptd: max_cpu_qlen set to 1000 Dec 16 13:18:15.108229 kernel: AVX2 version of gcm_enc/dec engaged. Dec 16 13:18:15.108242 kernel: AES CTR mode by8 optimization enabled Dec 16 13:18:15.110324 kernel: virtio_blk virtio5: [vdb] 968 512-byte logical blocks (496 kB/484 KiB) Dec 16 13:18:15.165326 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (443) Dec 16 13:18:15.166575 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 16 13:18:15.261813 kernel: ACPI: bus type USB registered Dec 16 13:18:15.261849 kernel: usbcore: registered new interface driver usbfs Dec 16 13:18:15.261866 kernel: usbcore: registered new interface driver hub Dec 16 13:18:15.261882 kernel: usbcore: registered new device driver usb Dec 16 13:18:15.261899 kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver Dec 16 13:18:15.261916 kernel: ehci-pci: EHCI PCI platform driver Dec 16 13:18:15.261931 kernel: uhci_hcd: USB Universal Host Controller Interface driver Dec 16 13:18:15.261948 kernel: libata version 3.00 loaded. Dec 16 13:18:15.261966 kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Dec 16 13:18:15.262212 kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Dec 16 13:18:15.262393 kernel: uhci_hcd 0000:00:01.2: detected 2 ports Dec 16 13:18:15.262545 kernel: uhci_hcd 0000:00:01.2: irq 11, io base 0x0000c180 Dec 16 13:18:15.262701 kernel: hub 1-0:1.0: USB hub found Dec 16 13:18:15.262946 kernel: hub 1-0:1.0: 2 ports detected Dec 16 13:18:15.263161 kernel: ata_piix 0000:00:01.1: version 2.13 Dec 16 13:18:15.263376 kernel: scsi host1: ata_piix Dec 16 13:18:15.263597 kernel: scsi host2: ata_piix Dec 16 13:18:15.263834 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc1e0 irq 14 Dec 16 13:18:15.263860 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc1e8 irq 15 Dec 16 13:18:15.264227 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 16 13:18:15.264708 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 16 13:18:15.269144 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 16 13:18:15.274772 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 16 13:18:15.276342 systemd[1]: Starting disk-uuid.service... Dec 16 13:18:15.283026 disk-uuid[514]: Primary Header is updated. Dec 16 13:18:15.283026 disk-uuid[514]: Secondary Entries is updated. Dec 16 13:18:15.283026 disk-uuid[514]: Secondary Header is updated. Dec 16 13:18:15.296313 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 16 13:18:15.302308 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 16 13:18:16.306412 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 16 13:18:16.306938 disk-uuid[515]: The operation has completed successfully. Dec 16 13:18:16.357723 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 16 13:18:16.358500 systemd[1]: Finished disk-uuid.service. Dec 16 13:18:16.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:16.358000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:16.360416 systemd[1]: Starting verity-setup.service... Dec 16 13:18:16.388305 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 16 13:18:16.438975 systemd[1]: Found device dev-mapper-usr.device. Dec 16 13:18:16.440481 systemd[1]: Finished verity-setup.service. Dec 16 13:18:16.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:16.443095 systemd[1]: Mounting sysusr-usr.mount... Dec 16 13:18:16.548317 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 16 13:18:16.548699 systemd[1]: Mounted sysusr-usr.mount. Dec 16 13:18:16.550210 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 16 13:18:16.552143 systemd[1]: Starting ignition-setup.service... Dec 16 13:18:16.553859 systemd[1]: Starting parse-ip-for-networkd.service... Dec 16 13:18:16.566479 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 16 13:18:16.566571 kernel: BTRFS info (device vda6): using free space tree Dec 16 13:18:16.566592 kernel: BTRFS info (device vda6): has skinny extents Dec 16 13:18:16.585447 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 16 13:18:16.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:16.593587 systemd[1]: Finished ignition-setup.service. Dec 16 13:18:16.596100 systemd[1]: Starting ignition-fetch-offline.service... Dec 16 13:18:16.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:16.708000 audit: BPF prog-id=9 op=LOAD Dec 16 13:18:16.707105 systemd[1]: Finished parse-ip-for-networkd.service. Dec 16 13:18:16.710020 systemd[1]: Starting systemd-networkd.service... Dec 16 13:18:16.743753 ignition[615]: Ignition 2.14.0 Dec 16 13:18:16.743767 ignition[615]: Stage: fetch-offline Dec 16 13:18:16.743837 ignition[615]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 16 13:18:16.743878 ignition[615]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Dec 16 13:18:16.752104 ignition[615]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Dec 16 13:18:16.753263 ignition[615]: parsed url from cmdline: "" Dec 16 13:18:16.753417 ignition[615]: no config URL provided Dec 16 13:18:16.753994 ignition[615]: reading system config file "/usr/lib/ignition/user.ign" Dec 16 13:18:16.754760 ignition[615]: no config at "/usr/lib/ignition/user.ign" Dec 16 13:18:16.755367 ignition[615]: failed to fetch config: resource requires networking Dec 16 13:18:16.756247 ignition[615]: Ignition finished successfully Dec 16 13:18:16.760195 systemd[1]: Finished ignition-fetch-offline.service. Dec 16 13:18:16.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:16.763218 systemd-networkd[690]: lo: Link UP Dec 16 13:18:16.763235 systemd-networkd[690]: lo: Gained carrier Dec 16 13:18:16.764344 systemd-networkd[690]: Enumeration completed Dec 16 13:18:16.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:16.764498 systemd[1]: Started systemd-networkd.service. Dec 16 13:18:16.765231 systemd[1]: Reached target network.target. Dec 16 13:18:16.767209 systemd[1]: Starting ignition-fetch.service... Dec 16 13:18:16.769145 systemd[1]: Starting iscsiuio.service... Dec 16 13:18:16.778084 systemd-networkd[690]: eth1: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 16 13:18:16.779523 systemd-networkd[690]: eth0: Configuring with /usr/lib/systemd/network/yy-digitalocean.network. Dec 16 13:18:16.782110 systemd-networkd[690]: eth1: Link UP Dec 16 13:18:16.789563 ignition[692]: Ignition 2.14.0 Dec 16 13:18:16.782117 systemd-networkd[690]: eth1: Gained carrier Dec 16 13:18:16.789571 ignition[692]: Stage: fetch Dec 16 13:18:16.791271 systemd-networkd[690]: eth0: Link UP Dec 16 13:18:16.789732 ignition[692]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 16 13:18:16.791299 systemd-networkd[690]: eth0: Gained carrier Dec 16 13:18:16.789754 ignition[692]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Dec 16 13:18:16.792363 ignition[692]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Dec 16 13:18:16.792508 ignition[692]: parsed url from cmdline: "" Dec 16 13:18:16.792512 ignition[692]: no config URL provided Dec 16 13:18:16.792518 ignition[692]: reading system config file "/usr/lib/ignition/user.ign" Dec 16 13:18:16.792527 ignition[692]: no config at "/usr/lib/ignition/user.ign" Dec 16 13:18:16.792562 ignition[692]: GET http://169.254.169.254/metadata/v1/user-data: attempt #1 Dec 16 13:18:16.795557 ignition[692]: GET error: Get "http://169.254.169.254/metadata/v1/user-data": dial tcp 169.254.169.254:80: connect: network is unreachable Dec 16 13:18:16.799387 systemd[1]: Started iscsiuio.service. Dec 16 13:18:16.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:16.801695 systemd[1]: Starting iscsid.service... Dec 16 13:18:16.806318 iscsid[700]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 16 13:18:16.806318 iscsid[700]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 16 13:18:16.806318 iscsid[700]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 16 13:18:16.806318 iscsid[700]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 16 13:18:16.806318 iscsid[700]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 16 13:18:16.806318 iscsid[700]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 16 13:18:16.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:16.809399 systemd[1]: Started iscsid.service. Dec 16 13:18:16.811101 systemd[1]: Starting dracut-initqueue.service... Dec 16 13:18:16.812436 systemd-networkd[690]: eth0: DHCPv4 address 164.92.94.164/20, gateway 164.92.80.1 acquired from 169.254.169.253 Dec 16 13:18:16.817540 systemd-networkd[690]: eth1: DHCPv4 address 10.124.0.3/20, gateway 10.124.0.1 acquired from 169.254.169.253 Dec 16 13:18:16.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:16.829328 systemd[1]: Finished dracut-initqueue.service. Dec 16 13:18:16.830038 systemd[1]: Reached target remote-fs-pre.target. Dec 16 13:18:16.830507 systemd[1]: Reached target remote-cryptsetup.target. Dec 16 13:18:16.830944 systemd[1]: Reached target remote-fs.target. Dec 16 13:18:16.832688 systemd[1]: Starting dracut-pre-mount.service... Dec 16 13:18:16.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:16.847568 systemd[1]: Finished dracut-pre-mount.service. Dec 16 13:18:16.996573 ignition[692]: GET http://169.254.169.254/metadata/v1/user-data: attempt #2 Dec 16 13:18:17.010680 ignition[692]: GET result: OK Dec 16 13:18:17.010831 ignition[692]: parsing config with SHA512: c2c77f22b0b4f1ba035af583ef634102b51668135d4ee1e1b5161af85a16ddb55d777503d32c931618343c866eed138822c124ff29af31b443b1889feaaf1ca3 Dec 16 13:18:17.021263 unknown[692]: fetched base config from "system" Dec 16 13:18:17.021298 unknown[692]: fetched base config from "system" Dec 16 13:18:17.021308 unknown[692]: fetched user config from "digitalocean" Dec 16 13:18:17.021978 ignition[692]: fetch: fetch complete Dec 16 13:18:17.021989 ignition[692]: fetch: fetch passed Dec 16 13:18:17.022063 ignition[692]: Ignition finished successfully Dec 16 13:18:17.024841 systemd[1]: Finished ignition-fetch.service. Dec 16 13:18:17.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:17.026798 systemd[1]: Starting ignition-kargs.service... Dec 16 13:18:17.040964 ignition[715]: Ignition 2.14.0 Dec 16 13:18:17.041868 ignition[715]: Stage: kargs Dec 16 13:18:17.042504 ignition[715]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 16 13:18:17.043239 ignition[715]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Dec 16 13:18:17.046248 ignition[715]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Dec 16 13:18:17.048817 ignition[715]: kargs: kargs passed Dec 16 13:18:17.049594 ignition[715]: Ignition finished successfully Dec 16 13:18:17.051532 systemd[1]: Finished ignition-kargs.service. Dec 16 13:18:17.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:17.053387 systemd[1]: Starting ignition-disks.service... Dec 16 13:18:17.070213 ignition[721]: Ignition 2.14.0 Dec 16 13:18:17.071198 ignition[721]: Stage: disks Dec 16 13:18:17.071977 ignition[721]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 16 13:18:17.072732 ignition[721]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Dec 16 13:18:17.076427 ignition[721]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Dec 16 13:18:17.079871 ignition[721]: disks: disks passed Dec 16 13:18:17.080003 ignition[721]: Ignition finished successfully Dec 16 13:18:17.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:17.082448 systemd[1]: Finished ignition-disks.service. Dec 16 13:18:17.083136 systemd[1]: Reached target initrd-root-device.target. Dec 16 13:18:17.083642 systemd[1]: Reached target local-fs-pre.target. Dec 16 13:18:17.084461 systemd[1]: Reached target local-fs.target. Dec 16 13:18:17.085181 systemd[1]: Reached target sysinit.target. Dec 16 13:18:17.086012 systemd[1]: Reached target basic.target. Dec 16 13:18:17.087914 systemd[1]: Starting systemd-fsck-root.service... Dec 16 13:18:17.106357 systemd-fsck[729]: ROOT: clean, 621/553520 files, 56021/553472 blocks Dec 16 13:18:17.110254 systemd[1]: Finished systemd-fsck-root.service. Dec 16 13:18:17.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:17.115517 systemd[1]: Mounting sysroot.mount... Dec 16 13:18:17.128292 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 16 13:18:17.129113 systemd[1]: Mounted sysroot.mount. Dec 16 13:18:17.129794 systemd[1]: Reached target initrd-root-fs.target. Dec 16 13:18:17.132086 systemd[1]: Mounting sysroot-usr.mount... Dec 16 13:18:17.133865 systemd[1]: Starting flatcar-digitalocean-network.service... Dec 16 13:18:17.136499 systemd[1]: Starting flatcar-metadata-hostname.service... Dec 16 13:18:17.137086 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 16 13:18:17.137151 systemd[1]: Reached target ignition-diskful.target. Dec 16 13:18:17.141877 systemd[1]: Mounted sysroot-usr.mount. Dec 16 13:18:17.144190 systemd[1]: Starting initrd-setup-root.service... Dec 16 13:18:17.156704 initrd-setup-root[741]: cut: /sysroot/etc/passwd: No such file or directory Dec 16 13:18:17.179317 initrd-setup-root[749]: cut: /sysroot/etc/group: No such file or directory Dec 16 13:18:17.196411 initrd-setup-root[759]: cut: /sysroot/etc/shadow: No such file or directory Dec 16 13:18:17.209230 initrd-setup-root[769]: cut: /sysroot/etc/gshadow: No such file or directory Dec 16 13:18:17.267223 coreos-metadata[736]: Dec 16 13:18:17.267 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Dec 16 13:18:17.285461 coreos-metadata[736]: Dec 16 13:18:17.285 INFO Fetch successful Dec 16 13:18:17.293210 systemd[1]: Finished initrd-setup-root.service. Dec 16 13:18:17.297308 kernel: kauditd_printk_skb: 23 callbacks suppressed Dec 16 13:18:17.297383 kernel: audit: type=1130 audit(1734355097.293:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:17.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:17.294949 systemd[1]: Starting ignition-mount.service... Dec 16 13:18:17.302612 coreos-metadata[735]: Dec 16 13:18:17.302 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Dec 16 13:18:17.299848 systemd[1]: Starting sysroot-boot.service... Dec 16 13:18:17.306448 coreos-metadata[736]: Dec 16 13:18:17.294 INFO wrote hostname ci-3510.3.6-6-0e268b98cf to /sysroot/etc/hostname Dec 16 13:18:17.307798 systemd[1]: Finished flatcar-metadata-hostname.service. Dec 16 13:18:17.310867 kernel: audit: type=1130 audit(1734355097.307:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:17.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:17.310971 coreos-metadata[735]: Dec 16 13:18:17.310 INFO Fetch successful Dec 16 13:18:17.317625 systemd[1]: flatcar-digitalocean-network.service: Deactivated successfully. Dec 16 13:18:17.317732 systemd[1]: Finished flatcar-digitalocean-network.service. Dec 16 13:18:17.323488 kernel: audit: type=1130 audit(1734355097.318:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:17.323522 kernel: audit: type=1131 audit(1734355097.318:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:17.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:17.318000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:17.323653 bash[786]: umount: /sysroot/usr/share/oem: not mounted. Dec 16 13:18:17.331531 ignition[788]: INFO : Ignition 2.14.0 Dec 16 13:18:17.331531 ignition[788]: INFO : Stage: mount Dec 16 13:18:17.332811 ignition[788]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 16 13:18:17.332811 ignition[788]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Dec 16 13:18:17.341579 ignition[788]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Dec 16 13:18:17.341579 ignition[788]: INFO : mount: mount passed Dec 16 13:18:17.341579 ignition[788]: INFO : Ignition finished successfully Dec 16 13:18:17.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:17.343090 systemd[1]: Finished ignition-mount.service. Dec 16 13:18:17.346309 kernel: audit: type=1130 audit(1734355097.343:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:17.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:17.349880 systemd[1]: Finished sysroot-boot.service. Dec 16 13:18:17.353344 kernel: audit: type=1130 audit(1734355097.349:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:17.460344 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 16 13:18:17.469315 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (795) Dec 16 13:18:17.471683 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 16 13:18:17.471743 kernel: BTRFS info (device vda6): using free space tree Dec 16 13:18:17.471755 kernel: BTRFS info (device vda6): has skinny extents Dec 16 13:18:17.476673 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 16 13:18:17.478563 systemd[1]: Starting ignition-files.service... Dec 16 13:18:17.499073 ignition[815]: INFO : Ignition 2.14.0 Dec 16 13:18:17.499073 ignition[815]: INFO : Stage: files Dec 16 13:18:17.500670 ignition[815]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 16 13:18:17.500670 ignition[815]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Dec 16 13:18:17.502701 ignition[815]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Dec 16 13:18:17.504423 ignition[815]: DEBUG : files: compiled without relabeling support, skipping Dec 16 13:18:17.504932 ignition[815]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 16 13:18:17.504932 ignition[815]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 16 13:18:17.509106 ignition[815]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 16 13:18:17.509956 ignition[815]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 16 13:18:17.511681 unknown[815]: wrote ssh authorized keys file for user: core Dec 16 13:18:17.512290 ignition[815]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 16 13:18:17.513235 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 16 13:18:17.514167 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 16 13:18:17.552869 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 16 13:18:17.642389 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 16 13:18:17.643512 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 16 13:18:17.643512 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 16 13:18:17.643512 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 16 13:18:17.643512 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 16 13:18:17.643512 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 16 13:18:17.643512 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 16 13:18:17.643512 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 16 13:18:17.649267 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 16 13:18:17.649267 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 16 13:18:17.649267 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 16 13:18:17.649267 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 16 13:18:17.649267 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 16 13:18:17.649267 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 16 13:18:17.649267 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 Dec 16 13:18:18.113719 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Dec 16 13:18:18.405557 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 16 13:18:18.405557 ignition[815]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 16 13:18:18.405557 ignition[815]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 16 13:18:18.405557 ignition[815]: INFO : files: op(c): [started] processing unit "prepare-helm.service" Dec 16 13:18:18.408114 ignition[815]: INFO : files: op(c): op(d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 16 13:18:18.408114 ignition[815]: INFO : files: op(c): op(d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 16 13:18:18.408114 ignition[815]: INFO : files: op(c): [finished] processing unit "prepare-helm.service" Dec 16 13:18:18.408114 ignition[815]: INFO : files: op(e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 16 13:18:18.408114 ignition[815]: INFO : files: op(e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 16 13:18:18.408114 ignition[815]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" Dec 16 13:18:18.408114 ignition[815]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" Dec 16 13:18:18.416824 ignition[815]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 16 13:18:18.416824 ignition[815]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 16 13:18:18.416824 ignition[815]: INFO : files: files passed Dec 16 13:18:18.416824 ignition[815]: INFO : Ignition finished successfully Dec 16 13:18:18.420239 systemd[1]: Finished ignition-files.service. Dec 16 13:18:18.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.424320 kernel: audit: type=1130 audit(1734355098.420:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.425029 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 16 13:18:18.425471 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 16 13:18:18.426300 systemd[1]: Starting ignition-quench.service... Dec 16 13:18:18.438953 kernel: audit: type=1130 audit(1734355098.433:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.439026 kernel: audit: type=1131 audit(1734355098.433:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.432423 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 16 13:18:18.432538 systemd[1]: Finished ignition-quench.service. Dec 16 13:18:18.441948 initrd-setup-root-after-ignition[840]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 16 13:18:18.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.443769 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 16 13:18:18.448082 kernel: audit: type=1130 audit(1734355098.443:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.444358 systemd[1]: Reached target ignition-complete.target. Dec 16 13:18:18.448481 systemd[1]: Starting initrd-parse-etc.service... Dec 16 13:18:18.472818 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 16 13:18:18.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.472980 systemd[1]: Finished initrd-parse-etc.service. Dec 16 13:18:18.473789 systemd[1]: Reached target initrd-fs.target. Dec 16 13:18:18.474310 systemd[1]: Reached target initrd.target. Dec 16 13:18:18.475023 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 16 13:18:18.476529 systemd[1]: Starting dracut-pre-pivot.service... Dec 16 13:18:18.492919 systemd[1]: Finished dracut-pre-pivot.service. Dec 16 13:18:18.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.495906 systemd[1]: Starting initrd-cleanup.service... Dec 16 13:18:18.507432 systemd[1]: Stopped target nss-lookup.target. Dec 16 13:18:18.508358 systemd[1]: Stopped target remote-cryptsetup.target. Dec 16 13:18:18.509180 systemd[1]: Stopped target timers.target. Dec 16 13:18:18.509954 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 16 13:18:18.510496 systemd[1]: Stopped dracut-pre-pivot.service. Dec 16 13:18:18.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.517577 systemd[1]: Stopped target initrd.target. Dec 16 13:18:18.518539 systemd[1]: Stopped target basic.target. Dec 16 13:18:18.519419 systemd[1]: Stopped target ignition-complete.target. Dec 16 13:18:18.520295 systemd[1]: Stopped target ignition-diskful.target. Dec 16 13:18:18.521057 systemd[1]: Stopped target initrd-root-device.target. Dec 16 13:18:18.521918 systemd[1]: Stopped target remote-fs.target. Dec 16 13:18:18.522746 systemd[1]: Stopped target remote-fs-pre.target. Dec 16 13:18:18.523660 systemd[1]: Stopped target sysinit.target. Dec 16 13:18:18.524455 systemd[1]: Stopped target local-fs.target. Dec 16 13:18:18.525210 systemd[1]: Stopped target local-fs-pre.target. Dec 16 13:18:18.525964 systemd[1]: Stopped target swap.target. Dec 16 13:18:18.526688 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 16 13:18:18.527229 systemd[1]: Stopped dracut-pre-mount.service. Dec 16 13:18:18.527788 systemd-networkd[690]: eth0: Gained IPv6LL Dec 16 13:18:18.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.529303 systemd[1]: Stopped target cryptsetup.target. Dec 16 13:18:18.530078 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 16 13:18:18.530656 systemd[1]: Stopped dracut-initqueue.service. Dec 16 13:18:18.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.531638 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 16 13:18:18.532257 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 16 13:18:18.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.533203 systemd[1]: ignition-files.service: Deactivated successfully. Dec 16 13:18:18.533763 systemd[1]: Stopped ignition-files.service. Dec 16 13:18:18.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.534735 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Dec 16 13:18:18.535373 systemd[1]: Stopped flatcar-metadata-hostname.service. Dec 16 13:18:18.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.537439 systemd[1]: Stopping ignition-mount.service... Dec 16 13:18:18.538551 systemd[1]: Stopping iscsid.service... Dec 16 13:18:18.539240 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 16 13:18:18.539656 iscsid[700]: iscsid shutting down. Dec 16 13:18:18.543807 systemd[1]: Stopped kmod-static-nodes.service. Dec 16 13:18:18.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.546115 systemd[1]: Stopping sysroot-boot.service... Dec 16 13:18:18.546883 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 16 13:18:18.547582 systemd[1]: Stopped systemd-udev-trigger.service. Dec 16 13:18:18.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.554232 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 16 13:18:18.555017 ignition[853]: INFO : Ignition 2.14.0 Dec 16 13:18:18.555017 ignition[853]: INFO : Stage: umount Dec 16 13:18:18.555958 ignition[853]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 16 13:18:18.555958 ignition[853]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Dec 16 13:18:18.557293 systemd[1]: Stopped dracut-pre-trigger.service. Dec 16 13:18:18.557723 ignition[853]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Dec 16 13:18:18.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.558727 ignition[853]: INFO : umount: umount passed Dec 16 13:18:18.559702 ignition[853]: INFO : Ignition finished successfully Dec 16 13:18:18.561756 systemd[1]: iscsid.service: Deactivated successfully. Dec 16 13:18:18.562374 systemd[1]: Stopped iscsid.service. Dec 16 13:18:18.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.563871 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 16 13:18:18.564493 systemd[1]: Stopped ignition-mount.service. Dec 16 13:18:18.565000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.565766 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 16 13:18:18.566525 systemd[1]: Stopped ignition-disks.service. Dec 16 13:18:18.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.567884 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 16 13:18:18.568674 systemd[1]: Stopped ignition-kargs.service. Dec 16 13:18:18.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.569680 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 16 13:18:18.570230 systemd[1]: Stopped ignition-fetch.service. Dec 16 13:18:18.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.571176 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 16 13:18:18.571925 systemd[1]: Stopped ignition-fetch-offline.service. Dec 16 13:18:18.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.573029 systemd[1]: Stopped target paths.target. Dec 16 13:18:18.573787 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 16 13:18:18.574323 systemd[1]: Stopped systemd-ask-password-console.path. Dec 16 13:18:18.575039 systemd[1]: Stopped target slices.target. Dec 16 13:18:18.575803 systemd[1]: Stopped target sockets.target. Dec 16 13:18:18.576589 systemd[1]: iscsid.socket: Deactivated successfully. Dec 16 13:18:18.576641 systemd[1]: Closed iscsid.socket. Dec 16 13:18:18.577776 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 16 13:18:18.577835 systemd[1]: Stopped ignition-setup.service. Dec 16 13:18:18.578000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.579113 systemd[1]: Stopping iscsiuio.service... Dec 16 13:18:18.583057 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 16 13:18:18.583700 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 16 13:18:18.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.583803 systemd[1]: Stopped iscsiuio.service. Dec 16 13:18:18.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.584616 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 16 13:18:18.585000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.584708 systemd[1]: Finished initrd-cleanup.service. Dec 16 13:18:18.585330 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 16 13:18:18.585414 systemd[1]: Stopped sysroot-boot.service. Dec 16 13:18:18.586622 systemd[1]: Stopped target network.target. Dec 16 13:18:18.588000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.587080 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 16 13:18:18.587113 systemd[1]: Closed iscsiuio.socket. Dec 16 13:18:18.587791 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 16 13:18:18.587836 systemd[1]: Stopped initrd-setup-root.service. Dec 16 13:18:18.588941 systemd[1]: Stopping systemd-networkd.service... Dec 16 13:18:18.589377 systemd[1]: Stopping systemd-resolved.service... Dec 16 13:18:18.592349 systemd-networkd[690]: eth1: DHCPv6 lease lost Dec 16 13:18:18.594863 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 16 13:18:18.594977 systemd[1]: Stopped systemd-resolved.service. Dec 16 13:18:18.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.596340 systemd-networkd[690]: eth0: DHCPv6 lease lost Dec 16 13:18:18.597428 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 16 13:18:18.597540 systemd[1]: Stopped systemd-networkd.service. Dec 16 13:18:18.597000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.598000 audit: BPF prog-id=6 op=UNLOAD Dec 16 13:18:18.598644 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 16 13:18:18.599000 audit: BPF prog-id=9 op=UNLOAD Dec 16 13:18:18.598680 systemd[1]: Closed systemd-networkd.socket. Dec 16 13:18:18.600132 systemd[1]: Stopping network-cleanup.service... Dec 16 13:18:18.600513 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 16 13:18:18.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.600576 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 16 13:18:18.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.601366 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 16 13:18:18.601424 systemd[1]: Stopped systemd-sysctl.service. Dec 16 13:18:18.603744 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 16 13:18:18.603810 systemd[1]: Stopped systemd-modules-load.service. Dec 16 13:18:18.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.608405 systemd[1]: Stopping systemd-udevd.service... Dec 16 13:18:18.609957 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 16 13:18:18.613190 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 16 13:18:18.613372 systemd[1]: Stopped network-cleanup.service. Dec 16 13:18:18.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.617093 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 16 13:18:18.617244 systemd[1]: Stopped systemd-udevd.service. Dec 16 13:18:18.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.618299 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 16 13:18:18.618346 systemd[1]: Closed systemd-udevd-control.socket. Dec 16 13:18:18.619125 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 16 13:18:18.619161 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 16 13:18:18.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.619759 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 16 13:18:18.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.619811 systemd[1]: Stopped dracut-pre-udev.service. Dec 16 13:18:18.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.620614 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 16 13:18:18.620657 systemd[1]: Stopped dracut-cmdline.service. Dec 16 13:18:18.621173 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 16 13:18:18.621212 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 16 13:18:18.622661 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 16 13:18:18.623186 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 16 13:18:18.623265 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 16 13:18:18.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.639358 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 16 13:18:18.639508 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 16 13:18:18.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:18.641114 systemd[1]: Reached target initrd-switch-root.target. Dec 16 13:18:18.642618 systemd[1]: Starting initrd-switch-root.service... Dec 16 13:18:18.655462 systemd[1]: Switching root. Dec 16 13:18:18.676613 systemd-journald[186]: Journal stopped Dec 16 13:18:22.512133 systemd-journald[186]: Received SIGTERM from PID 1 (systemd). Dec 16 13:18:22.512242 kernel: SELinux: Class mctp_socket not defined in policy. Dec 16 13:18:22.512259 kernel: SELinux: Class anon_inode not defined in policy. Dec 16 13:18:22.512315 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 16 13:18:22.512329 kernel: SELinux: policy capability network_peer_controls=1 Dec 16 13:18:22.512341 kernel: SELinux: policy capability open_perms=1 Dec 16 13:18:22.512354 kernel: SELinux: policy capability extended_socket_class=1 Dec 16 13:18:22.512370 kernel: SELinux: policy capability always_check_network=0 Dec 16 13:18:22.512392 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 16 13:18:22.512415 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 16 13:18:22.512434 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 16 13:18:22.512453 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 16 13:18:22.512472 systemd[1]: Successfully loaded SELinux policy in 54.152ms. Dec 16 13:18:22.512505 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 14.604ms. Dec 16 13:18:22.512527 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 16 13:18:22.512547 systemd[1]: Detected virtualization kvm. Dec 16 13:18:22.512566 systemd[1]: Detected architecture x86-64. Dec 16 13:18:22.512590 systemd[1]: Detected first boot. Dec 16 13:18:22.512612 systemd[1]: Hostname set to . Dec 16 13:18:22.512635 systemd[1]: Initializing machine ID from VM UUID. Dec 16 13:18:22.512649 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 16 13:18:22.512665 systemd[1]: Populated /etc with preset unit settings. Dec 16 13:18:22.512685 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 16 13:18:22.512707 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 16 13:18:22.512740 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 16 13:18:22.512760 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 16 13:18:22.512779 systemd[1]: Stopped initrd-switch-root.service. Dec 16 13:18:22.512801 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 16 13:18:22.512820 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 16 13:18:22.512839 systemd[1]: Created slice system-addon\x2drun.slice. Dec 16 13:18:22.512860 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 16 13:18:22.512883 systemd[1]: Created slice system-getty.slice. Dec 16 13:18:22.512911 systemd[1]: Created slice system-modprobe.slice. Dec 16 13:18:22.512931 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 16 13:18:22.512947 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 16 13:18:22.512965 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 16 13:18:22.512982 systemd[1]: Created slice user.slice. Dec 16 13:18:22.513001 systemd[1]: Started systemd-ask-password-console.path. Dec 16 13:18:22.513020 systemd[1]: Started systemd-ask-password-wall.path. Dec 16 13:18:22.513041 systemd[1]: Set up automount boot.automount. Dec 16 13:18:22.513068 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 16 13:18:22.513097 systemd[1]: Stopped target initrd-switch-root.target. Dec 16 13:18:22.513118 systemd[1]: Stopped target initrd-fs.target. Dec 16 13:18:22.513132 systemd[1]: Stopped target initrd-root-fs.target. Dec 16 13:18:22.513144 systemd[1]: Reached target integritysetup.target. Dec 16 13:18:22.513161 systemd[1]: Reached target remote-cryptsetup.target. Dec 16 13:18:22.513179 systemd[1]: Reached target remote-fs.target. Dec 16 13:18:22.513193 systemd[1]: Reached target slices.target. Dec 16 13:18:22.513209 systemd[1]: Reached target swap.target. Dec 16 13:18:22.513222 systemd[1]: Reached target torcx.target. Dec 16 13:18:22.513237 systemd[1]: Reached target veritysetup.target. Dec 16 13:18:22.513250 systemd[1]: Listening on systemd-coredump.socket. Dec 16 13:18:22.513263 systemd[1]: Listening on systemd-initctl.socket. Dec 16 13:18:22.513290 systemd[1]: Listening on systemd-networkd.socket. Dec 16 13:18:22.513314 systemd[1]: Listening on systemd-udevd-control.socket. Dec 16 13:18:22.513328 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 16 13:18:22.513342 systemd[1]: Listening on systemd-userdbd.socket. Dec 16 13:18:22.513359 systemd[1]: Mounting dev-hugepages.mount... Dec 16 13:18:22.513372 systemd[1]: Mounting dev-mqueue.mount... Dec 16 13:18:22.513386 systemd[1]: Mounting media.mount... Dec 16 13:18:22.513399 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 16 13:18:22.513413 systemd[1]: Mounting sys-kernel-debug.mount... Dec 16 13:18:22.513426 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 16 13:18:22.513439 systemd[1]: Mounting tmp.mount... Dec 16 13:18:22.513452 systemd[1]: Starting flatcar-tmpfiles.service... Dec 16 13:18:22.513466 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 16 13:18:22.513482 systemd[1]: Starting kmod-static-nodes.service... Dec 16 13:18:22.513495 systemd[1]: Starting modprobe@configfs.service... Dec 16 13:18:22.513510 systemd[1]: Starting modprobe@dm_mod.service... Dec 16 13:18:22.513523 systemd[1]: Starting modprobe@drm.service... Dec 16 13:18:22.513537 systemd[1]: Starting modprobe@efi_pstore.service... Dec 16 13:18:22.513550 systemd[1]: Starting modprobe@fuse.service... Dec 16 13:18:22.513563 systemd[1]: Starting modprobe@loop.service... Dec 16 13:18:22.513578 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 16 13:18:22.513591 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 16 13:18:22.513608 systemd[1]: Stopped systemd-fsck-root.service. Dec 16 13:18:22.513624 kernel: kauditd_printk_skb: 71 callbacks suppressed Dec 16 13:18:22.513645 kernel: audit: type=1131 audit(1734355102.365:108): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:22.513664 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 16 13:18:22.513686 systemd[1]: Stopped systemd-fsck-usr.service. Dec 16 13:18:22.513708 kernel: audit: type=1131 audit(1734355102.373:109): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:22.513730 systemd[1]: Stopped systemd-journald.service. Dec 16 13:18:22.513754 kernel: audit: type=1130 audit(1734355102.378:110): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:22.513779 kernel: audit: type=1131 audit(1734355102.381:111): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:22.513800 systemd[1]: Starting systemd-journald.service... Dec 16 13:18:22.513822 kernel: audit: type=1334 audit(1734355102.387:112): prog-id=18 op=LOAD Dec 16 13:18:22.513842 kernel: fuse: init (API version 7.34) Dec 16 13:18:22.513863 kernel: audit: type=1334 audit(1734355102.387:113): prog-id=19 op=LOAD Dec 16 13:18:22.513883 kernel: audit: type=1334 audit(1734355102.387:114): prog-id=20 op=LOAD Dec 16 13:18:22.513902 kernel: audit: type=1334 audit(1734355102.387:115): prog-id=16 op=UNLOAD Dec 16 13:18:22.513916 kernel: audit: type=1334 audit(1734355102.387:116): prog-id=17 op=UNLOAD Dec 16 13:18:22.513934 systemd[1]: Starting systemd-modules-load.service... Dec 16 13:18:22.513958 systemd[1]: Starting systemd-network-generator.service... Dec 16 13:18:22.513974 systemd[1]: Starting systemd-remount-fs.service... Dec 16 13:18:22.513989 systemd[1]: Starting systemd-udev-trigger.service... Dec 16 13:18:22.514010 systemd[1]: verity-setup.service: Deactivated successfully. Dec 16 13:18:22.514026 systemd[1]: Stopped verity-setup.service. Dec 16 13:18:22.514039 kernel: audit: type=1131 audit(1734355102.437:117): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:22.514053 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 16 13:18:22.514067 kernel: loop: module loaded Dec 16 13:18:22.514085 systemd[1]: Mounted dev-hugepages.mount. Dec 16 13:18:22.514099 systemd[1]: Mounted dev-mqueue.mount. Dec 16 13:18:22.514115 systemd[1]: Mounted media.mount. Dec 16 13:18:22.514135 systemd[1]: Mounted sys-kernel-debug.mount. Dec 16 13:18:22.514152 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 16 13:18:22.514169 systemd[1]: Mounted tmp.mount. Dec 16 13:18:22.514185 systemd[1]: Finished kmod-static-nodes.service. Dec 16 13:18:22.514198 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 16 13:18:22.514214 systemd[1]: Finished modprobe@configfs.service. Dec 16 13:18:22.514234 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 16 13:18:22.514247 systemd[1]: Finished modprobe@dm_mod.service. Dec 16 13:18:22.514260 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 16 13:18:22.515244 systemd[1]: Finished modprobe@drm.service. Dec 16 13:18:22.515312 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 16 13:18:22.515360 systemd[1]: Finished modprobe@efi_pstore.service. Dec 16 13:18:22.515376 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 16 13:18:22.515390 systemd[1]: Finished modprobe@fuse.service. Dec 16 13:18:22.515404 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 16 13:18:22.515418 systemd[1]: Finished modprobe@loop.service. Dec 16 13:18:22.515436 systemd[1]: Finished systemd-modules-load.service. Dec 16 13:18:22.515459 systemd[1]: Finished systemd-network-generator.service. Dec 16 13:18:22.515475 systemd[1]: Finished systemd-remount-fs.service. Dec 16 13:18:22.515489 systemd[1]: Reached target network-pre.target. Dec 16 13:18:22.515503 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 16 13:18:22.515523 systemd-journald[959]: Journal started Dec 16 13:18:22.515602 systemd-journald[959]: Runtime Journal (/run/log/journal/1e5b280a973e40f68ccb6ee63613e8e4) is 4.9M, max 39.5M, 34.5M free. Dec 16 13:18:18.837000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 16 13:18:18.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 16 13:18:18.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 16 13:18:18.901000 audit: BPF prog-id=10 op=LOAD Dec 16 13:18:18.901000 audit: BPF prog-id=10 op=UNLOAD Dec 16 13:18:18.901000 audit: BPF prog-id=11 op=LOAD Dec 16 13:18:18.901000 audit: BPF prog-id=11 op=UNLOAD Dec 16 13:18:19.026000 audit[885]: AVC avc: denied { associate } for pid=885 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 16 13:18:19.026000 audit[885]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001878d2 a1=c00002ae58 a2=c000029100 a3=32 items=0 ppid=868 pid=885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:19.026000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 16 13:18:19.028000 audit[885]: AVC avc: denied { associate } for pid=885 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 16 13:18:19.028000 audit[885]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001879a9 a2=1ed a3=0 items=2 ppid=868 pid=885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:19.028000 audit: CWD cwd="/" Dec 16 13:18:19.028000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:19.028000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:19.028000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 16 13:18:22.240000 audit: BPF prog-id=12 op=LOAD Dec 16 13:18:22.240000 audit: BPF prog-id=3 op=UNLOAD Dec 16 13:18:22.240000 audit: BPF prog-id=13 op=LOAD Dec 16 13:18:22.240000 audit: BPF prog-id=14 op=LOAD Dec 16 13:18:22.240000 audit: BPF prog-id=4 op=UNLOAD Dec 16 13:18:22.240000 audit: BPF prog-id=5 op=UNLOAD Dec 16 13:18:22.240000 audit: BPF prog-id=15 op=LOAD Dec 16 13:18:22.241000 audit: BPF prog-id=12 op=UNLOAD Dec 16 13:18:22.241000 audit: BPF prog-id=16 op=LOAD Dec 16 13:18:22.241000 audit: BPF prog-id=17 op=LOAD Dec 16 13:18:22.241000 audit: BPF prog-id=13 op=UNLOAD Dec 16 13:18:22.241000 audit: BPF prog-id=14 op=UNLOAD Dec 16 13:18:22.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:22.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:22.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:22.252000 audit: BPF prog-id=15 op=UNLOAD Dec 16 13:18:22.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:22.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:22.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:22.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:22.387000 audit: BPF prog-id=18 op=LOAD Dec 16 13:18:22.387000 audit: BPF prog-id=19 op=LOAD Dec 16 13:18:22.387000 audit: BPF prog-id=20 op=LOAD Dec 16 13:18:22.387000 audit: BPF prog-id=16 op=UNLOAD Dec 16 13:18:22.387000 audit: BPF prog-id=17 op=UNLOAD Dec 16 13:18:22.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:22.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:22.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:22.472000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:22.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:22.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:22.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:22.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:22.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:22.488000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:22.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:22.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:22.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:22.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:22.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:22.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:22.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:22.508000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 16 13:18:22.508000 audit[959]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7fffa6a53710 a2=4000 a3=7fffa6a537ac items=0 ppid=1 pid=959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:22.508000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 16 13:18:22.237969 systemd[1]: Queued start job for default target multi-user.target. Dec 16 13:18:19.025066 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-12-16T13:18:19Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 16 13:18:22.518345 systemd[1]: Mounting sys-kernel-config.mount... Dec 16 13:18:22.237983 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 16 13:18:19.025540 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-12-16T13:18:19Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 16 13:18:22.241997 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 16 13:18:19.025562 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-12-16T13:18:19Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 16 13:18:19.025597 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-12-16T13:18:19Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 16 13:18:19.025608 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-12-16T13:18:19Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 16 13:18:19.025646 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-12-16T13:18:19Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 16 13:18:19.025659 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-12-16T13:18:19Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 16 13:18:19.025882 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-12-16T13:18:19Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 16 13:18:19.025922 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-12-16T13:18:19Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 16 13:18:19.025936 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-12-16T13:18:19Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 16 13:18:19.026526 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-12-16T13:18:19Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 16 13:18:19.026564 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-12-16T13:18:19Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 16 13:18:19.026586 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-12-16T13:18:19Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 16 13:18:19.026601 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-12-16T13:18:19Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 16 13:18:19.026620 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-12-16T13:18:19Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 16 13:18:19.026634 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-12-16T13:18:19Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 16 13:18:22.523336 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 16 13:18:21.787132 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-12-16T13:18:21Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 16 13:18:21.787626 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-12-16T13:18:21Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 16 13:18:21.787835 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-12-16T13:18:21Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 16 13:18:21.788138 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-12-16T13:18:21Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 16 13:18:21.788225 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-12-16T13:18:21Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 16 13:18:21.788354 /usr/lib/systemd/system-generators/torcx-generator[885]: time="2024-12-16T13:18:21Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 16 13:18:22.532958 systemd[1]: Starting systemd-hwdb-update.service... Dec 16 13:18:22.533073 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 16 13:18:22.533103 systemd[1]: Starting systemd-random-seed.service... Dec 16 13:18:22.537674 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 16 13:18:22.537764 systemd[1]: Starting systemd-sysctl.service... Dec 16 13:18:22.540312 systemd[1]: Started systemd-journald.service. Dec 16 13:18:22.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:22.544371 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 16 13:18:22.545525 systemd[1]: Mounted sys-kernel-config.mount. Dec 16 13:18:22.548341 systemd[1]: Starting systemd-journal-flush.service... Dec 16 13:18:22.569401 systemd[1]: Finished systemd-sysctl.service. Dec 16 13:18:22.569676 systemd-journald[959]: Time spent on flushing to /var/log/journal/1e5b280a973e40f68ccb6ee63613e8e4 is 62.733ms for 1159 entries. Dec 16 13:18:22.569676 systemd-journald[959]: System Journal (/var/log/journal/1e5b280a973e40f68ccb6ee63613e8e4) is 8.0M, max 195.6M, 187.6M free. Dec 16 13:18:22.645205 systemd-journald[959]: Received client request to flush runtime journal. Dec 16 13:18:22.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:22.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:22.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:22.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:22.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:22.580665 systemd[1]: Finished systemd-random-seed.service. Dec 16 13:18:22.581442 systemd[1]: Reached target first-boot-complete.target. Dec 16 13:18:22.594890 systemd[1]: Finished flatcar-tmpfiles.service. Dec 16 13:18:22.597955 systemd[1]: Starting systemd-sysusers.service... Dec 16 13:18:22.632580 systemd[1]: Finished systemd-sysusers.service. Dec 16 13:18:22.635307 systemd[1]: Finished systemd-udev-trigger.service. Dec 16 13:18:22.637661 systemd[1]: Starting systemd-udev-settle.service... Dec 16 13:18:22.648135 systemd[1]: Finished systemd-journal-flush.service. Dec 16 13:18:22.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:22.656323 udevadm[996]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 16 13:18:23.253842 systemd[1]: Finished systemd-hwdb-update.service. Dec 16 13:18:23.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:23.255000 audit: BPF prog-id=21 op=LOAD Dec 16 13:18:23.255000 audit: BPF prog-id=22 op=LOAD Dec 16 13:18:23.255000 audit: BPF prog-id=7 op=UNLOAD Dec 16 13:18:23.255000 audit: BPF prog-id=8 op=UNLOAD Dec 16 13:18:23.256727 systemd[1]: Starting systemd-udevd.service... Dec 16 13:18:23.280595 systemd-udevd[998]: Using default interface naming scheme 'v252'. Dec 16 13:18:23.309312 systemd[1]: Started systemd-udevd.service. Dec 16 13:18:23.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:23.310000 audit: BPF prog-id=23 op=LOAD Dec 16 13:18:23.313807 systemd[1]: Starting systemd-networkd.service... Dec 16 13:18:23.321000 audit: BPF prog-id=24 op=LOAD Dec 16 13:18:23.322000 audit: BPF prog-id=25 op=LOAD Dec 16 13:18:23.322000 audit: BPF prog-id=26 op=LOAD Dec 16 13:18:23.323433 systemd[1]: Starting systemd-userdbd.service... Dec 16 13:18:23.369180 systemd[1]: Started systemd-userdbd.service. Dec 16 13:18:23.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:23.403129 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 16 13:18:23.408362 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 16 13:18:23.408734 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 16 13:18:23.411058 systemd[1]: Starting modprobe@dm_mod.service... Dec 16 13:18:23.415557 systemd[1]: Starting modprobe@efi_pstore.service... Dec 16 13:18:23.420650 systemd[1]: Starting modprobe@loop.service... Dec 16 13:18:23.421243 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 16 13:18:23.421373 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 16 13:18:23.421540 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 16 13:18:23.422271 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 16 13:18:23.422515 systemd[1]: Finished modprobe@efi_pstore.service. Dec 16 13:18:23.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:23.422000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:23.430616 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 16 13:18:23.430831 systemd[1]: Finished modprobe@dm_mod.service. Dec 16 13:18:23.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:23.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:23.433032 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 16 13:18:23.442888 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 16 13:18:23.443029 systemd[1]: Finished modprobe@loop.service. Dec 16 13:18:23.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:23.443000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:23.443673 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 16 13:18:23.508939 systemd-networkd[1003]: lo: Link UP Dec 16 13:18:23.508951 systemd-networkd[1003]: lo: Gained carrier Dec 16 13:18:23.509491 systemd-networkd[1003]: Enumeration completed Dec 16 13:18:23.509633 systemd[1]: Started systemd-networkd.service. Dec 16 13:18:23.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:23.510391 systemd-networkd[1003]: eth1: Configuring with /run/systemd/network/10-b6:a5:6b:4c:fb:69.network. Dec 16 13:18:23.512090 systemd-networkd[1003]: eth0: Configuring with /run/systemd/network/10-8e:8a:75:80:30:99.network. Dec 16 13:18:23.512290 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Dec 16 13:18:23.512877 systemd-networkd[1003]: eth1: Link UP Dec 16 13:18:23.512886 systemd-networkd[1003]: eth1: Gained carrier Dec 16 13:18:23.516794 systemd-networkd[1003]: eth0: Link UP Dec 16 13:18:23.516809 systemd-networkd[1003]: eth0: Gained carrier Dec 16 13:18:23.527311 kernel: ACPI: button: Power Button [PWRF] Dec 16 13:18:23.528141 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 16 13:18:23.545000 audit[1014]: AVC avc: denied { confidentiality } for pid=1014 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 16 13:18:23.545000 audit[1014]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55f365862670 a1=337fc a2=7f429c85bbc5 a3=5 items=110 ppid=998 pid=1014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:23.545000 audit: CWD cwd="/" Dec 16 13:18:23.545000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=1 name=(null) inode=14488 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=2 name=(null) inode=14488 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=3 name=(null) inode=14489 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=4 name=(null) inode=14488 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=5 name=(null) inode=14490 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=6 name=(null) inode=14488 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=7 name=(null) inode=14491 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=8 name=(null) inode=14491 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=9 name=(null) inode=14492 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=10 name=(null) inode=14491 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=11 name=(null) inode=14493 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=12 name=(null) inode=14491 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=13 name=(null) inode=14494 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=14 name=(null) inode=14491 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=15 name=(null) inode=14495 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=16 name=(null) inode=14491 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=17 name=(null) inode=14496 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=18 name=(null) inode=14488 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=19 name=(null) inode=14497 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=20 name=(null) inode=14497 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=21 name=(null) inode=14498 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=22 name=(null) inode=14497 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=23 name=(null) inode=14499 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=24 name=(null) inode=14497 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=25 name=(null) inode=14500 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=26 name=(null) inode=14497 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=27 name=(null) inode=14501 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=28 name=(null) inode=14497 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=29 name=(null) inode=14502 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=30 name=(null) inode=14488 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=31 name=(null) inode=14503 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=32 name=(null) inode=14503 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=33 name=(null) inode=14504 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=34 name=(null) inode=14503 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=35 name=(null) inode=14505 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=36 name=(null) inode=14503 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=37 name=(null) inode=14506 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=38 name=(null) inode=14503 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=39 name=(null) inode=14507 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=40 name=(null) inode=14503 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=41 name=(null) inode=14508 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=42 name=(null) inode=14488 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=43 name=(null) inode=14509 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=44 name=(null) inode=14509 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=45 name=(null) inode=14510 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=46 name=(null) inode=14509 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=47 name=(null) inode=14511 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=48 name=(null) inode=14509 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=49 name=(null) inode=14512 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=50 name=(null) inode=14509 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=51 name=(null) inode=14513 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=52 name=(null) inode=14509 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=53 name=(null) inode=14514 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=55 name=(null) inode=14515 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=56 name=(null) inode=14515 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=57 name=(null) inode=14516 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=58 name=(null) inode=14515 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=59 name=(null) inode=14517 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=60 name=(null) inode=14515 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=61 name=(null) inode=14518 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=62 name=(null) inode=14518 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=63 name=(null) inode=14519 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=64 name=(null) inode=14518 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=65 name=(null) inode=14520 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=66 name=(null) inode=14518 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=67 name=(null) inode=14521 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=68 name=(null) inode=14518 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=69 name=(null) inode=14522 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=70 name=(null) inode=14518 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=71 name=(null) inode=14523 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=72 name=(null) inode=14515 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=73 name=(null) inode=14524 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=74 name=(null) inode=14524 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=75 name=(null) inode=14525 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=76 name=(null) inode=14524 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=77 name=(null) inode=14526 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=78 name=(null) inode=14524 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=79 name=(null) inode=14527 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=80 name=(null) inode=14524 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=81 name=(null) inode=14528 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=82 name=(null) inode=14524 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=83 name=(null) inode=14529 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=84 name=(null) inode=14515 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=85 name=(null) inode=14530 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=86 name=(null) inode=14530 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=87 name=(null) inode=14531 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=88 name=(null) inode=14530 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=89 name=(null) inode=14532 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=90 name=(null) inode=14530 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=91 name=(null) inode=14533 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=92 name=(null) inode=14530 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=93 name=(null) inode=14534 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=94 name=(null) inode=14530 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=95 name=(null) inode=14535 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=96 name=(null) inode=14515 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=97 name=(null) inode=14536 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=98 name=(null) inode=14536 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=99 name=(null) inode=14537 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=100 name=(null) inode=14536 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=101 name=(null) inode=14538 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=102 name=(null) inode=14536 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=103 name=(null) inode=14539 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=104 name=(null) inode=14536 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=105 name=(null) inode=14540 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=106 name=(null) inode=14536 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=107 name=(null) inode=14541 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PATH item=109 name=(null) inode=14542 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:18:23.545000 audit: PROCTITLE proctitle="(udev-worker)" Dec 16 13:18:23.584363 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Dec 16 13:18:23.610305 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Dec 16 13:18:23.614327 kernel: mousedev: PS/2 mouse device common for all mice Dec 16 13:18:23.762307 kernel: EDAC MC: Ver: 3.0.0 Dec 16 13:18:23.790030 systemd[1]: Finished systemd-udev-settle.service. Dec 16 13:18:23.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:23.792653 systemd[1]: Starting lvm2-activation-early.service... Dec 16 13:18:23.815217 lvm[1036]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 16 13:18:23.852223 systemd[1]: Finished lvm2-activation-early.service. Dec 16 13:18:23.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:23.852998 systemd[1]: Reached target cryptsetup.target. Dec 16 13:18:23.855597 systemd[1]: Starting lvm2-activation.service... Dec 16 13:18:23.862909 lvm[1037]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 16 13:18:23.891030 systemd[1]: Finished lvm2-activation.service. Dec 16 13:18:23.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:23.891790 systemd[1]: Reached target local-fs-pre.target. Dec 16 13:18:23.894533 systemd[1]: Mounting media-configdrive.mount... Dec 16 13:18:23.895093 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 16 13:18:23.895158 systemd[1]: Reached target machines.target. Dec 16 13:18:23.897660 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 16 13:18:23.911312 kernel: ISO 9660 Extensions: RRIP_1991A Dec 16 13:18:23.912935 systemd[1]: Mounted media-configdrive.mount. Dec 16 13:18:23.913648 systemd[1]: Reached target local-fs.target. Dec 16 13:18:23.916209 systemd[1]: Starting ldconfig.service... Dec 16 13:18:23.918238 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 16 13:18:23.918377 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 16 13:18:23.923300 systemd[1]: Starting systemd-boot-update.service... Dec 16 13:18:23.926800 systemd[1]: Starting systemd-machine-id-commit.service... Dec 16 13:18:23.932921 systemd[1]: Starting systemd-sysext.service... Dec 16 13:18:23.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:23.934600 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 16 13:18:23.940869 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1043 (bootctl) Dec 16 13:18:23.943123 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 16 13:18:23.961578 systemd[1]: Unmounting usr-share-oem.mount... Dec 16 13:18:23.981050 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 16 13:18:23.981383 systemd[1]: Unmounted usr-share-oem.mount. Dec 16 13:18:24.018114 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 16 13:18:24.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:24.020877 systemd[1]: Finished systemd-machine-id-commit.service. Dec 16 13:18:24.025486 kernel: loop0: detected capacity change from 0 to 205544 Dec 16 13:18:24.066321 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 16 13:18:24.085326 kernel: loop1: detected capacity change from 0 to 205544 Dec 16 13:18:24.086334 systemd-fsck[1050]: fsck.fat 4.2 (2021-01-31) Dec 16 13:18:24.086334 systemd-fsck[1050]: /dev/vda1: 789 files, 119291/258078 clusters Dec 16 13:18:24.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:24.096237 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 16 13:18:24.099212 systemd[1]: Mounting boot.mount... Dec 16 13:18:24.106148 (sd-sysext)[1053]: Using extensions 'kubernetes'. Dec 16 13:18:24.109233 (sd-sysext)[1053]: Merged extensions into '/usr'. Dec 16 13:18:24.128270 systemd[1]: Mounted boot.mount. Dec 16 13:18:24.136835 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 16 13:18:24.142291 systemd[1]: Mounting usr-share-oem.mount... Dec 16 13:18:24.143052 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 16 13:18:24.145012 systemd[1]: Starting modprobe@dm_mod.service... Dec 16 13:18:24.148069 systemd[1]: Starting modprobe@efi_pstore.service... Dec 16 13:18:24.152327 systemd[1]: Starting modprobe@loop.service... Dec 16 13:18:24.152826 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 16 13:18:24.152976 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 16 13:18:24.153131 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 16 13:18:24.154405 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 16 13:18:24.154679 systemd[1]: Finished modprobe@dm_mod.service. Dec 16 13:18:24.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:24.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:24.161884 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 16 13:18:24.162110 systemd[1]: Finished modprobe@loop.service. Dec 16 13:18:24.163121 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 16 13:18:24.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:24.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:24.164796 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 16 13:18:24.165007 systemd[1]: Finished modprobe@efi_pstore.service. Dec 16 13:18:24.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:24.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:24.166148 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 16 13:18:24.170077 systemd[1]: Mounted usr-share-oem.mount. Dec 16 13:18:24.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:24.175654 systemd[1]: Finished systemd-boot-update.service. Dec 16 13:18:24.177318 systemd[1]: Finished systemd-sysext.service. Dec 16 13:18:24.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:24.181224 systemd[1]: Starting ensure-sysext.service... Dec 16 13:18:24.183796 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 16 13:18:24.196332 systemd[1]: Reloading. Dec 16 13:18:24.227587 systemd-tmpfiles[1061]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 16 13:18:24.238239 systemd-tmpfiles[1061]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 16 13:18:24.252134 systemd-tmpfiles[1061]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 16 13:18:24.391435 /usr/lib/systemd/system-generators/torcx-generator[1083]: time="2024-12-16T13:18:24Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 16 13:18:24.391473 /usr/lib/systemd/system-generators/torcx-generator[1083]: time="2024-12-16T13:18:24Z" level=info msg="torcx already run" Dec 16 13:18:24.417172 ldconfig[1042]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 16 13:18:24.510660 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 16 13:18:24.510924 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 16 13:18:24.545049 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 16 13:18:24.645000 audit: BPF prog-id=27 op=LOAD Dec 16 13:18:24.646000 audit: BPF prog-id=28 op=LOAD Dec 16 13:18:24.646000 audit: BPF prog-id=21 op=UNLOAD Dec 16 13:18:24.646000 audit: BPF prog-id=22 op=UNLOAD Dec 16 13:18:24.648000 audit: BPF prog-id=29 op=LOAD Dec 16 13:18:24.648000 audit: BPF prog-id=18 op=UNLOAD Dec 16 13:18:24.648000 audit: BPF prog-id=30 op=LOAD Dec 16 13:18:24.648000 audit: BPF prog-id=31 op=LOAD Dec 16 13:18:24.648000 audit: BPF prog-id=19 op=UNLOAD Dec 16 13:18:24.648000 audit: BPF prog-id=20 op=UNLOAD Dec 16 13:18:24.650000 audit: BPF prog-id=32 op=LOAD Dec 16 13:18:24.650000 audit: BPF prog-id=23 op=UNLOAD Dec 16 13:18:24.652000 audit: BPF prog-id=33 op=LOAD Dec 16 13:18:24.652000 audit: BPF prog-id=24 op=UNLOAD Dec 16 13:18:24.652000 audit: BPF prog-id=34 op=LOAD Dec 16 13:18:24.653000 audit: BPF prog-id=35 op=LOAD Dec 16 13:18:24.653000 audit: BPF prog-id=25 op=UNLOAD Dec 16 13:18:24.653000 audit: BPF prog-id=26 op=UNLOAD Dec 16 13:18:24.664110 systemd[1]: Finished ldconfig.service. Dec 16 13:18:24.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:24.667134 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 16 13:18:24.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:24.672723 systemd[1]: Starting audit-rules.service... Dec 16 13:18:24.675493 systemd[1]: Starting clean-ca-certificates.service... Dec 16 13:18:24.679668 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 16 13:18:24.682000 audit: BPF prog-id=36 op=LOAD Dec 16 13:18:24.688000 audit: BPF prog-id=37 op=LOAD Dec 16 13:18:24.684453 systemd[1]: Starting systemd-resolved.service... Dec 16 13:18:24.690457 systemd[1]: Starting systemd-timesyncd.service... Dec 16 13:18:24.693734 systemd[1]: Starting systemd-update-utmp.service... Dec 16 13:18:24.696646 systemd[1]: Finished clean-ca-certificates.service. Dec 16 13:18:24.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:24.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:24.724000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:24.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:24.728000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:24.706864 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 16 13:18:24.710653 systemd[1]: Starting modprobe@dm_mod.service... Dec 16 13:18:24.714371 systemd[1]: Starting modprobe@efi_pstore.service... Dec 16 13:18:24.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:24.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:24.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:24.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:24.719170 systemd[1]: Starting modprobe@loop.service... Dec 16 13:18:24.719837 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 16 13:18:24.720248 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 16 13:18:24.721299 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 16 13:18:24.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:24.723151 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 16 13:18:24.724373 systemd[1]: Finished modprobe@dm_mod.service. Dec 16 13:18:24.727580 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 16 13:18:24.727776 systemd[1]: Finished modprobe@efi_pstore.service. Dec 16 13:18:24.728846 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 16 13:18:24.734034 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 16 13:18:24.736665 systemd[1]: Starting modprobe@dm_mod.service... Dec 16 13:18:24.741939 systemd[1]: Starting modprobe@efi_pstore.service... Dec 16 13:18:24.743238 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 16 13:18:24.743519 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 16 13:18:24.743683 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 16 13:18:24.745679 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 16 13:18:24.746544 systemd[1]: Finished modprobe@dm_mod.service. Dec 16 13:18:24.747783 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 16 13:18:24.747961 systemd[1]: Finished modprobe@efi_pstore.service. Dec 16 13:18:24.750217 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 16 13:18:24.757930 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 16 13:18:24.759044 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 16 13:18:24.759217 systemd[1]: Finished modprobe@loop.service. Dec 16 13:18:24.773000 audit[1134]: SYSTEM_BOOT pid=1134 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 16 13:18:24.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:24.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:24.778979 systemd[1]: Finished ensure-sysext.service. Dec 16 13:18:24.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:24.782051 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 16 13:18:24.787708 systemd[1]: Starting modprobe@dm_mod.service... Dec 16 13:18:24.791178 systemd[1]: Starting modprobe@drm.service... Dec 16 13:18:24.807000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 16 13:18:24.807000 audit[1154]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe3f62f020 a2=420 a3=0 items=0 ppid=1128 pid=1154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:24.807000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 16 13:18:24.820791 augenrules[1154]: No rules Dec 16 13:18:24.796141 systemd[1]: Starting modprobe@efi_pstore.service... Dec 16 13:18:24.796947 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 16 13:18:24.797048 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 16 13:18:24.801108 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 16 13:18:24.804968 systemd[1]: Starting systemd-update-done.service... Dec 16 13:18:24.806486 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 16 13:18:24.807401 systemd[1]: Finished systemd-update-utmp.service. Dec 16 13:18:24.810942 systemd[1]: Finished audit-rules.service. Dec 16 13:18:24.811847 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 16 13:18:24.812055 systemd[1]: Finished modprobe@dm_mod.service. Dec 16 13:18:24.816019 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 16 13:18:24.818430 systemd[1]: Finished systemd-update-done.service. Dec 16 13:18:24.822344 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 16 13:18:24.822554 systemd[1]: Finished modprobe@drm.service. Dec 16 13:18:24.827025 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 16 13:18:24.827219 systemd[1]: Finished modprobe@efi_pstore.service. Dec 16 13:18:24.827936 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 16 13:18:24.843183 systemd[1]: Started systemd-timesyncd.service. Dec 16 13:18:24.843890 systemd[1]: Reached target time-set.target. Dec 16 13:18:24.873138 systemd-resolved[1131]: Positive Trust Anchors: Dec 16 13:18:24.873516 systemd-resolved[1131]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 16 13:18:24.873640 systemd-resolved[1131]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 16 13:18:25.653361 systemd-timesyncd[1133]: Contacted time server 199.68.201.235:123 (0.flatcar.pool.ntp.org). Dec 16 13:18:25.653432 systemd-timesyncd[1133]: Initial clock synchronization to Mon 2024-12-16 13:18:25.653199 UTC. Dec 16 13:18:25.656757 systemd-resolved[1131]: Using system hostname 'ci-3510.3.6-6-0e268b98cf'. Dec 16 13:18:25.659897 systemd[1]: Started systemd-resolved.service. Dec 16 13:18:25.660500 systemd[1]: Reached target network.target. Dec 16 13:18:25.660812 systemd[1]: Reached target nss-lookup.target. Dec 16 13:18:25.661284 systemd[1]: Reached target sysinit.target. Dec 16 13:18:25.661836 systemd[1]: Started motdgen.path. Dec 16 13:18:25.662327 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 16 13:18:25.662990 systemd[1]: Started logrotate.timer. Dec 16 13:18:25.663604 systemd[1]: Started mdadm.timer. Dec 16 13:18:25.663944 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 16 13:18:25.664311 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 16 13:18:25.664358 systemd[1]: Reached target paths.target. Dec 16 13:18:25.664966 systemd[1]: Reached target timers.target. Dec 16 13:18:25.665948 systemd[1]: Listening on dbus.socket. Dec 16 13:18:25.668747 systemd[1]: Starting docker.socket... Dec 16 13:18:25.674854 systemd[1]: Listening on sshd.socket. Dec 16 13:18:25.675674 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 16 13:18:25.676597 systemd[1]: Listening on docker.socket. Dec 16 13:18:25.677389 systemd[1]: Reached target sockets.target. Dec 16 13:18:25.677984 systemd[1]: Reached target basic.target. Dec 16 13:18:25.678553 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 16 13:18:25.678605 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 16 13:18:25.680970 systemd[1]: Starting containerd.service... Dec 16 13:18:25.685560 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 16 13:18:25.688599 systemd[1]: Starting dbus.service... Dec 16 13:18:25.693702 systemd[1]: Starting enable-oem-cloudinit.service... Dec 16 13:18:25.701035 systemd[1]: Starting extend-filesystems.service... Dec 16 13:18:25.702108 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 16 13:18:25.702594 jq[1171]: false Dec 16 13:18:25.704987 systemd[1]: Starting motdgen.service... Dec 16 13:18:25.709712 systemd[1]: Starting prepare-helm.service... Dec 16 13:18:25.715490 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 16 13:18:25.718064 systemd[1]: Starting sshd-keygen.service... Dec 16 13:18:25.726347 systemd[1]: Starting systemd-logind.service... Dec 16 13:18:25.729389 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 16 13:18:25.729577 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 16 13:18:25.730680 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 16 13:18:25.732509 systemd[1]: Starting update-engine.service... Dec 16 13:18:25.739388 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 16 13:18:25.753610 jq[1184]: true Dec 16 13:18:25.751399 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 16 13:18:25.754276 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 16 13:18:25.756854 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 16 13:18:25.778471 jq[1192]: true Dec 16 13:18:25.765137 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 16 13:18:25.768525 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 16 13:18:25.768594 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 16 13:18:25.804472 tar[1190]: linux-amd64/helm Dec 16 13:18:25.805490 extend-filesystems[1172]: Found loop1 Dec 16 13:18:25.806400 extend-filesystems[1172]: Found vda Dec 16 13:18:25.806400 extend-filesystems[1172]: Found vda1 Dec 16 13:18:25.806400 extend-filesystems[1172]: Found vda2 Dec 16 13:18:25.806400 extend-filesystems[1172]: Found vda3 Dec 16 13:18:25.806400 extend-filesystems[1172]: Found usr Dec 16 13:18:25.806400 extend-filesystems[1172]: Found vda4 Dec 16 13:18:25.806400 extend-filesystems[1172]: Found vda6 Dec 16 13:18:25.806400 extend-filesystems[1172]: Found vda7 Dec 16 13:18:25.806400 extend-filesystems[1172]: Found vda9 Dec 16 13:18:25.806400 extend-filesystems[1172]: Checking size of /dev/vda9 Dec 16 13:18:25.840095 systemd[1]: motdgen.service: Deactivated successfully. Dec 16 13:18:25.840388 systemd[1]: Finished motdgen.service. Dec 16 13:18:25.845873 dbus-daemon[1168]: [system] SELinux support is enabled Dec 16 13:18:25.846579 systemd[1]: Started dbus.service. Dec 16 13:18:25.850454 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 16 13:18:25.850502 systemd[1]: Reached target system-config.target. Dec 16 13:18:25.851196 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 16 13:18:25.851228 systemd[1]: Reached target user-config.target. Dec 16 13:18:25.858561 extend-filesystems[1172]: Resized partition /dev/vda9 Dec 16 13:18:25.894152 update_engine[1182]: I1216 13:18:25.893597 1182 main.cc:92] Flatcar Update Engine starting Dec 16 13:18:25.895111 extend-filesystems[1210]: resize2fs 1.46.5 (30-Dec-2021) Dec 16 13:18:25.909102 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 15121403 blocks Dec 16 13:18:25.902792 systemd[1]: Started update-engine.service. Dec 16 13:18:25.909618 update_engine[1182]: I1216 13:18:25.903270 1182 update_check_scheduler.cc:74] Next update check in 9m54s Dec 16 13:18:25.906144 systemd[1]: Started locksmithd.service. Dec 16 13:18:25.961532 bash[1221]: Updated "/home/core/.ssh/authorized_keys" Dec 16 13:18:25.962777 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 16 13:18:25.984422 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Dec 16 13:18:25.997905 extend-filesystems[1210]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 16 13:18:25.997905 extend-filesystems[1210]: old_desc_blocks = 1, new_desc_blocks = 8 Dec 16 13:18:25.997905 extend-filesystems[1210]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Dec 16 13:18:26.002112 extend-filesystems[1172]: Resized filesystem in /dev/vda9 Dec 16 13:18:26.002112 extend-filesystems[1172]: Found vdb Dec 16 13:18:25.999322 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 16 13:18:25.999566 systemd[1]: Finished extend-filesystems.service. Dec 16 13:18:26.022017 systemd-logind[1181]: Watching system buttons on /dev/input/event1 (Power Button) Dec 16 13:18:26.022046 systemd-logind[1181]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 16 13:18:26.023305 systemd-logind[1181]: New seat seat0. Dec 16 13:18:26.025716 systemd[1]: Started systemd-logind.service. Dec 16 13:18:26.034846 coreos-metadata[1167]: Dec 16 13:18:26.034 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Dec 16 13:18:26.049884 coreos-metadata[1167]: Dec 16 13:18:26.049 INFO Fetch successful Dec 16 13:18:26.055535 unknown[1167]: wrote ssh authorized keys file for user: core Dec 16 13:18:26.071001 env[1193]: time="2024-12-16T13:18:26.070848006Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 16 13:18:26.071710 update-ssh-keys[1225]: Updated "/home/core/.ssh/authorized_keys" Dec 16 13:18:26.072353 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 16 13:18:26.138303 env[1193]: time="2024-12-16T13:18:26.138182399Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 16 13:18:26.142690 env[1193]: time="2024-12-16T13:18:26.142626323Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 16 13:18:26.146904 env[1193]: time="2024-12-16T13:18:26.146825893Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 16 13:18:26.147275 env[1193]: time="2024-12-16T13:18:26.147133916Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 16 13:18:26.147797 env[1193]: time="2024-12-16T13:18:26.147760065Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 16 13:18:26.147956 env[1193]: time="2024-12-16T13:18:26.147930344Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 16 13:18:26.148113 env[1193]: time="2024-12-16T13:18:26.148084122Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 16 13:18:26.148252 env[1193]: time="2024-12-16T13:18:26.148230239Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 16 13:18:26.148567 env[1193]: time="2024-12-16T13:18:26.148530371Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 16 13:18:26.149195 env[1193]: time="2024-12-16T13:18:26.149164266Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 16 13:18:26.149643 env[1193]: time="2024-12-16T13:18:26.149601398Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 16 13:18:26.149769 env[1193]: time="2024-12-16T13:18:26.149747226Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 16 13:18:26.150008 env[1193]: time="2024-12-16T13:18:26.149970246Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 16 13:18:26.150196 env[1193]: time="2024-12-16T13:18:26.150170321Z" level=info msg="metadata content store policy set" policy=shared Dec 16 13:18:26.154728 env[1193]: time="2024-12-16T13:18:26.154671179Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 16 13:18:26.155020 env[1193]: time="2024-12-16T13:18:26.154990377Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 16 13:18:26.155229 env[1193]: time="2024-12-16T13:18:26.155196547Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 16 13:18:26.155416 env[1193]: time="2024-12-16T13:18:26.155390844Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 16 13:18:26.155584 env[1193]: time="2024-12-16T13:18:26.155562429Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 16 13:18:26.155711 env[1193]: time="2024-12-16T13:18:26.155689935Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 16 13:18:26.155813 env[1193]: time="2024-12-16T13:18:26.155792479Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 16 13:18:26.155913 env[1193]: time="2024-12-16T13:18:26.155890967Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 16 13:18:26.156011 env[1193]: time="2024-12-16T13:18:26.155992109Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 16 13:18:26.156143 env[1193]: time="2024-12-16T13:18:26.156120498Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 16 13:18:26.156242 env[1193]: time="2024-12-16T13:18:26.156221034Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 16 13:18:26.156336 env[1193]: time="2024-12-16T13:18:26.156316175Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 16 13:18:26.156646 env[1193]: time="2024-12-16T13:18:26.156613847Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 16 13:18:26.156928 env[1193]: time="2024-12-16T13:18:26.156899763Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 16 13:18:26.157553 env[1193]: time="2024-12-16T13:18:26.157516284Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 16 13:18:26.157729 env[1193]: time="2024-12-16T13:18:26.157701535Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 16 13:18:26.157851 env[1193]: time="2024-12-16T13:18:26.157828684Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 16 13:18:26.158060 env[1193]: time="2024-12-16T13:18:26.158034526Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 16 13:18:26.158268 env[1193]: time="2024-12-16T13:18:26.158242194Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 16 13:18:26.158376 env[1193]: time="2024-12-16T13:18:26.158355769Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 16 13:18:26.158478 env[1193]: time="2024-12-16T13:18:26.158457976Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 16 13:18:26.158575 env[1193]: time="2024-12-16T13:18:26.158554034Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 16 13:18:26.158695 env[1193]: time="2024-12-16T13:18:26.158671631Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 16 13:18:26.158796 env[1193]: time="2024-12-16T13:18:26.158774838Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 16 13:18:26.158898 env[1193]: time="2024-12-16T13:18:26.158877560Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 16 13:18:26.159016 env[1193]: time="2024-12-16T13:18:26.158994918Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 16 13:18:26.159405 env[1193]: time="2024-12-16T13:18:26.159371443Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 16 13:18:26.160190 env[1193]: time="2024-12-16T13:18:26.160146560Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 16 13:18:26.160190 env[1193]: time="2024-12-16T13:18:26.160190186Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 16 13:18:26.160323 env[1193]: time="2024-12-16T13:18:26.160210418Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 16 13:18:26.160323 env[1193]: time="2024-12-16T13:18:26.160237769Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 16 13:18:26.160323 env[1193]: time="2024-12-16T13:18:26.160251218Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 16 13:18:26.160323 env[1193]: time="2024-12-16T13:18:26.160271426Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 16 13:18:26.160323 env[1193]: time="2024-12-16T13:18:26.160318089Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 16 13:18:26.160657 env[1193]: time="2024-12-16T13:18:26.160583723Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 16 13:18:26.160657 env[1193]: time="2024-12-16T13:18:26.160664471Z" level=info msg="Connect containerd service" Dec 16 13:18:26.162754 env[1193]: time="2024-12-16T13:18:26.160720716Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 16 13:18:26.162754 env[1193]: time="2024-12-16T13:18:26.162021491Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 16 13:18:26.163021 env[1193]: time="2024-12-16T13:18:26.162989305Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 16 13:18:26.163118 env[1193]: time="2024-12-16T13:18:26.163054613Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 16 13:18:26.164685 env[1193]: time="2024-12-16T13:18:26.163143859Z" level=info msg="containerd successfully booted in 0.132549s" Dec 16 13:18:26.163276 systemd[1]: Started containerd.service. Dec 16 13:18:26.165734 env[1193]: time="2024-12-16T13:18:26.165662617Z" level=info msg="Start subscribing containerd event" Dec 16 13:18:26.165963 env[1193]: time="2024-12-16T13:18:26.165932947Z" level=info msg="Start recovering state" Dec 16 13:18:26.166204 env[1193]: time="2024-12-16T13:18:26.166175896Z" level=info msg="Start event monitor" Dec 16 13:18:26.166344 env[1193]: time="2024-12-16T13:18:26.166319559Z" level=info msg="Start snapshots syncer" Dec 16 13:18:26.166463 env[1193]: time="2024-12-16T13:18:26.166441075Z" level=info msg="Start cni network conf syncer for default" Dec 16 13:18:26.180098 env[1193]: time="2024-12-16T13:18:26.178531940Z" level=info msg="Start streaming server" Dec 16 13:18:26.277518 systemd-networkd[1003]: eth1: Gained IPv6LL Dec 16 13:18:26.278017 systemd-networkd[1003]: eth0: Gained IPv6LL Dec 16 13:18:26.281056 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 16 13:18:26.282068 systemd[1]: Reached target network-online.target. Dec 16 13:18:26.284954 systemd[1]: Starting kubelet.service... Dec 16 13:18:26.668807 sshd_keygen[1198]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 16 13:18:26.729360 systemd[1]: Finished sshd-keygen.service. Dec 16 13:18:26.732464 systemd[1]: Starting issuegen.service... Dec 16 13:18:26.751361 systemd[1]: issuegen.service: Deactivated successfully. Dec 16 13:18:26.751619 systemd[1]: Finished issuegen.service. Dec 16 13:18:26.754943 systemd[1]: Starting systemd-user-sessions.service... Dec 16 13:18:26.778571 systemd[1]: Finished systemd-user-sessions.service. Dec 16 13:18:26.780994 systemd[1]: Started getty@tty1.service. Dec 16 13:18:26.783521 systemd[1]: Started serial-getty@ttyS0.service. Dec 16 13:18:26.784251 systemd[1]: Reached target getty.target. Dec 16 13:18:26.822519 tar[1190]: linux-amd64/LICENSE Dec 16 13:18:26.823259 tar[1190]: linux-amd64/README.md Dec 16 13:18:26.830807 systemd[1]: Finished prepare-helm.service. Dec 16 13:18:26.851820 locksmithd[1217]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 16 13:18:27.462368 systemd[1]: Created slice system-sshd.slice. Dec 16 13:18:27.465381 systemd[1]: Started sshd@0-164.92.94.164:22-139.178.89.65:51902.service. Dec 16 13:18:27.530404 systemd[1]: Started kubelet.service. Dec 16 13:18:27.531634 systemd[1]: Reached target multi-user.target. Dec 16 13:18:27.533857 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 16 13:18:27.546025 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 16 13:18:27.546362 sshd[1252]: Accepted publickey for core from 139.178.89.65 port 51902 ssh2: RSA SHA256:Q+lFULKB/jVvshRdfdjHJzJxBGhdic6R851DS3iyBTE Dec 16 13:18:27.546238 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 16 13:18:27.546759 systemd[1]: Startup finished in 1.532s (kernel) + 5.059s (initrd) + 8.000s (userspace) = 14.592s. Dec 16 13:18:27.551419 sshd[1252]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 16 13:18:27.576150 systemd[1]: Created slice user-500.slice. Dec 16 13:18:27.577777 systemd[1]: Starting user-runtime-dir@500.service... Dec 16 13:18:27.582990 systemd-logind[1181]: New session 1 of user core. Dec 16 13:18:27.594842 systemd[1]: Finished user-runtime-dir@500.service. Dec 16 13:18:27.597920 systemd[1]: Starting user@500.service... Dec 16 13:18:27.605022 (systemd)[1259]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 16 13:18:27.720000 systemd[1259]: Queued start job for default target default.target. Dec 16 13:18:27.722027 systemd[1259]: Reached target paths.target. Dec 16 13:18:27.722285 systemd[1259]: Reached target sockets.target. Dec 16 13:18:27.722437 systemd[1259]: Reached target timers.target. Dec 16 13:18:27.722609 systemd[1259]: Reached target basic.target. Dec 16 13:18:27.722802 systemd[1259]: Reached target default.target. Dec 16 13:18:27.722951 systemd[1]: Started user@500.service. Dec 16 13:18:27.724100 systemd[1259]: Startup finished in 106ms. Dec 16 13:18:27.724653 systemd[1]: Started session-1.scope. Dec 16 13:18:27.790482 systemd[1]: Started sshd@1-164.92.94.164:22-139.178.89.65:51906.service. Dec 16 13:18:27.851166 sshd[1272]: Accepted publickey for core from 139.178.89.65 port 51906 ssh2: RSA SHA256:Q+lFULKB/jVvshRdfdjHJzJxBGhdic6R851DS3iyBTE Dec 16 13:18:27.853588 sshd[1272]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 16 13:18:27.863361 systemd[1]: Started session-2.scope. Dec 16 13:18:27.864185 systemd-logind[1181]: New session 2 of user core. Dec 16 13:18:27.942627 sshd[1272]: pam_unix(sshd:session): session closed for user core Dec 16 13:18:27.948283 systemd[1]: sshd@1-164.92.94.164:22-139.178.89.65:51906.service: Deactivated successfully. Dec 16 13:18:27.950427 systemd[1]: session-2.scope: Deactivated successfully. Dec 16 13:18:27.953948 systemd[1]: Started sshd@2-164.92.94.164:22-139.178.89.65:51912.service. Dec 16 13:18:27.957206 systemd-logind[1181]: Session 2 logged out. Waiting for processes to exit. Dec 16 13:18:27.960146 systemd-logind[1181]: Removed session 2. Dec 16 13:18:28.005873 sshd[1278]: Accepted publickey for core from 139.178.89.65 port 51912 ssh2: RSA SHA256:Q+lFULKB/jVvshRdfdjHJzJxBGhdic6R851DS3iyBTE Dec 16 13:18:28.008458 sshd[1278]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 16 13:18:28.014677 systemd[1]: Started session-3.scope. Dec 16 13:18:28.016329 systemd-logind[1181]: New session 3 of user core. Dec 16 13:18:28.076679 sshd[1278]: pam_unix(sshd:session): session closed for user core Dec 16 13:18:28.082198 systemd[1]: Started sshd@3-164.92.94.164:22-139.178.89.65:60946.service. Dec 16 13:18:28.087362 systemd[1]: sshd@2-164.92.94.164:22-139.178.89.65:51912.service: Deactivated successfully. Dec 16 13:18:28.088831 systemd[1]: session-3.scope: Deactivated successfully. Dec 16 13:18:28.091461 systemd-logind[1181]: Session 3 logged out. Waiting for processes to exit. Dec 16 13:18:28.092603 systemd-logind[1181]: Removed session 3. Dec 16 13:18:28.148763 sshd[1283]: Accepted publickey for core from 139.178.89.65 port 60946 ssh2: RSA SHA256:Q+lFULKB/jVvshRdfdjHJzJxBGhdic6R851DS3iyBTE Dec 16 13:18:28.150047 sshd[1283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 16 13:18:28.159029 systemd[1]: Started session-4.scope. Dec 16 13:18:28.160148 systemd-logind[1181]: New session 4 of user core. Dec 16 13:18:28.232376 sshd[1283]: pam_unix(sshd:session): session closed for user core Dec 16 13:18:28.242099 systemd[1]: Started sshd@4-164.92.94.164:22-139.178.89.65:60962.service. Dec 16 13:18:28.249258 systemd[1]: sshd@3-164.92.94.164:22-139.178.89.65:60946.service: Deactivated successfully. Dec 16 13:18:28.250555 systemd[1]: session-4.scope: Deactivated successfully. Dec 16 13:18:28.251732 systemd-logind[1181]: Session 4 logged out. Waiting for processes to exit. Dec 16 13:18:28.254476 systemd-logind[1181]: Removed session 4. Dec 16 13:18:28.297719 sshd[1290]: Accepted publickey for core from 139.178.89.65 port 60962 ssh2: RSA SHA256:Q+lFULKB/jVvshRdfdjHJzJxBGhdic6R851DS3iyBTE Dec 16 13:18:28.297751 sshd[1290]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 16 13:18:28.302935 systemd[1]: Started session-5.scope. Dec 16 13:18:28.304133 systemd-logind[1181]: New session 5 of user core. Dec 16 13:18:28.380773 sudo[1294]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 16 13:18:28.381203 sudo[1294]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 16 13:18:28.390317 dbus-daemon[1168]: Эq\x88IV: received setenforce notice (enforcing=-1180422560) Dec 16 13:18:28.392886 sudo[1294]: pam_unix(sudo:session): session closed for user root Dec 16 13:18:28.393593 kubelet[1256]: E1216 13:18:28.393467 1256 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 16 13:18:28.399602 sshd[1290]: pam_unix(sshd:session): session closed for user core Dec 16 13:18:28.402112 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 16 13:18:28.402245 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 16 13:18:28.402590 systemd[1]: kubelet.service: Consumed 1.336s CPU time. Dec 16 13:18:28.404588 systemd[1]: Started sshd@5-164.92.94.164:22-139.178.89.65:60976.service. Dec 16 13:18:28.405485 systemd[1]: sshd@4-164.92.94.164:22-139.178.89.65:60962.service: Deactivated successfully. Dec 16 13:18:28.406538 systemd[1]: session-5.scope: Deactivated successfully. Dec 16 13:18:28.408678 systemd-logind[1181]: Session 5 logged out. Waiting for processes to exit. Dec 16 13:18:28.410558 systemd-logind[1181]: Removed session 5. Dec 16 13:18:28.459268 sshd[1297]: Accepted publickey for core from 139.178.89.65 port 60976 ssh2: RSA SHA256:Q+lFULKB/jVvshRdfdjHJzJxBGhdic6R851DS3iyBTE Dec 16 13:18:28.461993 sshd[1297]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 16 13:18:28.468348 systemd[1]: Started session-6.scope. Dec 16 13:18:28.468844 systemd-logind[1181]: New session 6 of user core. Dec 16 13:18:28.532023 sudo[1302]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 16 13:18:28.532791 sudo[1302]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 16 13:18:28.537352 sudo[1302]: pam_unix(sudo:session): session closed for user root Dec 16 13:18:28.545911 sudo[1301]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 16 13:18:28.546238 sudo[1301]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 16 13:18:28.561586 systemd[1]: Stopping audit-rules.service... Dec 16 13:18:28.561000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 16 13:18:28.563402 kernel: kauditd_printk_skb: 211 callbacks suppressed Dec 16 13:18:28.563452 kernel: audit: type=1305 audit(1734355108.561:212): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 16 13:18:28.561000 audit[1305]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc30029690 a2=420 a3=0 items=0 ppid=1 pid=1305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:28.568789 kernel: audit: type=1300 audit(1734355108.561:212): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc30029690 a2=420 a3=0 items=0 ppid=1 pid=1305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:28.568947 kernel: audit: type=1327 audit(1734355108.561:212): proctitle=2F7362696E2F617564697463746C002D44 Dec 16 13:18:28.561000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 16 13:18:28.570828 auditctl[1305]: No rules Dec 16 13:18:28.571609 systemd[1]: audit-rules.service: Deactivated successfully. Dec 16 13:18:28.571792 systemd[1]: Stopped audit-rules.service. Dec 16 13:18:28.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:28.576810 kernel: audit: type=1131 audit(1734355108.570:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:28.574538 systemd[1]: Starting audit-rules.service... Dec 16 13:18:28.601306 augenrules[1322]: No rules Dec 16 13:18:28.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:28.602343 systemd[1]: Finished audit-rules.service. Dec 16 13:18:28.603788 sudo[1301]: pam_unix(sudo:session): session closed for user root Dec 16 13:18:28.609711 kernel: audit: type=1130 audit(1734355108.601:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:28.609824 kernel: audit: type=1106 audit(1734355108.602:215): pid=1301 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 16 13:18:28.602000 audit[1301]: USER_END pid=1301 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 16 13:18:28.612323 sshd[1297]: pam_unix(sshd:session): session closed for user core Dec 16 13:18:28.602000 audit[1301]: CRED_DISP pid=1301 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 16 13:18:28.617122 kernel: audit: type=1104 audit(1734355108.602:216): pid=1301 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 16 13:18:28.618789 systemd[1]: Started sshd@6-164.92.94.164:22-139.178.89.65:60984.service. Dec 16 13:18:28.620697 systemd[1]: sshd@5-164.92.94.164:22-139.178.89.65:60976.service: Deactivated successfully. Dec 16 13:18:28.617000 audit[1297]: USER_END pid=1297 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:18:28.622988 systemd[1]: session-6.scope: Deactivated successfully. Dec 16 13:18:28.628369 kernel: audit: type=1106 audit(1734355108.617:217): pid=1297 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:18:28.629378 systemd-logind[1181]: Session 6 logged out. Waiting for processes to exit. Dec 16 13:18:28.631336 systemd-logind[1181]: Removed session 6. Dec 16 13:18:28.617000 audit[1297]: CRED_DISP pid=1297 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:18:28.639241 kernel: audit: type=1104 audit(1734355108.617:218): pid=1297 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:18:28.639390 kernel: audit: type=1130 audit(1734355108.617:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-164.92.94.164:22-139.178.89.65:60984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:28.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-164.92.94.164:22-139.178.89.65:60984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:28.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-164.92.94.164:22-139.178.89.65:60976 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:28.675000 audit[1327]: USER_ACCT pid=1327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:18:28.677228 sshd[1327]: Accepted publickey for core from 139.178.89.65 port 60984 ssh2: RSA SHA256:Q+lFULKB/jVvshRdfdjHJzJxBGhdic6R851DS3iyBTE Dec 16 13:18:28.677000 audit[1327]: CRED_ACQ pid=1327 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:18:28.677000 audit[1327]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd7ecb620 a2=3 a3=0 items=0 ppid=1 pid=1327 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:28.677000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 16 13:18:28.679266 sshd[1327]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 16 13:18:28.685610 systemd-logind[1181]: New session 7 of user core. Dec 16 13:18:28.686246 systemd[1]: Started session-7.scope. Dec 16 13:18:28.692000 audit[1327]: USER_START pid=1327 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:18:28.694000 audit[1330]: CRED_ACQ pid=1330 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:18:28.751000 audit[1331]: USER_ACCT pid=1331 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 16 13:18:28.751000 audit[1331]: CRED_REFR pid=1331 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 16 13:18:28.752878 sudo[1331]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 16 13:18:28.753394 sudo[1331]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 16 13:18:28.755000 audit[1331]: USER_START pid=1331 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 16 13:18:28.800689 systemd[1]: Starting docker.service... Dec 16 13:18:28.881280 env[1341]: time="2024-12-16T13:18:28.879521077Z" level=info msg="Starting up" Dec 16 13:18:28.883560 env[1341]: time="2024-12-16T13:18:28.883518917Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 16 13:18:28.883560 env[1341]: time="2024-12-16T13:18:28.883546792Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 16 13:18:28.883560 env[1341]: time="2024-12-16T13:18:28.883566323Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 16 13:18:28.883838 env[1341]: time="2024-12-16T13:18:28.883577732Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 16 13:18:28.892012 env[1341]: time="2024-12-16T13:18:28.891956179Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 16 13:18:28.892996 env[1341]: time="2024-12-16T13:18:28.892916217Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 16 13:18:28.893239 env[1341]: time="2024-12-16T13:18:28.893210490Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 16 13:18:28.893358 env[1341]: time="2024-12-16T13:18:28.893340606Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 16 13:18:28.904294 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport2857435448-merged.mount: Deactivated successfully. Dec 16 13:18:28.961808 env[1341]: time="2024-12-16T13:18:28.961753012Z" level=info msg="Loading containers: start." Dec 16 13:18:29.051000 audit[1373]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1373 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:18:29.051000 audit[1373]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffcb07fd010 a2=0 a3=7ffcb07fcffc items=0 ppid=1341 pid=1373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:29.051000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 16 13:18:29.055000 audit[1375]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1375 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:18:29.055000 audit[1375]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd8e50fbc0 a2=0 a3=7ffd8e50fbac items=0 ppid=1341 pid=1375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:29.055000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 16 13:18:29.059000 audit[1377]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1377 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:18:29.059000 audit[1377]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff124797c0 a2=0 a3=7fff124797ac items=0 ppid=1341 pid=1377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:29.059000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 16 13:18:29.061000 audit[1379]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1379 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:18:29.061000 audit[1379]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc41085d90 a2=0 a3=7ffc41085d7c items=0 ppid=1341 pid=1379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:29.061000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 16 13:18:29.065000 audit[1381]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1381 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:18:29.065000 audit[1381]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdf3e549e0 a2=0 a3=7ffdf3e549cc items=0 ppid=1341 pid=1381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:29.065000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 16 13:18:29.086000 audit[1386]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1386 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:18:29.086000 audit[1386]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc330b8a40 a2=0 a3=7ffc330b8a2c items=0 ppid=1341 pid=1386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:29.086000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 16 13:18:29.093000 audit[1388]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1388 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:18:29.093000 audit[1388]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc63de3870 a2=0 a3=7ffc63de385c items=0 ppid=1341 pid=1388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:29.093000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 16 13:18:29.096000 audit[1390]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1390 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:18:29.096000 audit[1390]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffdcaf50e20 a2=0 a3=7ffdcaf50e0c items=0 ppid=1341 pid=1390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:29.096000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 16 13:18:29.099000 audit[1392]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1392 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:18:29.099000 audit[1392]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe2d380a60 a2=0 a3=7ffe2d380a4c items=0 ppid=1341 pid=1392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:29.099000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 16 13:18:29.109000 audit[1396]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1396 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:18:29.109000 audit[1396]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc5de476f0 a2=0 a3=7ffc5de476dc items=0 ppid=1341 pid=1396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:29.109000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 16 13:18:29.114000 audit[1397]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1397 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:18:29.114000 audit[1397]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffdbc248710 a2=0 a3=7ffdbc2486fc items=0 ppid=1341 pid=1397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:29.114000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 16 13:18:29.128097 kernel: Initializing XFRM netlink socket Dec 16 13:18:29.177959 env[1341]: time="2024-12-16T13:18:29.177899841Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 16 13:18:29.211000 audit[1405]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1405 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:18:29.211000 audit[1405]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffe9b30be00 a2=0 a3=7ffe9b30bdec items=0 ppid=1341 pid=1405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:29.211000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 16 13:18:29.224000 audit[1408]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:18:29.224000 audit[1408]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffdcfef6800 a2=0 a3=7ffdcfef67ec items=0 ppid=1341 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:29.224000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 16 13:18:29.229000 audit[1411]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1411 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:18:29.229000 audit[1411]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe354aa7b0 a2=0 a3=7ffe354aa79c items=0 ppid=1341 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:29.229000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 16 13:18:29.233000 audit[1413]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1413 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:18:29.233000 audit[1413]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffefc228b30 a2=0 a3=7ffefc228b1c items=0 ppid=1341 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:29.233000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 16 13:18:29.236000 audit[1415]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1415 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:18:29.236000 audit[1415]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fffbbefd350 a2=0 a3=7fffbbefd33c items=0 ppid=1341 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:29.236000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 16 13:18:29.240000 audit[1417]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1417 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:18:29.240000 audit[1417]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffc9ba8fe10 a2=0 a3=7ffc9ba8fdfc items=0 ppid=1341 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:29.240000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 16 13:18:29.242000 audit[1419]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:18:29.242000 audit[1419]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc80908cb0 a2=0 a3=7ffc80908c9c items=0 ppid=1341 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:29.242000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 16 13:18:29.252000 audit[1422]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:18:29.252000 audit[1422]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffcd3f90b40 a2=0 a3=7ffcd3f90b2c items=0 ppid=1341 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:29.252000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 16 13:18:29.256000 audit[1424]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1424 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:18:29.256000 audit[1424]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff9b9afd90 a2=0 a3=7fff9b9afd7c items=0 ppid=1341 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:29.256000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 16 13:18:29.260000 audit[1426]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:18:29.260000 audit[1426]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffc112dabb0 a2=0 a3=7ffc112dab9c items=0 ppid=1341 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:29.260000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 16 13:18:29.264000 audit[1428]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1428 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:18:29.264000 audit[1428]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff04b049b0 a2=0 a3=7fff04b0499c items=0 ppid=1341 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:29.264000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 16 13:18:29.266177 systemd-networkd[1003]: docker0: Link UP Dec 16 13:18:29.275000 audit[1432]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1432 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:18:29.275000 audit[1432]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcdb0c07c0 a2=0 a3=7ffcdb0c07ac items=0 ppid=1341 pid=1432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:29.275000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 16 13:18:29.280000 audit[1433]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:18:29.280000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff264e4640 a2=0 a3=7fff264e462c items=0 ppid=1341 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:29.280000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 16 13:18:29.282658 env[1341]: time="2024-12-16T13:18:29.282608636Z" level=info msg="Loading containers: done." Dec 16 13:18:29.298889 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2850943032-merged.mount: Deactivated successfully. Dec 16 13:18:29.302270 env[1341]: time="2024-12-16T13:18:29.302191165Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 16 13:18:29.302585 env[1341]: time="2024-12-16T13:18:29.302559277Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 16 13:18:29.302722 env[1341]: time="2024-12-16T13:18:29.302697730Z" level=info msg="Daemon has completed initialization" Dec 16 13:18:29.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:29.319401 systemd[1]: Started docker.service. Dec 16 13:18:29.325522 env[1341]: time="2024-12-16T13:18:29.325440527Z" level=info msg="API listen on /run/docker.sock" Dec 16 13:18:29.353949 systemd[1]: Starting coreos-metadata.service... Dec 16 13:18:29.400430 coreos-metadata[1460]: Dec 16 13:18:29.400 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Dec 16 13:18:29.411475 coreos-metadata[1460]: Dec 16 13:18:29.411 INFO Fetch successful Dec 16 13:18:29.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:29.428570 systemd[1]: Finished coreos-metadata.service. Dec 16 13:18:30.364557 env[1193]: time="2024-12-16T13:18:30.364487368Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.4\"" Dec 16 13:18:30.908055 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount621627703.mount: Deactivated successfully. Dec 16 13:18:32.843653 env[1193]: time="2024-12-16T13:18:32.843579169Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:32.847511 env[1193]: time="2024-12-16T13:18:32.847455563Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bdc2eadbf366279693097982a31da61cc2f1d90f07ada3f4b3b91251a18f665e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:32.850410 env[1193]: time="2024-12-16T13:18:32.850360372Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:32.852414 env[1193]: time="2024-12-16T13:18:32.852367008Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:ace6a943b058439bd6daeb74f152e7c36e6fc0b5e481cdff9364cd6ca0473e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:32.853388 env[1193]: time="2024-12-16T13:18:32.853326421Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.4\" returns image reference \"sha256:bdc2eadbf366279693097982a31da61cc2f1d90f07ada3f4b3b91251a18f665e\"" Dec 16 13:18:32.855579 env[1193]: time="2024-12-16T13:18:32.855539346Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.4\"" Dec 16 13:18:34.745584 env[1193]: time="2024-12-16T13:18:34.745517021Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:34.748712 env[1193]: time="2024-12-16T13:18:34.748666681Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:359b9f2307326a4c66172318ca63ee9792c3146ca57d53329239bd123ea70079,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:34.752004 env[1193]: time="2024-12-16T13:18:34.751946873Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:34.755602 env[1193]: time="2024-12-16T13:18:34.755540532Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:4bd1d4a449e7a1a4f375bd7c71abf48a95f8949b38f725ded255077329f21f7b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:34.757336 env[1193]: time="2024-12-16T13:18:34.757276990Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.4\" returns image reference \"sha256:359b9f2307326a4c66172318ca63ee9792c3146ca57d53329239bd123ea70079\"" Dec 16 13:18:34.759367 env[1193]: time="2024-12-16T13:18:34.759302018Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.4\"" Dec 16 13:18:36.359899 env[1193]: time="2024-12-16T13:18:36.359252321Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:36.361871 env[1193]: time="2024-12-16T13:18:36.361808957Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a66234066fe10fa299c0a52265f90a107450f0372652867118cd9007940d674,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:36.364200 env[1193]: time="2024-12-16T13:18:36.364156969Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:36.365360 env[1193]: time="2024-12-16T13:18:36.365311140Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.4\" returns image reference \"sha256:3a66234066fe10fa299c0a52265f90a107450f0372652867118cd9007940d674\"" Dec 16 13:18:36.366112 env[1193]: time="2024-12-16T13:18:36.366081000Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\"" Dec 16 13:18:36.366964 env[1193]: time="2024-12-16T13:18:36.366919378Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:1a3081cb7d21763d22eb2c0781cc462d89f501ed523ad558dea1226f128fbfdd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:37.607048 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1428899838.mount: Deactivated successfully. Dec 16 13:18:38.395373 env[1193]: time="2024-12-16T13:18:38.395293217Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:38.396771 env[1193]: time="2024-12-16T13:18:38.396723900Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:38.398477 env[1193]: time="2024-12-16T13:18:38.398432199Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:38.399697 env[1193]: time="2024-12-16T13:18:38.399657945Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:1739b3febca392035bf6edfe31efdfa55226be7b57389b2001ae357f7dcb99cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:38.400400 env[1193]: time="2024-12-16T13:18:38.400355832Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\" returns image reference \"sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300\"" Dec 16 13:18:38.401493 env[1193]: time="2024-12-16T13:18:38.401456390Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 16 13:18:38.639365 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 16 13:18:38.639570 systemd[1]: Stopped kubelet.service. Dec 16 13:18:38.639631 systemd[1]: kubelet.service: Consumed 1.336s CPU time. Dec 16 13:18:38.648695 kernel: kauditd_printk_skb: 85 callbacks suppressed Dec 16 13:18:38.648866 kernel: audit: type=1130 audit(1734355118.638:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:38.648911 kernel: audit: type=1131 audit(1734355118.638:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:38.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:38.638000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:38.641587 systemd[1]: Starting kubelet.service... Dec 16 13:18:38.775296 systemd[1]: Started kubelet.service. Dec 16 13:18:38.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:38.779208 kernel: audit: type=1130 audit(1734355118.774:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:38.858648 kubelet[1483]: E1216 13:18:38.858576 1483 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 16 13:18:38.870150 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 16 13:18:38.870328 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 16 13:18:38.869000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 16 13:18:38.873185 kernel: audit: type=1131 audit(1734355118.869:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 16 13:18:38.876751 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3814612814.mount: Deactivated successfully. Dec 16 13:18:39.889513 env[1193]: time="2024-12-16T13:18:39.889453848Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:39.891092 env[1193]: time="2024-12-16T13:18:39.891039799Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:39.893133 env[1193]: time="2024-12-16T13:18:39.893099002Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:39.894706 env[1193]: time="2024-12-16T13:18:39.894673598Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:39.895432 env[1193]: time="2024-12-16T13:18:39.895400883Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 16 13:18:39.896058 env[1193]: time="2024-12-16T13:18:39.896034680Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Dec 16 13:18:40.374944 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount195743705.mount: Deactivated successfully. Dec 16 13:18:40.378699 env[1193]: time="2024-12-16T13:18:40.378649108Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:40.381301 env[1193]: time="2024-12-16T13:18:40.381241372Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:40.384298 env[1193]: time="2024-12-16T13:18:40.383342838Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:40.386555 env[1193]: time="2024-12-16T13:18:40.386502192Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" Dec 16 13:18:40.387439 env[1193]: time="2024-12-16T13:18:40.385660295Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:40.387866 env[1193]: time="2024-12-16T13:18:40.387501065Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" Dec 16 13:18:40.867484 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1390146491.mount: Deactivated successfully. Dec 16 13:18:43.456048 env[1193]: time="2024-12-16T13:18:43.455954721Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:43.457511 env[1193]: time="2024-12-16T13:18:43.457469260Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:43.459461 env[1193]: time="2024-12-16T13:18:43.459417150Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:43.461485 env[1193]: time="2024-12-16T13:18:43.461445704Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:43.462326 env[1193]: time="2024-12-16T13:18:43.462295723Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\"" Dec 16 13:18:47.233189 systemd[1]: Stopped kubelet.service. Dec 16 13:18:47.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:47.236456 systemd[1]: Starting kubelet.service... Dec 16 13:18:47.239262 kernel: audit: type=1130 audit(1734355127.232:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:47.239379 kernel: audit: type=1131 audit(1734355127.232:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:47.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:47.272185 systemd[1]: Reloading. Dec 16 13:18:47.390436 /usr/lib/systemd/system-generators/torcx-generator[1531]: time="2024-12-16T13:18:47Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 16 13:18:47.391132 /usr/lib/systemd/system-generators/torcx-generator[1531]: time="2024-12-16T13:18:47Z" level=info msg="torcx already run" Dec 16 13:18:47.486523 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 16 13:18:47.486553 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 16 13:18:47.520745 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 16 13:18:47.635157 kernel: audit: type=1400 audit(1734355127.626:261): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.635319 kernel: audit: type=1400 audit(1734355127.626:262): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.635363 kernel: audit: type=1400 audit(1734355127.626:263): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.642632 kernel: audit: type=1400 audit(1734355127.626:264): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.642766 kernel: audit: type=1400 audit(1734355127.626:265): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.642789 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 16 13:18:47.642812 kernel: audit: type=1400 audit(1734355127.626:266): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.642900 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Dec 16 13:18:47.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.629000 audit: BPF prog-id=43 op=LOAD Dec 16 13:18:47.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.631000 audit: BPF prog-id=44 op=LOAD Dec 16 13:18:47.631000 audit: BPF prog-id=27 op=UNLOAD Dec 16 13:18:47.631000 audit: BPF prog-id=28 op=UNLOAD Dec 16 13:18:47.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.634000 audit: BPF prog-id=45 op=LOAD Dec 16 13:18:47.634000 audit: BPF prog-id=38 op=UNLOAD Dec 16 13:18:47.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.634000 audit: BPF prog-id=46 op=LOAD Dec 16 13:18:47.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.634000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.634000 audit: BPF prog-id=47 op=LOAD Dec 16 13:18:47.634000 audit: BPF prog-id=39 op=UNLOAD Dec 16 13:18:47.634000 audit: BPF prog-id=40 op=UNLOAD Dec 16 13:18:47.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.636000 audit: BPF prog-id=48 op=LOAD Dec 16 13:18:47.636000 audit: BPF prog-id=37 op=UNLOAD Dec 16 13:18:47.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.643000 audit: BPF prog-id=49 op=LOAD Dec 16 13:18:47.643000 audit: BPF prog-id=29 op=UNLOAD Dec 16 13:18:47.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.643000 audit: BPF prog-id=50 op=LOAD Dec 16 13:18:47.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.643000 audit: BPF prog-id=30 op=UNLOAD Dec 16 13:18:47.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.644000 audit: BPF prog-id=52 op=LOAD Dec 16 13:18:47.644000 audit: BPF prog-id=36 op=UNLOAD Dec 16 13:18:47.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.645000 audit: BPF prog-id=53 op=LOAD Dec 16 13:18:47.645000 audit: BPF prog-id=32 op=UNLOAD Dec 16 13:18:47.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.646000 audit: BPF prog-id=54 op=LOAD Dec 16 13:18:47.646000 audit: BPF prog-id=41 op=UNLOAD Dec 16 13:18:47.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.649000 audit: BPF prog-id=55 op=LOAD Dec 16 13:18:47.649000 audit: BPF prog-id=33 op=UNLOAD Dec 16 13:18:47.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.649000 audit: BPF prog-id=56 op=LOAD Dec 16 13:18:47.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:47.649000 audit: BPF prog-id=57 op=LOAD Dec 16 13:18:47.649000 audit: BPF prog-id=34 op=UNLOAD Dec 16 13:18:47.649000 audit: BPF prog-id=35 op=UNLOAD Dec 16 13:18:47.673364 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 16 13:18:47.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 16 13:18:47.673445 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 16 13:18:47.673678 systemd[1]: Stopped kubelet.service. Dec 16 13:18:47.675944 systemd[1]: Starting kubelet.service... Dec 16 13:18:47.814618 systemd[1]: Started kubelet.service. Dec 16 13:18:47.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:47.883907 kubelet[1584]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 16 13:18:47.883907 kubelet[1584]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 16 13:18:47.883907 kubelet[1584]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 16 13:18:47.885854 kubelet[1584]: I1216 13:18:47.885590 1584 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 16 13:18:48.282801 kubelet[1584]: I1216 13:18:48.282751 1584 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 16 13:18:48.282801 kubelet[1584]: I1216 13:18:48.282788 1584 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 16 13:18:48.283110 kubelet[1584]: I1216 13:18:48.283091 1584 server.go:929] "Client rotation is on, will bootstrap in background" Dec 16 13:18:48.312526 kubelet[1584]: E1216 13:18:48.312488 1584 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://164.92.94.164:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 164.92.94.164:6443: connect: connection refused" logger="UnhandledError" Dec 16 13:18:48.312816 kubelet[1584]: I1216 13:18:48.312788 1584 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 16 13:18:48.323039 kubelet[1584]: E1216 13:18:48.322977 1584 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 16 13:18:48.323039 kubelet[1584]: I1216 13:18:48.323034 1584 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 16 13:18:48.327965 kubelet[1584]: I1216 13:18:48.327935 1584 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 16 13:18:48.328122 kubelet[1584]: I1216 13:18:48.328072 1584 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 16 13:18:48.328248 kubelet[1584]: I1216 13:18:48.328212 1584 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 16 13:18:48.328415 kubelet[1584]: I1216 13:18:48.328249 1584 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.6-6-0e268b98cf","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 16 13:18:48.328513 kubelet[1584]: I1216 13:18:48.328421 1584 topology_manager.go:138] "Creating topology manager with none policy" Dec 16 13:18:48.328513 kubelet[1584]: I1216 13:18:48.328430 1584 container_manager_linux.go:300] "Creating device plugin manager" Dec 16 13:18:48.328563 kubelet[1584]: I1216 13:18:48.328558 1584 state_mem.go:36] "Initialized new in-memory state store" Dec 16 13:18:48.330707 kubelet[1584]: I1216 13:18:48.330680 1584 kubelet.go:408] "Attempting to sync node with API server" Dec 16 13:18:48.330803 kubelet[1584]: I1216 13:18:48.330715 1584 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 16 13:18:48.330803 kubelet[1584]: I1216 13:18:48.330748 1584 kubelet.go:314] "Adding apiserver pod source" Dec 16 13:18:48.330803 kubelet[1584]: I1216 13:18:48.330760 1584 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 16 13:18:48.347510 kubelet[1584]: W1216 13:18:48.347462 1584 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://164.92.94.164:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-6-0e268b98cf&limit=500&resourceVersion=0": dial tcp 164.92.94.164:6443: connect: connection refused Dec 16 13:18:48.347752 kubelet[1584]: E1216 13:18:48.347726 1584 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://164.92.94.164:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-6-0e268b98cf&limit=500&resourceVersion=0\": dial tcp 164.92.94.164:6443: connect: connection refused" logger="UnhandledError" Dec 16 13:18:48.347996 kubelet[1584]: I1216 13:18:48.347978 1584 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 16 13:18:48.350848 kubelet[1584]: I1216 13:18:48.350819 1584 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 16 13:18:48.352404 kubelet[1584]: W1216 13:18:48.352373 1584 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 16 13:18:48.353504 kubelet[1584]: I1216 13:18:48.353482 1584 server.go:1269] "Started kubelet" Dec 16 13:18:48.365522 kubelet[1584]: W1216 13:18:48.365334 1584 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://164.92.94.164:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 164.92.94.164:6443: connect: connection refused Dec 16 13:18:48.365522 kubelet[1584]: E1216 13:18:48.365421 1584 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://164.92.94.164:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 164.92.94.164:6443: connect: connection refused" logger="UnhandledError" Dec 16 13:18:48.365522 kubelet[1584]: I1216 13:18:48.365468 1584 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 16 13:18:48.366173 kubelet[1584]: I1216 13:18:48.366100 1584 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 16 13:18:48.366765 kubelet[1584]: I1216 13:18:48.366742 1584 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 16 13:18:48.367000 audit[1584]: AVC avc: denied { mac_admin } for pid=1584 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:48.367000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 16 13:18:48.367000 audit[1584]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00077f350 a1=c00091a120 a2=c00077f320 a3=25 items=0 ppid=1 pid=1584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:48.367000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 16 13:18:48.367000 audit[1584]: AVC avc: denied { mac_admin } for pid=1584 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:48.367000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 16 13:18:48.367000 audit[1584]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007f6ae0 a1=c00091a138 a2=c00077f3e0 a3=25 items=0 ppid=1 pid=1584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:48.367000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 16 13:18:48.370054 kubelet[1584]: I1216 13:18:48.368915 1584 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 16 13:18:48.370054 kubelet[1584]: I1216 13:18:48.368995 1584 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 16 13:18:48.370054 kubelet[1584]: I1216 13:18:48.369123 1584 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 16 13:18:48.370518 kubelet[1584]: E1216 13:18:48.368033 1584 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://164.92.94.164:6443/api/v1/namespaces/default/events\": dial tcp 164.92.94.164:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.6-6-0e268b98cf.1811aaccdbe27883 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.6-6-0e268b98cf,UID:ci-3510.3.6-6-0e268b98cf,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.6-6-0e268b98cf,},FirstTimestamp:2024-12-16 13:18:48.353454211 +0000 UTC m=+0.531313196,LastTimestamp:2024-12-16 13:18:48.353454211 +0000 UTC m=+0.531313196,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.6-6-0e268b98cf,}" Dec 16 13:18:48.372360 kubelet[1584]: I1216 13:18:48.372327 1584 server.go:460] "Adding debug handlers to kubelet server" Dec 16 13:18:48.373799 kubelet[1584]: I1216 13:18:48.373770 1584 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 16 13:18:48.373000 audit[1594]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1594 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:18:48.373000 audit[1594]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd3e480af0 a2=0 a3=7ffd3e480adc items=0 ppid=1584 pid=1594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:48.373000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 16 13:18:48.375000 audit[1595]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1595 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:18:48.375000 audit[1595]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc9eccf040 a2=0 a3=7ffc9eccf02c items=0 ppid=1584 pid=1595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:48.375000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 16 13:18:48.379086 kubelet[1584]: I1216 13:18:48.379046 1584 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 16 13:18:48.379626 kubelet[1584]: I1216 13:18:48.379603 1584 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 16 13:18:48.379816 kubelet[1584]: I1216 13:18:48.379802 1584 reconciler.go:26] "Reconciler: start to sync state" Dec 16 13:18:48.380523 kubelet[1584]: W1216 13:18:48.380441 1584 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://164.92.94.164:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 164.92.94.164:6443: connect: connection refused Dec 16 13:18:48.380736 kubelet[1584]: E1216 13:18:48.380695 1584 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://164.92.94.164:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 164.92.94.164:6443: connect: connection refused" logger="UnhandledError" Dec 16 13:18:48.381108 kubelet[1584]: E1216 13:18:48.381034 1584 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.6-6-0e268b98cf\" not found" Dec 16 13:18:48.381108 kubelet[1584]: I1216 13:18:48.381060 1584 factory.go:221] Registration of the systemd container factory successfully Dec 16 13:18:48.381273 kubelet[1584]: I1216 13:18:48.381196 1584 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 16 13:18:48.381643 kubelet[1584]: E1216 13:18:48.381620 1584 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 16 13:18:48.382000 audit[1597]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1597 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:18:48.383888 kubelet[1584]: E1216 13:18:48.383771 1584 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://164.92.94.164:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-6-0e268b98cf?timeout=10s\": dial tcp 164.92.94.164:6443: connect: connection refused" interval="200ms" Dec 16 13:18:48.382000 audit[1597]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcacbd0a30 a2=0 a3=7ffcacbd0a1c items=0 ppid=1584 pid=1597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:48.382000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 16 13:18:48.384470 kubelet[1584]: I1216 13:18:48.384446 1584 factory.go:221] Registration of the containerd container factory successfully Dec 16 13:18:48.386000 audit[1599]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1599 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:18:48.386000 audit[1599]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe775bec40 a2=0 a3=7ffe775bec2c items=0 ppid=1584 pid=1599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:48.386000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 16 13:18:48.406000 audit[1604]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1604 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:18:48.406000 audit[1604]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe15958e10 a2=0 a3=7ffe15958dfc items=0 ppid=1584 pid=1604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:48.406000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 16 13:18:48.408645 kubelet[1584]: I1216 13:18:48.408579 1584 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 16 13:18:48.409000 audit[1605]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1605 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:18:48.409000 audit[1605]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc432a6d30 a2=0 a3=7ffc432a6d1c items=0 ppid=1584 pid=1605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:48.409000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 16 13:18:48.411000 audit[1606]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1606 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:18:48.411000 audit[1606]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc180d80b0 a2=0 a3=7ffc180d809c items=0 ppid=1584 pid=1606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:48.411000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 16 13:18:48.413694 kubelet[1584]: I1216 13:18:48.413438 1584 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 16 13:18:48.413694 kubelet[1584]: I1216 13:18:48.413505 1584 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 16 13:18:48.413694 kubelet[1584]: I1216 13:18:48.413563 1584 kubelet.go:2321] "Starting kubelet main sync loop" Dec 16 13:18:48.413694 kubelet[1584]: E1216 13:18:48.413650 1584 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 16 13:18:48.413000 audit[1607]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1607 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:18:48.413000 audit[1607]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff587d80d0 a2=0 a3=7fff587d80bc items=0 ppid=1584 pid=1607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:48.413000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 16 13:18:48.414000 audit[1608]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=1608 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:18:48.414000 audit[1608]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc5cc22ea0 a2=0 a3=7ffc5cc22e8c items=0 ppid=1584 pid=1608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:48.414000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 16 13:18:48.415000 audit[1609]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=1609 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:18:48.415000 audit[1609]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc082c5ab0 a2=0 a3=7ffc082c5a9c items=0 ppid=1584 pid=1609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:48.415000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 16 13:18:48.416000 audit[1610]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1610 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:18:48.416000 audit[1610]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd7e1ba260 a2=0 a3=7ffd7e1ba24c items=0 ppid=1584 pid=1610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:48.416000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 16 13:18:48.418497 kubelet[1584]: I1216 13:18:48.418474 1584 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 16 13:18:48.418611 kubelet[1584]: I1216 13:18:48.418600 1584 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 16 13:18:48.418678 kubelet[1584]: I1216 13:18:48.418669 1584 state_mem.go:36] "Initialized new in-memory state store" Dec 16 13:18:48.418000 audit[1611]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1611 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:18:48.418000 audit[1611]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffeaf1eb020 a2=0 a3=7ffeaf1eb00c items=0 ppid=1584 pid=1611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:48.418000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 16 13:18:48.419935 kubelet[1584]: W1216 13:18:48.419874 1584 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://164.92.94.164:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 164.92.94.164:6443: connect: connection refused Dec 16 13:18:48.420024 kubelet[1584]: E1216 13:18:48.419964 1584 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://164.92.94.164:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 164.92.94.164:6443: connect: connection refused" logger="UnhandledError" Dec 16 13:18:48.420297 kubelet[1584]: I1216 13:18:48.420279 1584 policy_none.go:49] "None policy: Start" Dec 16 13:18:48.421344 kubelet[1584]: I1216 13:18:48.421320 1584 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 16 13:18:48.421490 kubelet[1584]: I1216 13:18:48.421477 1584 state_mem.go:35] "Initializing new in-memory state store" Dec 16 13:18:48.430683 systemd[1]: Created slice kubepods.slice. Dec 16 13:18:48.436231 systemd[1]: Created slice kubepods-burstable.slice. Dec 16 13:18:48.441182 systemd[1]: Created slice kubepods-besteffort.slice. Dec 16 13:18:48.449374 kubelet[1584]: I1216 13:18:48.449334 1584 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 16 13:18:48.448000 audit[1584]: AVC avc: denied { mac_admin } for pid=1584 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:48.448000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 16 13:18:48.448000 audit[1584]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0004a4180 a1=c0003c5950 a2=c0004a4120 a3=25 items=0 ppid=1 pid=1584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:48.448000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 16 13:18:48.449848 kubelet[1584]: I1216 13:18:48.449430 1584 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 16 13:18:48.449848 kubelet[1584]: I1216 13:18:48.449612 1584 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 16 13:18:48.449848 kubelet[1584]: I1216 13:18:48.449625 1584 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 16 13:18:48.450800 kubelet[1584]: I1216 13:18:48.450779 1584 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 16 13:18:48.453433 kubelet[1584]: E1216 13:18:48.453398 1584 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.6-6-0e268b98cf\" not found" Dec 16 13:18:48.523667 systemd[1]: Created slice kubepods-burstable-podefe1d386cba527f33fc9033edb9d2be5.slice. Dec 16 13:18:48.534730 systemd[1]: Created slice kubepods-burstable-podc4e3c85a1fc2254f7e2e22a6ca57c115.slice. Dec 16 13:18:48.547858 systemd[1]: Created slice kubepods-burstable-poda016f9c2c4884de16ab72d374dc88bb2.slice. Dec 16 13:18:48.550941 kubelet[1584]: I1216 13:18:48.550887 1584 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.6-6-0e268b98cf" Dec 16 13:18:48.551607 kubelet[1584]: E1216 13:18:48.551551 1584 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://164.92.94.164:6443/api/v1/nodes\": dial tcp 164.92.94.164:6443: connect: connection refused" node="ci-3510.3.6-6-0e268b98cf" Dec 16 13:18:48.584961 kubelet[1584]: E1216 13:18:48.584883 1584 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://164.92.94.164:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-6-0e268b98cf?timeout=10s\": dial tcp 164.92.94.164:6443: connect: connection refused" interval="400ms" Dec 16 13:18:48.680496 kubelet[1584]: I1216 13:18:48.680434 1584 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a016f9c2c4884de16ab72d374dc88bb2-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.6-6-0e268b98cf\" (UID: \"a016f9c2c4884de16ab72d374dc88bb2\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-6-0e268b98cf" Dec 16 13:18:48.680686 kubelet[1584]: I1216 13:18:48.680510 1584 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/c4e3c85a1fc2254f7e2e22a6ca57c115-kubeconfig\") pod \"kube-scheduler-ci-3510.3.6-6-0e268b98cf\" (UID: \"c4e3c85a1fc2254f7e2e22a6ca57c115\") " pod="kube-system/kube-scheduler-ci-3510.3.6-6-0e268b98cf" Dec 16 13:18:48.680686 kubelet[1584]: I1216 13:18:48.680538 1584 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/efe1d386cba527f33fc9033edb9d2be5-ca-certs\") pod \"kube-apiserver-ci-3510.3.6-6-0e268b98cf\" (UID: \"efe1d386cba527f33fc9033edb9d2be5\") " pod="kube-system/kube-apiserver-ci-3510.3.6-6-0e268b98cf" Dec 16 13:18:48.680686 kubelet[1584]: I1216 13:18:48.680578 1584 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/efe1d386cba527f33fc9033edb9d2be5-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.6-6-0e268b98cf\" (UID: \"efe1d386cba527f33fc9033edb9d2be5\") " pod="kube-system/kube-apiserver-ci-3510.3.6-6-0e268b98cf" Dec 16 13:18:48.680686 kubelet[1584]: I1216 13:18:48.680606 1584 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a016f9c2c4884de16ab72d374dc88bb2-ca-certs\") pod \"kube-controller-manager-ci-3510.3.6-6-0e268b98cf\" (UID: \"a016f9c2c4884de16ab72d374dc88bb2\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-6-0e268b98cf" Dec 16 13:18:48.680686 kubelet[1584]: I1216 13:18:48.680629 1584 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/efe1d386cba527f33fc9033edb9d2be5-k8s-certs\") pod \"kube-apiserver-ci-3510.3.6-6-0e268b98cf\" (UID: \"efe1d386cba527f33fc9033edb9d2be5\") " pod="kube-system/kube-apiserver-ci-3510.3.6-6-0e268b98cf" Dec 16 13:18:48.680940 kubelet[1584]: I1216 13:18:48.680671 1584 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/a016f9c2c4884de16ab72d374dc88bb2-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.6-6-0e268b98cf\" (UID: \"a016f9c2c4884de16ab72d374dc88bb2\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-6-0e268b98cf" Dec 16 13:18:48.680940 kubelet[1584]: I1216 13:18:48.680696 1584 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a016f9c2c4884de16ab72d374dc88bb2-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.6-6-0e268b98cf\" (UID: \"a016f9c2c4884de16ab72d374dc88bb2\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-6-0e268b98cf" Dec 16 13:18:48.680940 kubelet[1584]: I1216 13:18:48.680744 1584 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a016f9c2c4884de16ab72d374dc88bb2-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.6-6-0e268b98cf\" (UID: \"a016f9c2c4884de16ab72d374dc88bb2\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-6-0e268b98cf" Dec 16 13:18:48.753637 kubelet[1584]: I1216 13:18:48.753597 1584 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.6-6-0e268b98cf" Dec 16 13:18:48.754399 kubelet[1584]: E1216 13:18:48.754362 1584 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://164.92.94.164:6443/api/v1/nodes\": dial tcp 164.92.94.164:6443: connect: connection refused" node="ci-3510.3.6-6-0e268b98cf" Dec 16 13:18:48.833688 kubelet[1584]: E1216 13:18:48.833569 1584 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:18:48.835000 env[1193]: time="2024-12-16T13:18:48.834947802Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.6-6-0e268b98cf,Uid:efe1d386cba527f33fc9033edb9d2be5,Namespace:kube-system,Attempt:0,}" Dec 16 13:18:48.846965 kubelet[1584]: E1216 13:18:48.846921 1584 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:18:48.848166 env[1193]: time="2024-12-16T13:18:48.848105846Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.6-6-0e268b98cf,Uid:c4e3c85a1fc2254f7e2e22a6ca57c115,Namespace:kube-system,Attempt:0,}" Dec 16 13:18:48.851346 kubelet[1584]: E1216 13:18:48.851314 1584 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:18:48.852109 env[1193]: time="2024-12-16T13:18:48.852001926Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.6-6-0e268b98cf,Uid:a016f9c2c4884de16ab72d374dc88bb2,Namespace:kube-system,Attempt:0,}" Dec 16 13:18:48.985618 kubelet[1584]: E1216 13:18:48.985543 1584 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://164.92.94.164:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-6-0e268b98cf?timeout=10s\": dial tcp 164.92.94.164:6443: connect: connection refused" interval="800ms" Dec 16 13:18:49.156588 kubelet[1584]: I1216 13:18:49.156534 1584 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.6-6-0e268b98cf" Dec 16 13:18:49.156915 kubelet[1584]: E1216 13:18:49.156872 1584 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://164.92.94.164:6443/api/v1/nodes\": dial tcp 164.92.94.164:6443: connect: connection refused" node="ci-3510.3.6-6-0e268b98cf" Dec 16 13:18:49.277792 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1766353142.mount: Deactivated successfully. Dec 16 13:18:49.280787 env[1193]: time="2024-12-16T13:18:49.280713980Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:49.284139 env[1193]: time="2024-12-16T13:18:49.284084553Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:49.286144 env[1193]: time="2024-12-16T13:18:49.286082316Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:49.293019 env[1193]: time="2024-12-16T13:18:49.292960244Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:49.299235 env[1193]: time="2024-12-16T13:18:49.299183153Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:49.302745 env[1193]: time="2024-12-16T13:18:49.302691254Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:49.303695 env[1193]: time="2024-12-16T13:18:49.303649599Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:49.305324 env[1193]: time="2024-12-16T13:18:49.305206003Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:49.306559 env[1193]: time="2024-12-16T13:18:49.306523514Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:49.307306 env[1193]: time="2024-12-16T13:18:49.307278044Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:49.307955 env[1193]: time="2024-12-16T13:18:49.307922429Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:49.309563 env[1193]: time="2024-12-16T13:18:49.309523724Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:18:49.347036 env[1193]: time="2024-12-16T13:18:49.346903907Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 16 13:18:49.347036 env[1193]: time="2024-12-16T13:18:49.346952991Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 16 13:18:49.347036 env[1193]: time="2024-12-16T13:18:49.346968949Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 16 13:18:49.347437 env[1193]: time="2024-12-16T13:18:49.347181744Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3d1de9dd61f665dedf58851a8d31ae7724f2113ac740306319a9d6ab6f9f6a9a pid=1621 runtime=io.containerd.runc.v2 Dec 16 13:18:49.350448 env[1193]: time="2024-12-16T13:18:49.350368938Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 16 13:18:49.350673 env[1193]: time="2024-12-16T13:18:49.350648599Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 16 13:18:49.350778 env[1193]: time="2024-12-16T13:18:49.350757445Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 16 13:18:49.351035 env[1193]: time="2024-12-16T13:18:49.351006843Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/137712d6b8f275662cde31700cbe923691da038dca4f03c4a80a9d565b61744b pid=1634 runtime=io.containerd.runc.v2 Dec 16 13:18:49.353940 env[1193]: time="2024-12-16T13:18:49.353827064Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 16 13:18:49.354174 env[1193]: time="2024-12-16T13:18:49.354146665Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 16 13:18:49.354278 env[1193]: time="2024-12-16T13:18:49.354256039Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 16 13:18:49.354629 env[1193]: time="2024-12-16T13:18:49.354581355Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a5e633b08532cad84fc455a397f71481396a3663339e99c0aa810892992d219c pid=1638 runtime=io.containerd.runc.v2 Dec 16 13:18:49.364996 systemd[1]: Started cri-containerd-3d1de9dd61f665dedf58851a8d31ae7724f2113ac740306319a9d6ab6f9f6a9a.scope. Dec 16 13:18:49.394504 systemd[1]: Started cri-containerd-a5e633b08532cad84fc455a397f71481396a3663339e99c0aa810892992d219c.scope. Dec 16 13:18:49.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.396000 audit: BPF prog-id=58 op=LOAD Dec 16 13:18:49.397000 audit[1647]: AVC avc: denied { bpf } for pid=1647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.397000 audit[1647]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1621 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:49.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364316465396464363166363635646564663538383531613864333161 Dec 16 13:18:49.398000 audit[1647]: AVC avc: denied { perfmon } for pid=1647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.398000 audit[1647]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1621 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:49.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364316465396464363166363635646564663538383531613864333161 Dec 16 13:18:49.398000 audit[1647]: AVC avc: denied { bpf } for pid=1647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.398000 audit[1647]: AVC avc: denied { bpf } for pid=1647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.398000 audit[1647]: AVC avc: denied { bpf } for pid=1647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.398000 audit[1647]: AVC avc: denied { perfmon } for pid=1647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.398000 audit[1647]: AVC avc: denied { perfmon } for pid=1647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.398000 audit[1647]: AVC avc: denied { perfmon } for pid=1647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.398000 audit[1647]: AVC avc: denied { perfmon } for pid=1647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.398000 audit[1647]: AVC avc: denied { perfmon } for pid=1647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.398000 audit[1647]: AVC avc: denied { bpf } for pid=1647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.398000 audit[1647]: AVC avc: denied { bpf } for pid=1647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.398000 audit: BPF prog-id=59 op=LOAD Dec 16 13:18:49.398000 audit[1647]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000367910 items=0 ppid=1621 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:49.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364316465396464363166363635646564663538383531613864333161 Dec 16 13:18:49.399000 audit[1647]: AVC avc: denied { bpf } for pid=1647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.399000 audit[1647]: AVC avc: denied { bpf } for pid=1647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.399000 audit[1647]: AVC avc: denied { perfmon } for pid=1647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.399000 audit[1647]: AVC avc: denied { perfmon } for pid=1647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.399000 audit[1647]: AVC avc: denied { perfmon } for pid=1647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.399000 audit[1647]: AVC avc: denied { perfmon } for pid=1647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.399000 audit[1647]: AVC avc: denied { perfmon } for pid=1647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.399000 audit[1647]: AVC avc: denied { bpf } for pid=1647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.399000 audit[1647]: AVC avc: denied { bpf } for pid=1647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.399000 audit: BPF prog-id=60 op=LOAD Dec 16 13:18:49.399000 audit[1647]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000367958 items=0 ppid=1621 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:49.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364316465396464363166363635646564663538383531613864333161 Dec 16 13:18:49.399000 audit: BPF prog-id=60 op=UNLOAD Dec 16 13:18:49.399000 audit: BPF prog-id=59 op=UNLOAD Dec 16 13:18:49.399000 audit[1647]: AVC avc: denied { bpf } for pid=1647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.399000 audit[1647]: AVC avc: denied { bpf } for pid=1647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.399000 audit[1647]: AVC avc: denied { bpf } for pid=1647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.399000 audit[1647]: AVC avc: denied { perfmon } for pid=1647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.399000 audit[1647]: AVC avc: denied { perfmon } for pid=1647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.399000 audit[1647]: AVC avc: denied { perfmon } for pid=1647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.399000 audit[1647]: AVC avc: denied { perfmon } for pid=1647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.399000 audit[1647]: AVC avc: denied { perfmon } for pid=1647 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.399000 audit[1647]: AVC avc: denied { bpf } for pid=1647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.399000 audit[1647]: AVC avc: denied { bpf } for pid=1647 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.399000 audit: BPF prog-id=61 op=LOAD Dec 16 13:18:49.399000 audit[1647]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000367d68 items=0 ppid=1621 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:49.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364316465396464363166363635646564663538383531613864333161 Dec 16 13:18:49.405206 systemd[1]: Started cri-containerd-137712d6b8f275662cde31700cbe923691da038dca4f03c4a80a9d565b61744b.scope. Dec 16 13:18:49.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.432000 audit: BPF prog-id=62 op=LOAD Dec 16 13:18:49.433000 audit[1667]: AVC avc: denied { bpf } for pid=1667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.433000 audit[1667]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1638 pid=1667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:49.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135653633336230383533326361643834666334353561333937663731 Dec 16 13:18:49.433000 audit[1667]: AVC avc: denied { perfmon } for pid=1667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.433000 audit[1667]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1638 pid=1667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:49.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135653633336230383533326361643834666334353561333937663731 Dec 16 13:18:49.433000 audit[1667]: AVC avc: denied { bpf } for pid=1667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.433000 audit[1667]: AVC avc: denied { bpf } for pid=1667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.433000 audit[1667]: AVC avc: denied { bpf } for pid=1667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.433000 audit[1667]: AVC avc: denied { perfmon } for pid=1667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.433000 audit[1667]: AVC avc: denied { perfmon } for pid=1667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.433000 audit[1667]: AVC avc: denied { perfmon } for pid=1667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.433000 audit[1667]: AVC avc: denied { perfmon } for pid=1667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.433000 audit[1667]: AVC avc: denied { perfmon } for pid=1667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.433000 audit[1667]: AVC avc: denied { bpf } for pid=1667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.433000 audit[1667]: AVC avc: denied { bpf } for pid=1667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.433000 audit: BPF prog-id=63 op=LOAD Dec 16 13:18:49.433000 audit[1667]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00034bce0 items=0 ppid=1638 pid=1667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:49.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135653633336230383533326361643834666334353561333937663731 Dec 16 13:18:49.433000 audit[1667]: AVC avc: denied { bpf } for pid=1667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.433000 audit[1667]: AVC avc: denied { bpf } for pid=1667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.433000 audit[1667]: AVC avc: denied { perfmon } for pid=1667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.433000 audit[1667]: AVC avc: denied { perfmon } for pid=1667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.433000 audit[1667]: AVC avc: denied { perfmon } for pid=1667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.433000 audit[1667]: AVC avc: denied { perfmon } for pid=1667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.433000 audit[1667]: AVC avc: denied { perfmon } for pid=1667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.433000 audit[1667]: AVC avc: denied { bpf } for pid=1667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.433000 audit[1667]: AVC avc: denied { bpf } for pid=1667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.433000 audit: BPF prog-id=64 op=LOAD Dec 16 13:18:49.433000 audit[1667]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00034bd28 items=0 ppid=1638 pid=1667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:49.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135653633336230383533326361643834666334353561333937663731 Dec 16 13:18:49.433000 audit: BPF prog-id=64 op=UNLOAD Dec 16 13:18:49.433000 audit: BPF prog-id=63 op=UNLOAD Dec 16 13:18:49.433000 audit[1667]: AVC avc: denied { bpf } for pid=1667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.433000 audit[1667]: AVC avc: denied { bpf } for pid=1667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.433000 audit[1667]: AVC avc: denied { bpf } for pid=1667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.433000 audit[1667]: AVC avc: denied { perfmon } for pid=1667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.433000 audit[1667]: AVC avc: denied { perfmon } for pid=1667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.433000 audit[1667]: AVC avc: denied { perfmon } for pid=1667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.433000 audit[1667]: AVC avc: denied { perfmon } for pid=1667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.433000 audit[1667]: AVC avc: denied { perfmon } for pid=1667 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.433000 audit[1667]: AVC avc: denied { bpf } for pid=1667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.433000 audit[1667]: AVC avc: denied { bpf } for pid=1667 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.433000 audit: BPF prog-id=65 op=LOAD Dec 16 13:18:49.433000 audit[1667]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003ce138 items=0 ppid=1638 pid=1667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:49.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135653633336230383533326361643834666334353561333937663731 Dec 16 13:18:49.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.448000 audit: BPF prog-id=66 op=LOAD Dec 16 13:18:49.449000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.449000 audit[1666]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1634 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:49.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133373731326436623866323735363632636465333137303063626539 Dec 16 13:18:49.449000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.449000 audit[1666]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1634 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:49.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133373731326436623866323735363632636465333137303063626539 Dec 16 13:18:49.449000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.449000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.449000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.449000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.449000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.449000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.449000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.449000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.449000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.449000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.449000 audit: BPF prog-id=67 op=LOAD Dec 16 13:18:49.449000 audit[1666]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000288660 items=0 ppid=1634 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:49.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133373731326436623866323735363632636465333137303063626539 Dec 16 13:18:49.449000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.449000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.449000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.449000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.449000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.449000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.449000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.449000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.449000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.449000 audit: BPF prog-id=68 op=LOAD Dec 16 13:18:49.449000 audit[1666]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002886a8 items=0 ppid=1634 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:49.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133373731326436623866323735363632636465333137303063626539 Dec 16 13:18:49.449000 audit: BPF prog-id=68 op=UNLOAD Dec 16 13:18:49.449000 audit: BPF prog-id=67 op=UNLOAD Dec 16 13:18:49.449000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.449000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.449000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.449000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.449000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.449000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.449000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.449000 audit[1666]: AVC avc: denied { perfmon } for pid=1666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.449000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.449000 audit[1666]: AVC avc: denied { bpf } for pid=1666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.449000 audit: BPF prog-id=69 op=LOAD Dec 16 13:18:49.449000 audit[1666]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000288ab8 items=0 ppid=1634 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:49.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133373731326436623866323735363632636465333137303063626539 Dec 16 13:18:49.481636 env[1193]: time="2024-12-16T13:18:49.481591587Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.6-6-0e268b98cf,Uid:efe1d386cba527f33fc9033edb9d2be5,Namespace:kube-system,Attempt:0,} returns sandbox id \"3d1de9dd61f665dedf58851a8d31ae7724f2113ac740306319a9d6ab6f9f6a9a\"" Dec 16 13:18:49.482952 kubelet[1584]: E1216 13:18:49.482758 1584 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:18:49.489215 env[1193]: time="2024-12-16T13:18:49.489168706Z" level=info msg="CreateContainer within sandbox \"3d1de9dd61f665dedf58851a8d31ae7724f2113ac740306319a9d6ab6f9f6a9a\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 16 13:18:49.499590 env[1193]: time="2024-12-16T13:18:49.499544312Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.6-6-0e268b98cf,Uid:c4e3c85a1fc2254f7e2e22a6ca57c115,Namespace:kube-system,Attempt:0,} returns sandbox id \"a5e633b08532cad84fc455a397f71481396a3663339e99c0aa810892992d219c\"" Dec 16 13:18:49.501573 kubelet[1584]: E1216 13:18:49.501540 1584 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:18:49.503616 env[1193]: time="2024-12-16T13:18:49.503565665Z" level=info msg="CreateContainer within sandbox \"a5e633b08532cad84fc455a397f71481396a3663339e99c0aa810892992d219c\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 16 13:18:49.511285 env[1193]: time="2024-12-16T13:18:49.511215682Z" level=info msg="CreateContainer within sandbox \"3d1de9dd61f665dedf58851a8d31ae7724f2113ac740306319a9d6ab6f9f6a9a\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"8a7ddde79833649e7aa5dd97e3890a963b22a7f45da7feb806942eee14925b69\"" Dec 16 13:18:49.512198 env[1193]: time="2024-12-16T13:18:49.512156093Z" level=info msg="StartContainer for \"8a7ddde79833649e7aa5dd97e3890a963b22a7f45da7feb806942eee14925b69\"" Dec 16 13:18:49.519771 env[1193]: time="2024-12-16T13:18:49.519714173Z" level=info msg="CreateContainer within sandbox \"a5e633b08532cad84fc455a397f71481396a3663339e99c0aa810892992d219c\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"938fe078e00c06f6dd051d56835be379d9e702aab6458ba1aef3456853a9864f\"" Dec 16 13:18:49.520532 env[1193]: time="2024-12-16T13:18:49.520501467Z" level=info msg="StartContainer for \"938fe078e00c06f6dd051d56835be379d9e702aab6458ba1aef3456853a9864f\"" Dec 16 13:18:49.526904 env[1193]: time="2024-12-16T13:18:49.526854357Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.6-6-0e268b98cf,Uid:a016f9c2c4884de16ab72d374dc88bb2,Namespace:kube-system,Attempt:0,} returns sandbox id \"137712d6b8f275662cde31700cbe923691da038dca4f03c4a80a9d565b61744b\"" Dec 16 13:18:49.527901 kubelet[1584]: E1216 13:18:49.527701 1584 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:18:49.529393 env[1193]: time="2024-12-16T13:18:49.529356099Z" level=info msg="CreateContainer within sandbox \"137712d6b8f275662cde31700cbe923691da038dca4f03c4a80a9d565b61744b\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 16 13:18:49.538986 env[1193]: time="2024-12-16T13:18:49.538929569Z" level=info msg="CreateContainer within sandbox \"137712d6b8f275662cde31700cbe923691da038dca4f03c4a80a9d565b61744b\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"ccb6e58de9d1e03b60e945b384fa471eb04d0f1c9da1ee6d9ab559e9605ce6f2\"" Dec 16 13:18:49.539594 env[1193]: time="2024-12-16T13:18:49.539549712Z" level=info msg="StartContainer for \"ccb6e58de9d1e03b60e945b384fa471eb04d0f1c9da1ee6d9ab559e9605ce6f2\"" Dec 16 13:18:49.552670 systemd[1]: Started cri-containerd-8a7ddde79833649e7aa5dd97e3890a963b22a7f45da7feb806942eee14925b69.scope. Dec 16 13:18:49.568964 systemd[1]: Started cri-containerd-938fe078e00c06f6dd051d56835be379d9e702aab6458ba1aef3456853a9864f.scope. Dec 16 13:18:49.587291 kubelet[1584]: W1216 13:18:49.587170 1584 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://164.92.94.164:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 164.92.94.164:6443: connect: connection refused Dec 16 13:18:49.587291 kubelet[1584]: E1216 13:18:49.587253 1584 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://164.92.94.164:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 164.92.94.164:6443: connect: connection refused" logger="UnhandledError" Dec 16 13:18:49.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.586000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.586000 audit: BPF prog-id=70 op=LOAD Dec 16 13:18:49.587000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.587000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1621 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:49.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861376464646537393833333634396537616135646439376533383930 Dec 16 13:18:49.587000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.587000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1621 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:49.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861376464646537393833333634396537616135646439376533383930 Dec 16 13:18:49.587000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.587000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.587000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.587000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.587000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.587000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.587000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.587000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.587000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.587000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.587000 audit: BPF prog-id=71 op=LOAD Dec 16 13:18:49.587000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000219060 items=0 ppid=1621 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:49.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861376464646537393833333634396537616135646439376533383930 Dec 16 13:18:49.587000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.587000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.587000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.587000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.587000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.587000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.587000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.587000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.587000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.587000 audit: BPF prog-id=72 op=LOAD Dec 16 13:18:49.587000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002190a8 items=0 ppid=1621 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:49.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861376464646537393833333634396537616135646439376533383930 Dec 16 13:18:49.587000 audit: BPF prog-id=72 op=UNLOAD Dec 16 13:18:49.587000 audit: BPF prog-id=71 op=UNLOAD Dec 16 13:18:49.587000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.587000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.587000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.587000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.587000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.587000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.587000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.587000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.587000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.587000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.587000 audit: BPF prog-id=73 op=LOAD Dec 16 13:18:49.587000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002194b8 items=0 ppid=1621 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:49.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861376464646537393833333634396537616135646439376533383930 Dec 16 13:18:49.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.599000 audit: BPF prog-id=74 op=LOAD Dec 16 13:18:49.600000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.600000 audit[1761]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1638 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:49.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933386665303738653030633036663664643035316435363833356265 Dec 16 13:18:49.600000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.600000 audit[1761]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1638 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:49.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933386665303738653030633036663664643035316435363833356265 Dec 16 13:18:49.600000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.600000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.600000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.600000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.600000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.600000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.600000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.600000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.600000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.600000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.600000 audit: BPF prog-id=75 op=LOAD Dec 16 13:18:49.600000 audit[1761]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000382b90 items=0 ppid=1638 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:49.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933386665303738653030633036663664643035316435363833356265 Dec 16 13:18:49.600000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.600000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.600000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.600000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.600000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.600000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.600000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.600000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.600000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.600000 audit: BPF prog-id=76 op=LOAD Dec 16 13:18:49.600000 audit[1761]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000382bd8 items=0 ppid=1638 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:49.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933386665303738653030633036663664643035316435363833356265 Dec 16 13:18:49.600000 audit: BPF prog-id=76 op=UNLOAD Dec 16 13:18:49.600000 audit: BPF prog-id=75 op=UNLOAD Dec 16 13:18:49.600000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.600000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.600000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.600000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.600000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.600000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.600000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.600000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.600000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.600000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.600000 audit: BPF prog-id=77 op=LOAD Dec 16 13:18:49.600000 audit[1761]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000382fe8 items=0 ppid=1638 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:49.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933386665303738653030633036663664643035316435363833356265 Dec 16 13:18:49.617560 systemd[1]: Started cri-containerd-ccb6e58de9d1e03b60e945b384fa471eb04d0f1c9da1ee6d9ab559e9605ce6f2.scope. Dec 16 13:18:49.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.652000 audit: BPF prog-id=78 op=LOAD Dec 16 13:18:49.654643 env[1193]: time="2024-12-16T13:18:49.654520346Z" level=info msg="StartContainer for \"8a7ddde79833649e7aa5dd97e3890a963b22a7f45da7feb806942eee14925b69\" returns successfully" Dec 16 13:18:49.654000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.654000 audit[1789]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c7c48 a2=10 a3=1c items=0 ppid=1634 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:49.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363623665353864653964316530336236306539343562333834666134 Dec 16 13:18:49.654000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.654000 audit[1789]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c76b0 a2=3c a3=8 items=0 ppid=1634 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:49.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363623665353864653964316530336236306539343562333834666134 Dec 16 13:18:49.655000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.655000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.655000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.655000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.655000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.655000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.655000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.655000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.655000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.655000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.655000 audit: BPF prog-id=79 op=LOAD Dec 16 13:18:49.655000 audit[1789]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c79d8 a2=78 a3=c000320680 items=0 ppid=1634 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:49.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363623665353864653964316530336236306539343562333834666134 Dec 16 13:18:49.656000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.656000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.656000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.656000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.656000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.656000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.656000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.656000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.656000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.656000 audit: BPF prog-id=80 op=LOAD Dec 16 13:18:49.656000 audit[1789]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c7770 a2=78 a3=c0003206c8 items=0 ppid=1634 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:49.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363623665353864653964316530336236306539343562333834666134 Dec 16 13:18:49.657000 audit: BPF prog-id=80 op=UNLOAD Dec 16 13:18:49.657000 audit: BPF prog-id=79 op=UNLOAD Dec 16 13:18:49.657000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.657000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.657000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.657000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.657000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.657000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.657000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.657000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.657000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.657000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:49.657000 audit: BPF prog-id=81 op=LOAD Dec 16 13:18:49.657000 audit[1789]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c7c30 a2=78 a3=c000320ad8 items=0 ppid=1634 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:49.657000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363623665353864653964316530336236306539343562333834666134 Dec 16 13:18:49.668055 kubelet[1584]: W1216 13:18:49.667921 1584 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://164.92.94.164:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 164.92.94.164:6443: connect: connection refused Dec 16 13:18:49.668055 kubelet[1584]: E1216 13:18:49.668016 1584 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://164.92.94.164:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 164.92.94.164:6443: connect: connection refused" logger="UnhandledError" Dec 16 13:18:49.669418 kubelet[1584]: W1216 13:18:49.669295 1584 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://164.92.94.164:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 164.92.94.164:6443: connect: connection refused Dec 16 13:18:49.669418 kubelet[1584]: E1216 13:18:49.669376 1584 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://164.92.94.164:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 164.92.94.164:6443: connect: connection refused" logger="UnhandledError" Dec 16 13:18:49.677131 env[1193]: time="2024-12-16T13:18:49.676868108Z" level=info msg="StartContainer for \"938fe078e00c06f6dd051d56835be379d9e702aab6458ba1aef3456853a9864f\" returns successfully" Dec 16 13:18:49.720414 env[1193]: time="2024-12-16T13:18:49.720286234Z" level=info msg="StartContainer for \"ccb6e58de9d1e03b60e945b384fa471eb04d0f1c9da1ee6d9ab559e9605ce6f2\" returns successfully" Dec 16 13:18:49.757443 kubelet[1584]: W1216 13:18:49.757338 1584 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://164.92.94.164:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-6-0e268b98cf&limit=500&resourceVersion=0": dial tcp 164.92.94.164:6443: connect: connection refused Dec 16 13:18:49.757647 kubelet[1584]: E1216 13:18:49.757472 1584 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://164.92.94.164:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-6-0e268b98cf&limit=500&resourceVersion=0\": dial tcp 164.92.94.164:6443: connect: connection refused" logger="UnhandledError" Dec 16 13:18:49.958646 kubelet[1584]: I1216 13:18:49.958319 1584 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.6-6-0e268b98cf" Dec 16 13:18:50.424099 kubelet[1584]: E1216 13:18:50.424012 1584 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:18:50.426674 kubelet[1584]: E1216 13:18:50.426633 1584 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:18:50.428401 kubelet[1584]: E1216 13:18:50.428365 1584 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:18:50.660000 audit[1807]: AVC avc: denied { watch } for pid=1807 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:18:50.660000 audit[1807]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ba8000 a2=fc6 a3=0 items=0 ppid=1634 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 key=(null) Dec 16 13:18:50.660000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 16 13:18:50.667000 audit[1807]: AVC avc: denied { watch } for pid=1807 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526361 scontext=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:18:50.667000 audit[1807]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000406000 a2=fc6 a3=0 items=0 ppid=1634 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 key=(null) Dec 16 13:18:50.667000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 16 13:18:51.260000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:18:51.260000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:18:51.260000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0064bb440 a2=fc6 a3=0 items=0 ppid=1621 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 key=(null) Dec 16 13:18:51.260000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c004505e30 a2=fc6 a3=0 items=0 ppid=1621 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 key=(null) Dec 16 13:18:51.260000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39322E39342E313634002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 16 13:18:51.260000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39322E39342E313634002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 16 13:18:51.261000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526361 scontext=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:18:51.261000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c002c491e0 a2=fc6 a3=0 items=0 ppid=1621 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 key=(null) Dec 16 13:18:51.261000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39322E39342E313634002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 16 13:18:51.267000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526369 scontext=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:18:51.267000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c004505f50 a2=fc6 a3=0 items=0 ppid=1621 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 key=(null) Dec 16 13:18:51.267000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39322E39342E313634002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 16 13:18:51.274000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526361 scontext=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:18:51.274000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c0013590c0 a2=fc6 a3=0 items=0 ppid=1621 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 key=(null) Dec 16 13:18:51.274000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39322E39342E313634002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 16 13:18:51.275000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:18:51.275000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c003846d80 a2=fc6 a3=0 items=0 ppid=1621 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 key=(null) Dec 16 13:18:51.275000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39322E39342E313634002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 16 13:18:51.373052 kubelet[1584]: E1216 13:18:51.372976 1584 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.6-6-0e268b98cf\" not found" node="ci-3510.3.6-6-0e268b98cf" Dec 16 13:18:51.429942 kubelet[1584]: E1216 13:18:51.429908 1584 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:18:51.430754 kubelet[1584]: E1216 13:18:51.430729 1584 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:18:51.438308 kubelet[1584]: I1216 13:18:51.438265 1584 kubelet_node_status.go:75] "Successfully registered node" node="ci-3510.3.6-6-0e268b98cf" Dec 16 13:18:51.438533 kubelet[1584]: E1216 13:18:51.438517 1584 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"ci-3510.3.6-6-0e268b98cf\": node \"ci-3510.3.6-6-0e268b98cf\" not found" Dec 16 13:18:51.458723 kubelet[1584]: E1216 13:18:51.458689 1584 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.6-6-0e268b98cf\" not found" Dec 16 13:18:51.560134 kubelet[1584]: E1216 13:18:51.559957 1584 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.6-6-0e268b98cf\" not found" Dec 16 13:18:51.660537 kubelet[1584]: E1216 13:18:51.660490 1584 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.6-6-0e268b98cf\" not found" Dec 16 13:18:51.760744 kubelet[1584]: E1216 13:18:51.760709 1584 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.6-6-0e268b98cf\" not found" Dec 16 13:18:51.862012 kubelet[1584]: E1216 13:18:51.861876 1584 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.6-6-0e268b98cf\" not found" Dec 16 13:18:51.962742 kubelet[1584]: E1216 13:18:51.962669 1584 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.6-6-0e268b98cf\" not found" Dec 16 13:18:52.063544 kubelet[1584]: E1216 13:18:52.063473 1584 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.6-6-0e268b98cf\" not found" Dec 16 13:18:52.164323 kubelet[1584]: E1216 13:18:52.164272 1584 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.6-6-0e268b98cf\" not found" Dec 16 13:18:52.264751 kubelet[1584]: E1216 13:18:52.264703 1584 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.6-6-0e268b98cf\" not found" Dec 16 13:18:52.365929 kubelet[1584]: E1216 13:18:52.365883 1584 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.6-6-0e268b98cf\" not found" Dec 16 13:18:52.432008 kubelet[1584]: E1216 13:18:52.431882 1584 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:18:52.466618 kubelet[1584]: E1216 13:18:52.466569 1584 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.6-6-0e268b98cf\" not found" Dec 16 13:18:52.567138 kubelet[1584]: E1216 13:18:52.567059 1584 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.6-6-0e268b98cf\" not found" Dec 16 13:18:52.667968 kubelet[1584]: E1216 13:18:52.667922 1584 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.6-6-0e268b98cf\" not found" Dec 16 13:18:52.768714 kubelet[1584]: E1216 13:18:52.768561 1584 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.6-6-0e268b98cf\" not found" Dec 16 13:18:53.374967 kubelet[1584]: I1216 13:18:53.374925 1584 apiserver.go:52] "Watching apiserver" Dec 16 13:18:53.379959 kubelet[1584]: I1216 13:18:53.379899 1584 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 16 13:18:53.783282 systemd[1]: Reloading. Dec 16 13:18:53.902839 /usr/lib/systemd/system-generators/torcx-generator[1871]: time="2024-12-16T13:18:53Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 16 13:18:53.903327 /usr/lib/systemd/system-generators/torcx-generator[1871]: time="2024-12-16T13:18:53Z" level=info msg="torcx already run" Dec 16 13:18:53.978104 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 16 13:18:53.978349 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 16 13:18:54.000008 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 16 13:18:54.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.093101 kernel: kauditd_printk_skb: 596 callbacks suppressed Dec 16 13:18:54.093180 kernel: audit: type=1400 audit(1734355134.091:558): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.098151 kernel: audit: type=1400 audit(1734355134.091:559): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.098265 kernel: audit: type=1400 audit(1734355134.091:560): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.104091 kernel: audit: type=1400 audit(1734355134.091:561): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.110740 kernel: audit: type=1400 audit(1734355134.091:562): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.110847 kernel: audit: type=1400 audit(1734355134.091:563): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.110874 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 16 13:18:54.110897 kernel: audit: audit_lost=9 audit_rate_limit=0 audit_backlog_limit=64 Dec 16 13:18:54.110919 kernel: audit: backlog limit exceeded Dec 16 13:18:54.110945 kernel: audit: type=1400 audit(1734355134.091:564): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.094000 audit: BPF prog-id=82 op=LOAD Dec 16 13:18:54.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.094000 audit: BPF prog-id=83 op=LOAD Dec 16 13:18:54.094000 audit: BPF prog-id=43 op=UNLOAD Dec 16 13:18:54.094000 audit: BPF prog-id=44 op=UNLOAD Dec 16 13:18:54.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.095000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.099000 audit: BPF prog-id=84 op=LOAD Dec 16 13:18:54.099000 audit: BPF prog-id=78 op=UNLOAD Dec 16 13:18:54.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.100000 audit: BPF prog-id=85 op=LOAD Dec 16 13:18:54.100000 audit: BPF prog-id=62 op=UNLOAD Dec 16 13:18:54.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.102000 audit: BPF prog-id=86 op=LOAD Dec 16 13:18:54.103000 audit: BPF prog-id=45 op=UNLOAD Dec 16 13:18:54.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.105000 audit: BPF prog-id=87 op=LOAD Dec 16 13:18:54.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.114000 audit: BPF prog-id=46 op=UNLOAD Dec 16 13:18:54.114000 audit: BPF prog-id=47 op=UNLOAD Dec 16 13:18:54.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.115000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.115000 audit: BPF prog-id=89 op=LOAD Dec 16 13:18:54.115000 audit: BPF prog-id=48 op=UNLOAD Dec 16 13:18:54.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.116000 audit: BPF prog-id=90 op=LOAD Dec 16 13:18:54.116000 audit: BPF prog-id=58 op=UNLOAD Dec 16 13:18:54.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.117000 audit: BPF prog-id=91 op=LOAD Dec 16 13:18:54.117000 audit: BPF prog-id=49 op=UNLOAD Dec 16 13:18:54.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.117000 audit: BPF prog-id=92 op=LOAD Dec 16 13:18:54.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.117000 audit: BPF prog-id=93 op=LOAD Dec 16 13:18:54.117000 audit: BPF prog-id=50 op=UNLOAD Dec 16 13:18:54.117000 audit: BPF prog-id=51 op=UNLOAD Dec 16 13:18:54.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.118000 audit: BPF prog-id=94 op=LOAD Dec 16 13:18:54.118000 audit: BPF prog-id=66 op=UNLOAD Dec 16 13:18:54.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.119000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.119000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.119000 audit: BPF prog-id=95 op=LOAD Dec 16 13:18:54.119000 audit: BPF prog-id=52 op=UNLOAD Dec 16 13:18:54.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.120000 audit: BPF prog-id=96 op=LOAD Dec 16 13:18:54.120000 audit: BPF prog-id=53 op=UNLOAD Dec 16 13:18:54.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.121000 audit: BPF prog-id=97 op=LOAD Dec 16 13:18:54.121000 audit: BPF prog-id=54 op=UNLOAD Dec 16 13:18:54.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.123000 audit: BPF prog-id=98 op=LOAD Dec 16 13:18:54.123000 audit: BPF prog-id=70 op=UNLOAD Dec 16 13:18:54.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.123000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.123000 audit: BPF prog-id=99 op=LOAD Dec 16 13:18:54.123000 audit: BPF prog-id=74 op=UNLOAD Dec 16 13:18:54.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.124000 audit: BPF prog-id=100 op=LOAD Dec 16 13:18:54.124000 audit: BPF prog-id=55 op=UNLOAD Dec 16 13:18:54.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.124000 audit: BPF prog-id=101 op=LOAD Dec 16 13:18:54.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:54.124000 audit: BPF prog-id=102 op=LOAD Dec 16 13:18:54.124000 audit: BPF prog-id=56 op=UNLOAD Dec 16 13:18:54.124000 audit: BPF prog-id=57 op=UNLOAD Dec 16 13:18:54.145637 systemd[1]: Stopping kubelet.service... Dec 16 13:18:54.173559 systemd[1]: kubelet.service: Deactivated successfully. Dec 16 13:18:54.173766 systemd[1]: Stopped kubelet.service. Dec 16 13:18:54.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:54.178016 systemd[1]: Starting kubelet.service... Dec 16 13:18:55.174862 systemd[1]: Started kubelet.service. Dec 16 13:18:55.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:18:55.279393 kubelet[1921]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 16 13:18:55.279794 kubelet[1921]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 16 13:18:55.279850 kubelet[1921]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 16 13:18:55.281341 kubelet[1921]: I1216 13:18:55.281226 1921 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 16 13:18:55.302168 kubelet[1921]: I1216 13:18:55.302105 1921 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 16 13:18:55.302444 kubelet[1921]: I1216 13:18:55.302418 1921 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 16 13:18:55.303023 kubelet[1921]: I1216 13:18:55.302988 1921 server.go:929] "Client rotation is on, will bootstrap in background" Dec 16 13:18:55.308494 kubelet[1921]: I1216 13:18:55.308450 1921 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 16 13:18:55.324000 kubelet[1921]: I1216 13:18:55.323950 1921 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 16 13:18:55.331358 kubelet[1921]: E1216 13:18:55.331321 1921 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 16 13:18:55.331557 kubelet[1921]: I1216 13:18:55.331543 1921 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 16 13:18:55.334965 kubelet[1921]: I1216 13:18:55.334914 1921 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 16 13:18:55.335541 kubelet[1921]: I1216 13:18:55.335513 1921 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 16 13:18:55.336097 kubelet[1921]: I1216 13:18:55.336020 1921 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 16 13:18:55.336675 kubelet[1921]: I1216 13:18:55.336357 1921 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.6-6-0e268b98cf","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 16 13:18:55.336933 kubelet[1921]: I1216 13:18:55.336914 1921 topology_manager.go:138] "Creating topology manager with none policy" Dec 16 13:18:55.337042 kubelet[1921]: I1216 13:18:55.337029 1921 container_manager_linux.go:300] "Creating device plugin manager" Dec 16 13:18:55.337222 kubelet[1921]: I1216 13:18:55.337203 1921 state_mem.go:36] "Initialized new in-memory state store" Dec 16 13:18:55.337585 kubelet[1921]: I1216 13:18:55.337558 1921 kubelet.go:408] "Attempting to sync node with API server" Dec 16 13:18:55.338745 kubelet[1921]: I1216 13:18:55.338729 1921 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 16 13:18:55.338875 kubelet[1921]: I1216 13:18:55.338866 1921 kubelet.go:314] "Adding apiserver pod source" Dec 16 13:18:55.342735 kubelet[1921]: I1216 13:18:55.342696 1921 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 16 13:18:55.345374 kubelet[1921]: I1216 13:18:55.345338 1921 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 16 13:18:55.345946 kubelet[1921]: I1216 13:18:55.345915 1921 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 16 13:18:55.350430 kubelet[1921]: I1216 13:18:55.350405 1921 server.go:1269] "Started kubelet" Dec 16 13:18:55.352000 audit[1921]: AVC avc: denied { mac_admin } for pid=1921 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:55.352000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 16 13:18:55.352000 audit[1921]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b7e270 a1=c000967b78 a2=c000b7e240 a3=25 items=0 ppid=1 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:55.352000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 16 13:18:55.353730 kubelet[1921]: I1216 13:18:55.353704 1921 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 16 13:18:55.352000 audit[1921]: AVC avc: denied { mac_admin } for pid=1921 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:55.352000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 16 13:18:55.352000 audit[1921]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b0a6c0 a1=c000967b90 a2=c000b7e300 a3=25 items=0 ppid=1 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:55.352000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 16 13:18:55.354041 kubelet[1921]: I1216 13:18:55.354027 1921 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 16 13:18:55.354162 kubelet[1921]: I1216 13:18:55.354151 1921 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 16 13:18:55.359948 kubelet[1921]: I1216 13:18:55.359876 1921 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 16 13:18:55.381563 kubelet[1921]: I1216 13:18:55.381490 1921 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 16 13:18:55.382036 kubelet[1921]: I1216 13:18:55.382017 1921 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 16 13:18:55.382639 kubelet[1921]: I1216 13:18:55.382601 1921 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 16 13:18:55.387267 kubelet[1921]: I1216 13:18:55.387228 1921 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 16 13:18:55.407918 kubelet[1921]: I1216 13:18:55.387748 1921 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 16 13:18:55.408381 kubelet[1921]: I1216 13:18:55.408362 1921 reconciler.go:26] "Reconciler: start to sync state" Dec 16 13:18:55.408501 kubelet[1921]: I1216 13:18:55.391325 1921 server.go:460] "Adding debug handlers to kubelet server" Dec 16 13:18:55.409530 kubelet[1921]: E1216 13:18:55.388284 1921 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.6-6-0e268b98cf\" not found" Dec 16 13:18:55.410480 kubelet[1921]: I1216 13:18:55.410455 1921 factory.go:221] Registration of the systemd container factory successfully Dec 16 13:18:55.410673 kubelet[1921]: I1216 13:18:55.410650 1921 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 16 13:18:55.423648 kubelet[1921]: E1216 13:18:55.423607 1921 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 16 13:18:55.427502 kubelet[1921]: I1216 13:18:55.426201 1921 factory.go:221] Registration of the containerd container factory successfully Dec 16 13:18:55.428795 kubelet[1921]: I1216 13:18:55.428024 1921 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 16 13:18:55.430819 kubelet[1921]: I1216 13:18:55.430781 1921 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 16 13:18:55.431117 kubelet[1921]: I1216 13:18:55.431049 1921 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 16 13:18:55.431234 kubelet[1921]: I1216 13:18:55.431223 1921 kubelet.go:2321] "Starting kubelet main sync loop" Dec 16 13:18:55.431362 kubelet[1921]: E1216 13:18:55.431340 1921 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 16 13:18:55.509740 kubelet[1921]: I1216 13:18:55.509704 1921 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 16 13:18:55.510038 kubelet[1921]: I1216 13:18:55.510007 1921 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 16 13:18:55.510154 kubelet[1921]: I1216 13:18:55.510050 1921 state_mem.go:36] "Initialized new in-memory state store" Dec 16 13:18:55.511730 kubelet[1921]: I1216 13:18:55.511595 1921 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 16 13:18:55.512746 kubelet[1921]: I1216 13:18:55.511634 1921 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 16 13:18:55.512838 kubelet[1921]: I1216 13:18:55.512760 1921 policy_none.go:49] "None policy: Start" Dec 16 13:18:55.514196 kubelet[1921]: I1216 13:18:55.514124 1921 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 16 13:18:55.514479 kubelet[1921]: I1216 13:18:55.514465 1921 state_mem.go:35] "Initializing new in-memory state store" Dec 16 13:18:55.516534 kubelet[1921]: I1216 13:18:55.516501 1921 state_mem.go:75] "Updated machine memory state" Dec 16 13:18:55.532198 kubelet[1921]: E1216 13:18:55.532135 1921 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 16 13:18:55.546513 kubelet[1921]: I1216 13:18:55.546480 1921 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 16 13:18:55.546000 audit[1921]: AVC avc: denied { mac_admin } for pid=1921 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:18:55.546000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 16 13:18:55.546000 audit[1921]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000fc1e30 a1=c000fffb00 a2=c000fc1e00 a3=25 items=0 ppid=1 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:18:55.546000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 16 13:18:55.547569 kubelet[1921]: I1216 13:18:55.547537 1921 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 16 13:18:55.547917 kubelet[1921]: I1216 13:18:55.547899 1921 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 16 13:18:55.548822 kubelet[1921]: I1216 13:18:55.548762 1921 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 16 13:18:55.549467 kubelet[1921]: I1216 13:18:55.549447 1921 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 16 13:18:55.658685 kubelet[1921]: I1216 13:18:55.658649 1921 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.6-6-0e268b98cf" Dec 16 13:18:55.668218 kubelet[1921]: I1216 13:18:55.668166 1921 kubelet_node_status.go:111] "Node was previously registered" node="ci-3510.3.6-6-0e268b98cf" Dec 16 13:18:55.668530 kubelet[1921]: I1216 13:18:55.668512 1921 kubelet_node_status.go:75] "Successfully registered node" node="ci-3510.3.6-6-0e268b98cf" Dec 16 13:18:55.749335 kubelet[1921]: W1216 13:18:55.749195 1921 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 16 13:18:55.750227 kubelet[1921]: W1216 13:18:55.749484 1921 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 16 13:18:55.750227 kubelet[1921]: W1216 13:18:55.749586 1921 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 16 13:18:55.810634 kubelet[1921]: I1216 13:18:55.810584 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a016f9c2c4884de16ab72d374dc88bb2-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.6-6-0e268b98cf\" (UID: \"a016f9c2c4884de16ab72d374dc88bb2\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-6-0e268b98cf" Dec 16 13:18:55.810634 kubelet[1921]: I1216 13:18:55.810638 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/c4e3c85a1fc2254f7e2e22a6ca57c115-kubeconfig\") pod \"kube-scheduler-ci-3510.3.6-6-0e268b98cf\" (UID: \"c4e3c85a1fc2254f7e2e22a6ca57c115\") " pod="kube-system/kube-scheduler-ci-3510.3.6-6-0e268b98cf" Dec 16 13:18:55.810894 kubelet[1921]: I1216 13:18:55.810665 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/efe1d386cba527f33fc9033edb9d2be5-ca-certs\") pod \"kube-apiserver-ci-3510.3.6-6-0e268b98cf\" (UID: \"efe1d386cba527f33fc9033edb9d2be5\") " pod="kube-system/kube-apiserver-ci-3510.3.6-6-0e268b98cf" Dec 16 13:18:55.810894 kubelet[1921]: I1216 13:18:55.810689 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/efe1d386cba527f33fc9033edb9d2be5-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.6-6-0e268b98cf\" (UID: \"efe1d386cba527f33fc9033edb9d2be5\") " pod="kube-system/kube-apiserver-ci-3510.3.6-6-0e268b98cf" Dec 16 13:18:55.810894 kubelet[1921]: I1216 13:18:55.810715 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a016f9c2c4884de16ab72d374dc88bb2-ca-certs\") pod \"kube-controller-manager-ci-3510.3.6-6-0e268b98cf\" (UID: \"a016f9c2c4884de16ab72d374dc88bb2\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-6-0e268b98cf" Dec 16 13:18:55.810894 kubelet[1921]: I1216 13:18:55.810743 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/a016f9c2c4884de16ab72d374dc88bb2-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.6-6-0e268b98cf\" (UID: \"a016f9c2c4884de16ab72d374dc88bb2\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-6-0e268b98cf" Dec 16 13:18:55.810894 kubelet[1921]: I1216 13:18:55.810766 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a016f9c2c4884de16ab72d374dc88bb2-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.6-6-0e268b98cf\" (UID: \"a016f9c2c4884de16ab72d374dc88bb2\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-6-0e268b98cf" Dec 16 13:18:55.811139 kubelet[1921]: I1216 13:18:55.810783 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a016f9c2c4884de16ab72d374dc88bb2-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.6-6-0e268b98cf\" (UID: \"a016f9c2c4884de16ab72d374dc88bb2\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-6-0e268b98cf" Dec 16 13:18:55.811139 kubelet[1921]: I1216 13:18:55.810798 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/efe1d386cba527f33fc9033edb9d2be5-k8s-certs\") pod \"kube-apiserver-ci-3510.3.6-6-0e268b98cf\" (UID: \"efe1d386cba527f33fc9033edb9d2be5\") " pod="kube-system/kube-apiserver-ci-3510.3.6-6-0e268b98cf" Dec 16 13:18:56.050922 kubelet[1921]: E1216 13:18:56.050772 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:18:56.050922 kubelet[1921]: E1216 13:18:56.050772 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:18:56.051510 kubelet[1921]: E1216 13:18:56.051473 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:18:56.344529 kubelet[1921]: I1216 13:18:56.344388 1921 apiserver.go:52] "Watching apiserver" Dec 16 13:18:56.409232 kubelet[1921]: I1216 13:18:56.409173 1921 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 16 13:18:56.471618 kubelet[1921]: E1216 13:18:56.471576 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:18:56.472677 kubelet[1921]: E1216 13:18:56.472643 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:18:56.487036 kubelet[1921]: W1216 13:18:56.486994 1921 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 16 13:18:56.487268 kubelet[1921]: E1216 13:18:56.487081 1921 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.6-6-0e268b98cf\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.6-6-0e268b98cf" Dec 16 13:18:56.487268 kubelet[1921]: E1216 13:18:56.487257 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:18:56.582732 kubelet[1921]: I1216 13:18:56.582623 1921 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.6-6-0e268b98cf" podStartSLOduration=1.582600898 podStartE2EDuration="1.582600898s" podCreationTimestamp="2024-12-16 13:18:55 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-16 13:18:56.526142575 +0000 UTC m=+1.319619494" watchObservedRunningTime="2024-12-16 13:18:56.582600898 +0000 UTC m=+1.376077827" Dec 16 13:18:56.633575 kubelet[1921]: I1216 13:18:56.633426 1921 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.6-6-0e268b98cf" podStartSLOduration=1.6334078380000001 podStartE2EDuration="1.633407838s" podCreationTimestamp="2024-12-16 13:18:55 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-16 13:18:56.583774399 +0000 UTC m=+1.377251317" watchObservedRunningTime="2024-12-16 13:18:56.633407838 +0000 UTC m=+1.426884755" Dec 16 13:18:57.079000 audit[1807]: AVC avc: denied { watch } for pid=1807 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=526394 scontext=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 16 13:18:57.079000 audit[1807]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00056e7c0 a2=fc6 a3=0 items=0 ppid=1634 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 key=(null) Dec 16 13:18:57.079000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 16 13:18:57.473565 kubelet[1921]: E1216 13:18:57.473517 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:18:57.474426 kubelet[1921]: E1216 13:18:57.474393 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:18:58.092000 audit[1807]: AVC avc: denied { watch } for pid=1807 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526361 scontext=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:18:58.092000 audit[1807]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0016fc1a0 a2=fc6 a3=0 items=0 ppid=1634 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 key=(null) Dec 16 13:18:58.092000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 16 13:18:58.093000 audit[1807]: AVC avc: denied { watch } for pid=1807 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526361 scontext=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:18:58.093000 audit[1807]: AVC avc: denied { watch } for pid=1807 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526361 scontext=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:18:58.093000 audit[1807]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0016fc3e0 a2=fc6 a3=0 items=0 ppid=1634 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 key=(null) Dec 16 13:18:58.093000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 16 13:18:58.093000 audit[1807]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0018e7900 a2=fc6 a3=0 items=0 ppid=1634 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 key=(null) Dec 16 13:18:58.094000 audit[1807]: AVC avc: denied { watch } for pid=1807 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526361 scontext=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:18:58.094000 audit[1807]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0016fc760 a2=fc6 a3=0 items=0 ppid=1634 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 key=(null) Dec 16 13:18:58.094000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 16 13:18:58.093000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 16 13:18:58.476716 kubelet[1921]: E1216 13:18:58.476659 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:18:59.273883 kubelet[1921]: I1216 13:18:59.273843 1921 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 16 13:18:59.274631 env[1193]: time="2024-12-16T13:18:59.274588051Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 16 13:18:59.275628 kubelet[1921]: I1216 13:18:59.275581 1921 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 16 13:18:59.477483 kubelet[1921]: E1216 13:18:59.477432 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:18:59.526483 kubelet[1921]: I1216 13:18:59.526286 1921 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.6-6-0e268b98cf" podStartSLOduration=4.526233274 podStartE2EDuration="4.526233274s" podCreationTimestamp="2024-12-16 13:18:55 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-16 13:18:56.635088002 +0000 UTC m=+1.428564919" watchObservedRunningTime="2024-12-16 13:18:59.526233274 +0000 UTC m=+4.319710195" Dec 16 13:19:00.016208 systemd[1]: Created slice kubepods-besteffort-pod857c91bf_e19a_4027_add9_10e7db583fe5.slice. Dec 16 13:19:00.136884 kubelet[1921]: I1216 13:19:00.136819 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/857c91bf-e19a-4027-add9-10e7db583fe5-xtables-lock\") pod \"kube-proxy-xn6vg\" (UID: \"857c91bf-e19a-4027-add9-10e7db583fe5\") " pod="kube-system/kube-proxy-xn6vg" Dec 16 13:19:00.136884 kubelet[1921]: I1216 13:19:00.136880 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/857c91bf-e19a-4027-add9-10e7db583fe5-kube-proxy\") pod \"kube-proxy-xn6vg\" (UID: \"857c91bf-e19a-4027-add9-10e7db583fe5\") " pod="kube-system/kube-proxy-xn6vg" Dec 16 13:19:00.136884 kubelet[1921]: I1216 13:19:00.136897 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/857c91bf-e19a-4027-add9-10e7db583fe5-lib-modules\") pod \"kube-proxy-xn6vg\" (UID: \"857c91bf-e19a-4027-add9-10e7db583fe5\") " pod="kube-system/kube-proxy-xn6vg" Dec 16 13:19:00.137330 kubelet[1921]: I1216 13:19:00.136915 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9xwsx\" (UniqueName: \"kubernetes.io/projected/857c91bf-e19a-4027-add9-10e7db583fe5-kube-api-access-9xwsx\") pod \"kube-proxy-xn6vg\" (UID: \"857c91bf-e19a-4027-add9-10e7db583fe5\") " pod="kube-system/kube-proxy-xn6vg" Dec 16 13:19:00.256922 kubelet[1921]: I1216 13:19:00.256856 1921 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Dec 16 13:19:00.313445 systemd[1]: Created slice kubepods-besteffort-podb53de199_717b_4b25_b262_fe9b797a9db3.slice. Dec 16 13:19:00.315822 kubelet[1921]: E1216 13:19:00.315785 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:19:00.321869 kubelet[1921]: E1216 13:19:00.321829 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:19:00.322667 env[1193]: time="2024-12-16T13:19:00.322612767Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-xn6vg,Uid:857c91bf-e19a-4027-add9-10e7db583fe5,Namespace:kube-system,Attempt:0,}" Dec 16 13:19:00.348531 env[1193]: time="2024-12-16T13:19:00.348399554Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 16 13:19:00.348531 env[1193]: time="2024-12-16T13:19:00.348479823Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 16 13:19:00.348531 env[1193]: time="2024-12-16T13:19:00.348496458Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 16 13:19:00.351137 env[1193]: time="2024-12-16T13:19:00.349149133Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5d2f6177f8bee6d2fb2a5459351e5cf66d25537505d815c13a5df741917931e7 pid=1988 runtime=io.containerd.runc.v2 Dec 16 13:19:00.385932 systemd[1]: run-containerd-runc-k8s.io-5d2f6177f8bee6d2fb2a5459351e5cf66d25537505d815c13a5df741917931e7-runc.AvGCx6.mount: Deactivated successfully. Dec 16 13:19:00.394247 systemd[1]: Started cri-containerd-5d2f6177f8bee6d2fb2a5459351e5cf66d25537505d815c13a5df741917931e7.scope. Dec 16 13:19:00.423112 kernel: kauditd_printk_skb: 273 callbacks suppressed Dec 16 13:19:00.423262 kernel: audit: type=1400 audit(1734355140.420:807): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.432785 kernel: audit: type=1400 audit(1734355140.420:808): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.432954 kernel: audit: type=1400 audit(1734355140.420:809): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.432986 kernel: audit: type=1400 audit(1734355140.420:810): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.439739 kernel: audit: type=1400 audit(1734355140.420:811): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.440311 kernel: audit: type=1400 audit(1734355140.420:812): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.440435 kubelet[1921]: I1216 13:19:00.439981 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b53de199-717b-4b25-b262-fe9b797a9db3-var-lib-calico\") pod \"tigera-operator-76c4976dd7-5hkhr\" (UID: \"b53de199-717b-4b25-b262-fe9b797a9db3\") " pod="tigera-operator/tigera-operator-76c4976dd7-5hkhr" Dec 16 13:19:00.440435 kubelet[1921]: I1216 13:19:00.440114 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7dlff\" (UniqueName: \"kubernetes.io/projected/b53de199-717b-4b25-b262-fe9b797a9db3-kube-api-access-7dlff\") pod \"tigera-operator-76c4976dd7-5hkhr\" (UID: \"b53de199-717b-4b25-b262-fe9b797a9db3\") " pod="tigera-operator/tigera-operator-76c4976dd7-5hkhr" Dec 16 13:19:00.443128 kernel: audit: type=1400 audit(1734355140.420:813): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.446170 kernel: audit: type=1400 audit(1734355140.420:814): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.452720 kernel: audit: type=1400 audit(1734355140.420:815): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.452787 kernel: audit: type=1400 audit(1734355140.422:816): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.422000 audit: BPF prog-id=103 op=LOAD Dec 16 13:19:00.425000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.425000 audit[1998]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1988 pid=1998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:00.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564326636313737663862656536643266623261353435393335316535 Dec 16 13:19:00.425000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.425000 audit[1998]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1988 pid=1998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:00.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564326636313737663862656536643266623261353435393335316535 Dec 16 13:19:00.429000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.429000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.429000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.429000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.429000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.429000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.429000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.429000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.429000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.429000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.429000 audit: BPF prog-id=104 op=LOAD Dec 16 13:19:00.429000 audit[1998]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002b1640 items=0 ppid=1988 pid=1998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:00.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564326636313737663862656536643266623261353435393335316535 Dec 16 13:19:00.436000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.436000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.436000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.436000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.436000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.436000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.436000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.436000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.436000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.436000 audit: BPF prog-id=105 op=LOAD Dec 16 13:19:00.436000 audit[1998]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002b1688 items=0 ppid=1988 pid=1998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:00.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564326636313737663862656536643266623261353435393335316535 Dec 16 13:19:00.445000 audit: BPF prog-id=105 op=UNLOAD Dec 16 13:19:00.445000 audit: BPF prog-id=104 op=UNLOAD Dec 16 13:19:00.445000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.445000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.445000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.445000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.445000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.445000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.445000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.445000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.445000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.445000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.445000 audit: BPF prog-id=106 op=LOAD Dec 16 13:19:00.445000 audit[1998]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002b1a98 items=0 ppid=1988 pid=1998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:00.445000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564326636313737663862656536643266623261353435393335316535 Dec 16 13:19:00.478018 env[1193]: time="2024-12-16T13:19:00.477954806Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-xn6vg,Uid:857c91bf-e19a-4027-add9-10e7db583fe5,Namespace:kube-system,Attempt:0,} returns sandbox id \"5d2f6177f8bee6d2fb2a5459351e5cf66d25537505d815c13a5df741917931e7\"" Dec 16 13:19:00.480147 kubelet[1921]: E1216 13:19:00.479157 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:19:00.485671 env[1193]: time="2024-12-16T13:19:00.485606748Z" level=info msg="CreateContainer within sandbox \"5d2f6177f8bee6d2fb2a5459351e5cf66d25537505d815c13a5df741917931e7\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 16 13:19:00.495178 kubelet[1921]: E1216 13:19:00.489335 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:19:00.495178 kubelet[1921]: E1216 13:19:00.489667 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:19:00.515920 env[1193]: time="2024-12-16T13:19:00.515852863Z" level=info msg="CreateContainer within sandbox \"5d2f6177f8bee6d2fb2a5459351e5cf66d25537505d815c13a5df741917931e7\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"56739ed3c5a37eea1d6454c27cfc3f4938a13e0bf3a9641c853ef31418c69425\"" Dec 16 13:19:00.518238 env[1193]: time="2024-12-16T13:19:00.518186187Z" level=info msg="StartContainer for \"56739ed3c5a37eea1d6454c27cfc3f4938a13e0bf3a9641c853ef31418c69425\"" Dec 16 13:19:00.567257 systemd[1]: Started cri-containerd-56739ed3c5a37eea1d6454c27cfc3f4938a13e0bf3a9641c853ef31418c69425.scope. Dec 16 13:19:00.601000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.601000 audit[2031]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f879000fad8 items=0 ppid=1988 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:00.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536373339656433633561333765656131643634353463323763666333 Dec 16 13:19:00.601000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.601000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.601000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.601000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.601000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.601000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.601000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.601000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.601000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.601000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.601000 audit: BPF prog-id=107 op=LOAD Dec 16 13:19:00.601000 audit[2031]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0001b6538 items=0 ppid=1988 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:00.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536373339656433633561333765656131643634353463323763666333 Dec 16 13:19:00.602000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.602000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.602000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.602000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.602000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.602000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.602000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.602000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.602000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.602000 audit: BPF prog-id=108 op=LOAD Dec 16 13:19:00.602000 audit[2031]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0001b6588 items=0 ppid=1988 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:00.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536373339656433633561333765656131643634353463323763666333 Dec 16 13:19:00.602000 audit: BPF prog-id=108 op=UNLOAD Dec 16 13:19:00.602000 audit: BPF prog-id=107 op=UNLOAD Dec 16 13:19:00.602000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.602000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.602000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.602000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.602000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.602000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.602000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.602000 audit[2031]: AVC avc: denied { perfmon } for pid=2031 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.602000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.602000 audit[2031]: AVC avc: denied { bpf } for pid=2031 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.602000 audit: BPF prog-id=109 op=LOAD Dec 16 13:19:00.602000 audit[2031]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0001b6618 items=0 ppid=1988 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:00.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536373339656433633561333765656131643634353463323763666333 Dec 16 13:19:00.618795 env[1193]: time="2024-12-16T13:19:00.618730170Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-5hkhr,Uid:b53de199-717b-4b25-b262-fe9b797a9db3,Namespace:tigera-operator,Attempt:0,}" Dec 16 13:19:00.634260 env[1193]: time="2024-12-16T13:19:00.634208534Z" level=info msg="StartContainer for \"56739ed3c5a37eea1d6454c27cfc3f4938a13e0bf3a9641c853ef31418c69425\" returns successfully" Dec 16 13:19:00.643649 env[1193]: time="2024-12-16T13:19:00.643440479Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 16 13:19:00.643861 env[1193]: time="2024-12-16T13:19:00.643666918Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 16 13:19:00.643861 env[1193]: time="2024-12-16T13:19:00.643812666Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 16 13:19:00.644200 env[1193]: time="2024-12-16T13:19:00.644139927Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f9563ac635069900ddb92d2c2cf77a35e8b28c2ab8da022fa4261a8850983fbb pid=2060 runtime=io.containerd.runc.v2 Dec 16 13:19:00.667786 systemd[1]: Started cri-containerd-f9563ac635069900ddb92d2c2cf77a35e8b28c2ab8da022fa4261a8850983fbb.scope. Dec 16 13:19:00.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.689000 audit: BPF prog-id=110 op=LOAD Dec 16 13:19:00.690000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.690000 audit[2071]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2060 pid=2071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:00.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639353633616336333530363939303064646239326432633263663737 Dec 16 13:19:00.690000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.690000 audit[2071]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2060 pid=2071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:00.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639353633616336333530363939303064646239326432633263663737 Dec 16 13:19:00.690000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.690000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.690000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.690000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.690000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.690000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.690000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.690000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.690000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.690000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.690000 audit: BPF prog-id=111 op=LOAD Dec 16 13:19:00.690000 audit[2071]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001ccd80 items=0 ppid=2060 pid=2071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:00.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639353633616336333530363939303064646239326432633263663737 Dec 16 13:19:00.690000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.690000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.690000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.690000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.690000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.690000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.690000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.690000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.690000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.690000 audit: BPF prog-id=112 op=LOAD Dec 16 13:19:00.690000 audit[2071]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001ccdc8 items=0 ppid=2060 pid=2071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:00.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639353633616336333530363939303064646239326432633263663737 Dec 16 13:19:00.690000 audit: BPF prog-id=112 op=UNLOAD Dec 16 13:19:00.690000 audit: BPF prog-id=111 op=UNLOAD Dec 16 13:19:00.690000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.690000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.690000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.690000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.690000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.690000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.690000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.690000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.690000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.690000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:00.690000 audit: BPF prog-id=113 op=LOAD Dec 16 13:19:00.690000 audit[2071]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001cd1d8 items=0 ppid=2060 pid=2071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:00.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639353633616336333530363939303064646239326432633263663737 Dec 16 13:19:00.738300 env[1193]: time="2024-12-16T13:19:00.738238123Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-5hkhr,Uid:b53de199-717b-4b25-b262-fe9b797a9db3,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"f9563ac635069900ddb92d2c2cf77a35e8b28c2ab8da022fa4261a8850983fbb\"" Dec 16 13:19:00.741283 env[1193]: time="2024-12-16T13:19:00.740772229Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 16 13:19:01.007000 audit[2128]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2128 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:01.007000 audit[2128]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff8369cfe0 a2=0 a3=7fff8369cfcc items=0 ppid=2042 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.007000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 16 13:19:01.009000 audit[2129]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2129 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:01.009000 audit[2129]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc2b5aaa30 a2=0 a3=7ffc2b5aaa1c items=0 ppid=2042 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.009000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 16 13:19:01.009000 audit[2130]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2130 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:01.009000 audit[2130]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff6a7c8620 a2=0 a3=7fff6a7c860c items=0 ppid=2042 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.009000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 16 13:19:01.010000 audit[2131]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2131 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:01.010000 audit[2131]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda42cc570 a2=0 a3=7ffda42cc55c items=0 ppid=2042 pid=2131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.010000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 16 13:19:01.011000 audit[2132]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2132 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:01.011000 audit[2132]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd32609500 a2=0 a3=7ffd326094ec items=0 ppid=2042 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.011000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 16 13:19:01.011000 audit[2133]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2133 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:01.011000 audit[2133]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd71b09140 a2=0 a3=7ffd71b0912c items=0 ppid=2042 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.011000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 16 13:19:01.116000 audit[2134]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2134 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:01.116000 audit[2134]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff1ea8f020 a2=0 a3=7fff1ea8f00c items=0 ppid=2042 pid=2134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.116000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 16 13:19:01.120000 audit[2136]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2136 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:01.120000 audit[2136]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff923ee420 a2=0 a3=7fff923ee40c items=0 ppid=2042 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.120000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 16 13:19:01.131000 audit[2140]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2140 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:01.131000 audit[2140]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffcdc84f100 a2=0 a3=7ffcdc84f0ec items=0 ppid=2042 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.131000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 16 13:19:01.133000 audit[2141]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2141 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:01.133000 audit[2141]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc8d27b380 a2=0 a3=7ffc8d27b36c items=0 ppid=2042 pid=2141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.133000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 16 13:19:01.136000 audit[2143]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2143 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:01.136000 audit[2143]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd37fe2600 a2=0 a3=7ffd37fe25ec items=0 ppid=2042 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.136000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 16 13:19:01.138000 audit[2144]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2144 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:01.138000 audit[2144]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe213b6190 a2=0 a3=7ffe213b617c items=0 ppid=2042 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.138000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 16 13:19:01.142000 audit[2146]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2146 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:01.142000 audit[2146]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd8ec9e880 a2=0 a3=7ffd8ec9e86c items=0 ppid=2042 pid=2146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.142000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 16 13:19:01.148000 audit[2149]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2149 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:01.148000 audit[2149]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffec29cce00 a2=0 a3=7ffec29ccdec items=0 ppid=2042 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.148000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 16 13:19:01.150000 audit[2150]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2150 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:01.150000 audit[2150]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed521f7d0 a2=0 a3=7ffed521f7bc items=0 ppid=2042 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.150000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 16 13:19:01.154000 audit[2152]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2152 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:01.154000 audit[2152]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff9b3630f0 a2=0 a3=7fff9b3630dc items=0 ppid=2042 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.154000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 16 13:19:01.156000 audit[2153]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2153 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:01.156000 audit[2153]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffb6be1dc0 a2=0 a3=7fffb6be1dac items=0 ppid=2042 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.156000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 16 13:19:01.161000 audit[2155]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2155 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:01.161000 audit[2155]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc3e5984e0 a2=0 a3=7ffc3e5984cc items=0 ppid=2042 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.161000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 16 13:19:01.167000 audit[2158]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2158 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:01.167000 audit[2158]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe53daf430 a2=0 a3=7ffe53daf41c items=0 ppid=2042 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.167000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 16 13:19:01.172000 audit[2161]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2161 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:01.172000 audit[2161]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff8cd83a80 a2=0 a3=7fff8cd83a6c items=0 ppid=2042 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.172000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 16 13:19:01.174000 audit[2162]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2162 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:01.174000 audit[2162]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffee5e982c0 a2=0 a3=7ffee5e982ac items=0 ppid=2042 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.174000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 16 13:19:01.179000 audit[2164]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2164 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:01.179000 audit[2164]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffe1e307960 a2=0 a3=7ffe1e30794c items=0 ppid=2042 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.179000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 16 13:19:01.185000 audit[2167]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2167 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:01.185000 audit[2167]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffba92d070 a2=0 a3=7fffba92d05c items=0 ppid=2042 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.185000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 16 13:19:01.188000 audit[2168]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2168 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:01.188000 audit[2168]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff993b5a70 a2=0 a3=7fff993b5a5c items=0 ppid=2042 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.188000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 16 13:19:01.193000 audit[2170]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2170 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 16 13:19:01.193000 audit[2170]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd61ea44b0 a2=0 a3=7ffd61ea449c items=0 ppid=2042 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.193000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 16 13:19:01.234000 audit[2176]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2176 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:01.234000 audit[2176]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc4b8ad070 a2=0 a3=7ffc4b8ad05c items=0 ppid=2042 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.234000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:01.246000 audit[2176]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2176 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:01.246000 audit[2176]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffc4b8ad070 a2=0 a3=7ffc4b8ad05c items=0 ppid=2042 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.246000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:01.249000 audit[2181]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2181 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:01.249000 audit[2181]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff50c85f30 a2=0 a3=7fff50c85f1c items=0 ppid=2042 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.249000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 16 13:19:01.256000 audit[2183]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2183 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:01.256000 audit[2183]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdf8582bf0 a2=0 a3=7ffdf8582bdc items=0 ppid=2042 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.256000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 16 13:19:01.264000 audit[2186]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2186 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:01.264000 audit[2186]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcb9efbe10 a2=0 a3=7ffcb9efbdfc items=0 ppid=2042 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.264000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 16 13:19:01.266000 audit[2187]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2187 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:01.266000 audit[2187]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3fc733e0 a2=0 a3=7ffe3fc733cc items=0 ppid=2042 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.266000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 16 13:19:01.278000 audit[2189]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2189 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:01.278000 audit[2189]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd02706390 a2=0 a3=7ffd0270637c items=0 ppid=2042 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.278000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 16 13:19:01.281000 audit[2190]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2190 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:01.281000 audit[2190]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc6646a50 a2=0 a3=7ffcc6646a3c items=0 ppid=2042 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.281000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 16 13:19:01.286000 audit[2192]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2192 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:01.286000 audit[2192]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc1d476aa0 a2=0 a3=7ffc1d476a8c items=0 ppid=2042 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.286000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 16 13:19:01.291000 audit[2195]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2195 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:01.291000 audit[2195]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd579bd800 a2=0 a3=7ffd579bd7ec items=0 ppid=2042 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.291000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 16 13:19:01.293000 audit[2196]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2196 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:01.293000 audit[2196]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc1d2f9ed0 a2=0 a3=7ffc1d2f9ebc items=0 ppid=2042 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.293000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 16 13:19:01.297000 audit[2198]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2198 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:01.297000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe4f8622e0 a2=0 a3=7ffe4f8622cc items=0 ppid=2042 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.297000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 16 13:19:01.299000 audit[2199]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2199 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:01.299000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc427ef50 a2=0 a3=7fffc427ef3c items=0 ppid=2042 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.299000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 16 13:19:01.303000 audit[2201]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2201 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:01.303000 audit[2201]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc95826220 a2=0 a3=7ffc9582620c items=0 ppid=2042 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.303000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 16 13:19:01.309000 audit[2204]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2204 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:01.309000 audit[2204]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe0b910ee0 a2=0 a3=7ffe0b910ecc items=0 ppid=2042 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.309000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 16 13:19:01.314000 audit[2207]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2207 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:01.314000 audit[2207]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffbd1f8e60 a2=0 a3=7fffbd1f8e4c items=0 ppid=2042 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.314000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 16 13:19:01.315000 audit[2208]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2208 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:01.315000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffeab02c8c0 a2=0 a3=7ffeab02c8ac items=0 ppid=2042 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.315000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 16 13:19:01.320000 audit[2210]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2210 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:01.320000 audit[2210]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffef2816410 a2=0 a3=7ffef28163fc items=0 ppid=2042 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.320000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 16 13:19:01.326000 audit[2213]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2213 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:01.326000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffef6c39760 a2=0 a3=7ffef6c3974c items=0 ppid=2042 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.326000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 16 13:19:01.328000 audit[2214]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:01.328000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff3bbd500 a2=0 a3=7ffff3bbd4ec items=0 ppid=2042 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.328000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 16 13:19:01.332000 audit[2216]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2216 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:01.332000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff393d8070 a2=0 a3=7fff393d805c items=0 ppid=2042 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.332000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 16 13:19:01.333000 audit[2217]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:01.333000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdfe8d7da0 a2=0 a3=7ffdfe8d7d8c items=0 ppid=2042 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.333000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 16 13:19:01.341000 audit[2219]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2219 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:01.341000 audit[2219]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe153b0f80 a2=0 a3=7ffe153b0f6c items=0 ppid=2042 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.341000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 16 13:19:01.349000 audit[2222]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2222 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 16 13:19:01.349000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff31de1e30 a2=0 a3=7fff31de1e1c items=0 ppid=2042 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.349000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 16 13:19:01.354000 audit[2224]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2224 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 16 13:19:01.354000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fffeeecdf80 a2=0 a3=7fffeeecdf6c items=0 ppid=2042 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.354000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:01.354000 audit[2224]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2224 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 16 13:19:01.354000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fffeeecdf80 a2=0 a3=7fffeeecdf6c items=0 ppid=2042 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:01.354000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:01.498152 kubelet[1921]: E1216 13:19:01.498015 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:19:01.799180 sudo[1331]: pam_unix(sudo:session): session closed for user root Dec 16 13:19:01.798000 audit[1331]: USER_END pid=1331 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 16 13:19:01.799000 audit[1331]: CRED_DISP pid=1331 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 16 13:19:01.806709 sshd[1327]: pam_unix(sshd:session): session closed for user core Dec 16 13:19:01.807000 audit[1327]: USER_END pid=1327 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:01.807000 audit[1327]: CRED_DISP pid=1327 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:01.811004 systemd[1]: sshd@6-164.92.94.164:22-139.178.89.65:60984.service: Deactivated successfully. Dec 16 13:19:01.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-164.92.94.164:22-139.178.89.65:60984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:01.811941 systemd[1]: session-7.scope: Deactivated successfully. Dec 16 13:19:01.812115 systemd[1]: session-7.scope: Consumed 6.031s CPU time. Dec 16 13:19:01.813046 systemd-logind[1181]: Session 7 logged out. Waiting for processes to exit. Dec 16 13:19:01.814188 systemd-logind[1181]: Removed session 7. Dec 16 13:19:02.509466 kubelet[1921]: E1216 13:19:02.509422 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:19:08.314816 kubelet[1921]: E1216 13:19:08.314768 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:19:08.334601 kubelet[1921]: I1216 13:19:08.334514 1921 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-xn6vg" podStartSLOduration=9.334484708 podStartE2EDuration="9.334484708s" podCreationTimestamp="2024-12-16 13:18:59 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-16 13:19:01.519574337 +0000 UTC m=+6.313051252" watchObservedRunningTime="2024-12-16 13:19:08.334484708 +0000 UTC m=+13.127961903" Dec 16 13:19:08.523014 kubelet[1921]: E1216 13:19:08.522953 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:19:10.957501 update_engine[1182]: I1216 13:19:10.957379 1182 update_attempter.cc:509] Updating boot flags... Dec 16 13:19:11.175811 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3706116750.mount: Deactivated successfully. Dec 16 13:19:11.954023 env[1193]: time="2024-12-16T13:19:11.953924993Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:11.955797 env[1193]: time="2024-12-16T13:19:11.955756111Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:11.957872 env[1193]: time="2024-12-16T13:19:11.957817544Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:11.959838 env[1193]: time="2024-12-16T13:19:11.959762228Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:11.960590 env[1193]: time="2024-12-16T13:19:11.960551178Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 16 13:19:11.985963 env[1193]: time="2024-12-16T13:19:11.985899337Z" level=info msg="CreateContainer within sandbox \"f9563ac635069900ddb92d2c2cf77a35e8b28c2ab8da022fa4261a8850983fbb\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 16 13:19:12.002343 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4288181263.mount: Deactivated successfully. Dec 16 13:19:12.008907 env[1193]: time="2024-12-16T13:19:12.008845762Z" level=info msg="CreateContainer within sandbox \"f9563ac635069900ddb92d2c2cf77a35e8b28c2ab8da022fa4261a8850983fbb\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"064f5078705b8a983efed8d5bbcc07aaa7bbfe5ddd672e7f7464fa24f35b7337\"" Dec 16 13:19:12.010032 env[1193]: time="2024-12-16T13:19:12.009963734Z" level=info msg="StartContainer for \"064f5078705b8a983efed8d5bbcc07aaa7bbfe5ddd672e7f7464fa24f35b7337\"" Dec 16 13:19:12.034299 systemd[1]: Started cri-containerd-064f5078705b8a983efed8d5bbcc07aaa7bbfe5ddd672e7f7464fa24f35b7337.scope. Dec 16 13:19:12.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.093089 kernel: kauditd_printk_skb: 305 callbacks suppressed Dec 16 13:19:12.093258 kernel: audit: type=1400 audit(1734355152.091:905): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.100044 kernel: audit: type=1400 audit(1734355152.091:906): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.107156 kernel: audit: type=1400 audit(1734355152.091:907): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.107339 kernel: audit: type=1400 audit(1734355152.091:908): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.107569 kernel: audit: type=1400 audit(1734355152.091:909): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.117534 kernel: audit: type=1400 audit(1734355152.091:910): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.124213 kernel: audit: type=1400 audit(1734355152.091:911): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.124349 kernel: audit: type=1400 audit(1734355152.091:912): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.131150 kernel: audit: type=1400 audit(1734355152.091:913): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.134915 kernel: audit: type=1400 audit(1734355152.091:914): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.091000 audit: BPF prog-id=114 op=LOAD Dec 16 13:19:12.092000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.092000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2060 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:12.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036346635303738373035623861393833656665643864356262636330 Dec 16 13:19:12.092000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.092000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2060 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:12.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036346635303738373035623861393833656665643864356262636330 Dec 16 13:19:12.092000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.092000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.092000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.092000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.092000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.092000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.092000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.092000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.092000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.092000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.092000 audit: BPF prog-id=115 op=LOAD Dec 16 13:19:12.092000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00021e1e0 items=0 ppid=2060 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:12.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036346635303738373035623861393833656665643864356262636330 Dec 16 13:19:12.096000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.096000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.096000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.096000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.096000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.096000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.096000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.096000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.096000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.096000 audit: BPF prog-id=116 op=LOAD Dec 16 13:19:12.096000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00021e228 items=0 ppid=2060 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:12.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036346635303738373035623861393833656665643864356262636330 Dec 16 13:19:12.099000 audit: BPF prog-id=116 op=UNLOAD Dec 16 13:19:12.099000 audit: BPF prog-id=115 op=UNLOAD Dec 16 13:19:12.099000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.099000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.099000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.099000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.099000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.099000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.099000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.099000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.099000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.099000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:12.099000 audit: BPF prog-id=117 op=LOAD Dec 16 13:19:12.099000 audit[2264]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00021e638 items=0 ppid=2060 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:12.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036346635303738373035623861393833656665643864356262636330 Dec 16 13:19:12.149603 env[1193]: time="2024-12-16T13:19:12.149538076Z" level=info msg="StartContainer for \"064f5078705b8a983efed8d5bbcc07aaa7bbfe5ddd672e7f7464fa24f35b7337\" returns successfully" Dec 16 13:19:15.115000 audit[2296]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2296 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:15.115000 audit[2296]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe18429e60 a2=0 a3=7ffe18429e4c items=0 ppid=2042 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:15.115000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:15.118000 audit[2296]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2296 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:15.118000 audit[2296]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe18429e60 a2=0 a3=0 items=0 ppid=2042 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:15.118000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:15.131000 audit[2298]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2298 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:15.131000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc9bf51920 a2=0 a3=7ffc9bf5190c items=0 ppid=2042 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:15.131000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:15.138000 audit[2298]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2298 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:15.138000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc9bf51920 a2=0 a3=0 items=0 ppid=2042 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:15.138000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:15.268593 kubelet[1921]: I1216 13:19:15.268503 1921 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-76c4976dd7-5hkhr" podStartSLOduration=4.042316776 podStartE2EDuration="15.26848124s" podCreationTimestamp="2024-12-16 13:19:00 +0000 UTC" firstStartedPulling="2024-12-16 13:19:00.739848693 +0000 UTC m=+5.533325605" lastFinishedPulling="2024-12-16 13:19:11.966012938 +0000 UTC m=+16.759490069" observedRunningTime="2024-12-16 13:19:12.546571852 +0000 UTC m=+17.340048770" watchObservedRunningTime="2024-12-16 13:19:15.26848124 +0000 UTC m=+20.061958159" Dec 16 13:19:15.283705 systemd[1]: Created slice kubepods-besteffort-pod52fd151f_c9dd_4dab_978c_5d58c084b28a.slice. Dec 16 13:19:15.396340 systemd[1]: Created slice kubepods-besteffort-podc54c8bdd_0cfc_4868_8aa4_f1aba1dfc109.slice. Dec 16 13:19:15.459270 kubelet[1921]: I1216 13:19:15.459205 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/52fd151f-c9dd-4dab-978c-5d58c084b28a-typha-certs\") pod \"calico-typha-569ddb9599-dl9kn\" (UID: \"52fd151f-c9dd-4dab-978c-5d58c084b28a\") " pod="calico-system/calico-typha-569ddb9599-dl9kn" Dec 16 13:19:15.459525 kubelet[1921]: I1216 13:19:15.459313 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/52fd151f-c9dd-4dab-978c-5d58c084b28a-tigera-ca-bundle\") pod \"calico-typha-569ddb9599-dl9kn\" (UID: \"52fd151f-c9dd-4dab-978c-5d58c084b28a\") " pod="calico-system/calico-typha-569ddb9599-dl9kn" Dec 16 13:19:15.459596 kubelet[1921]: I1216 13:19:15.459503 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p85j8\" (UniqueName: \"kubernetes.io/projected/52fd151f-c9dd-4dab-978c-5d58c084b28a-kube-api-access-p85j8\") pod \"calico-typha-569ddb9599-dl9kn\" (UID: \"52fd151f-c9dd-4dab-978c-5d58c084b28a\") " pod="calico-system/calico-typha-569ddb9599-dl9kn" Dec 16 13:19:15.562781 kubelet[1921]: I1216 13:19:15.562722 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/c54c8bdd-0cfc-4868-8aa4-f1aba1dfc109-cni-net-dir\") pod \"calico-node-zzqjq\" (UID: \"c54c8bdd-0cfc-4868-8aa4-f1aba1dfc109\") " pod="calico-system/calico-node-zzqjq" Dec 16 13:19:15.563710 kubelet[1921]: I1216 13:19:15.563434 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/c54c8bdd-0cfc-4868-8aa4-f1aba1dfc109-cni-log-dir\") pod \"calico-node-zzqjq\" (UID: \"c54c8bdd-0cfc-4868-8aa4-f1aba1dfc109\") " pod="calico-system/calico-node-zzqjq" Dec 16 13:19:15.563887 kubelet[1921]: I1216 13:19:15.563739 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/c54c8bdd-0cfc-4868-8aa4-f1aba1dfc109-flexvol-driver-host\") pod \"calico-node-zzqjq\" (UID: \"c54c8bdd-0cfc-4868-8aa4-f1aba1dfc109\") " pod="calico-system/calico-node-zzqjq" Dec 16 13:19:15.563887 kubelet[1921]: I1216 13:19:15.563809 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c54c8bdd-0cfc-4868-8aa4-f1aba1dfc109-lib-modules\") pod \"calico-node-zzqjq\" (UID: \"c54c8bdd-0cfc-4868-8aa4-f1aba1dfc109\") " pod="calico-system/calico-node-zzqjq" Dec 16 13:19:15.563988 kubelet[1921]: I1216 13:19:15.563891 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c54c8bdd-0cfc-4868-8aa4-f1aba1dfc109-xtables-lock\") pod \"calico-node-zzqjq\" (UID: \"c54c8bdd-0cfc-4868-8aa4-f1aba1dfc109\") " pod="calico-system/calico-node-zzqjq" Dec 16 13:19:15.563988 kubelet[1921]: I1216 13:19:15.563934 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/c54c8bdd-0cfc-4868-8aa4-f1aba1dfc109-var-run-calico\") pod \"calico-node-zzqjq\" (UID: \"c54c8bdd-0cfc-4868-8aa4-f1aba1dfc109\") " pod="calico-system/calico-node-zzqjq" Dec 16 13:19:15.564099 kubelet[1921]: I1216 13:19:15.564032 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/c54c8bdd-0cfc-4868-8aa4-f1aba1dfc109-cni-bin-dir\") pod \"calico-node-zzqjq\" (UID: \"c54c8bdd-0cfc-4868-8aa4-f1aba1dfc109\") " pod="calico-system/calico-node-zzqjq" Dec 16 13:19:15.564099 kubelet[1921]: I1216 13:19:15.564070 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/c54c8bdd-0cfc-4868-8aa4-f1aba1dfc109-policysync\") pod \"calico-node-zzqjq\" (UID: \"c54c8bdd-0cfc-4868-8aa4-f1aba1dfc109\") " pod="calico-system/calico-node-zzqjq" Dec 16 13:19:15.564187 kubelet[1921]: I1216 13:19:15.564143 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c54c8bdd-0cfc-4868-8aa4-f1aba1dfc109-tigera-ca-bundle\") pod \"calico-node-zzqjq\" (UID: \"c54c8bdd-0cfc-4868-8aa4-f1aba1dfc109\") " pod="calico-system/calico-node-zzqjq" Dec 16 13:19:15.564187 kubelet[1921]: I1216 13:19:15.564189 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/c54c8bdd-0cfc-4868-8aa4-f1aba1dfc109-node-certs\") pod \"calico-node-zzqjq\" (UID: \"c54c8bdd-0cfc-4868-8aa4-f1aba1dfc109\") " pod="calico-system/calico-node-zzqjq" Dec 16 13:19:15.564295 kubelet[1921]: I1216 13:19:15.564216 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-whsx7\" (UniqueName: \"kubernetes.io/projected/c54c8bdd-0cfc-4868-8aa4-f1aba1dfc109-kube-api-access-whsx7\") pod \"calico-node-zzqjq\" (UID: \"c54c8bdd-0cfc-4868-8aa4-f1aba1dfc109\") " pod="calico-system/calico-node-zzqjq" Dec 16 13:19:15.564295 kubelet[1921]: I1216 13:19:15.564243 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/c54c8bdd-0cfc-4868-8aa4-f1aba1dfc109-var-lib-calico\") pod \"calico-node-zzqjq\" (UID: \"c54c8bdd-0cfc-4868-8aa4-f1aba1dfc109\") " pod="calico-system/calico-node-zzqjq" Dec 16 13:19:15.667696 kubelet[1921]: E1216 13:19:15.667565 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.667923 kubelet[1921]: W1216 13:19:15.667897 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.668052 kubelet[1921]: E1216 13:19:15.668032 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.668519 kubelet[1921]: E1216 13:19:15.668499 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.668657 kubelet[1921]: W1216 13:19:15.668640 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.668754 kubelet[1921]: E1216 13:19:15.668739 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.669095 kubelet[1921]: E1216 13:19:15.669081 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.669227 kubelet[1921]: W1216 13:19:15.669211 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.669390 kubelet[1921]: E1216 13:19:15.669344 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.675424 kubelet[1921]: E1216 13:19:15.675232 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.675678 kubelet[1921]: W1216 13:19:15.675654 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.675796 kubelet[1921]: E1216 13:19:15.675778 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.676300 kubelet[1921]: E1216 13:19:15.676261 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.676300 kubelet[1921]: W1216 13:19:15.676294 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.676469 kubelet[1921]: E1216 13:19:15.676323 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.687306 kubelet[1921]: E1216 13:19:15.681920 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.687306 kubelet[1921]: W1216 13:19:15.681955 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.687306 kubelet[1921]: E1216 13:19:15.681985 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.689729 kubelet[1921]: E1216 13:19:15.688602 1921 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ccvcz" podUID="cb5cda6c-0e08-4930-b912-35225d86fb7c" Dec 16 13:19:15.729154 kubelet[1921]: E1216 13:19:15.721893 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.729154 kubelet[1921]: W1216 13:19:15.721931 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.729154 kubelet[1921]: E1216 13:19:15.721962 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.764552 kubelet[1921]: E1216 13:19:15.764499 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.764552 kubelet[1921]: W1216 13:19:15.764539 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.764807 kubelet[1921]: E1216 13:19:15.764574 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.764898 kubelet[1921]: E1216 13:19:15.764877 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.764898 kubelet[1921]: W1216 13:19:15.764896 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.765220 kubelet[1921]: E1216 13:19:15.764913 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.765300 kubelet[1921]: E1216 13:19:15.765280 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.765300 kubelet[1921]: W1216 13:19:15.765298 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.765399 kubelet[1921]: E1216 13:19:15.765322 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.765626 kubelet[1921]: E1216 13:19:15.765601 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.765626 kubelet[1921]: W1216 13:19:15.765620 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.765626 kubelet[1921]: E1216 13:19:15.765634 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.765939 kubelet[1921]: E1216 13:19:15.765920 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.765939 kubelet[1921]: W1216 13:19:15.765936 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.766048 kubelet[1921]: E1216 13:19:15.765951 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.766231 kubelet[1921]: E1216 13:19:15.766213 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.766302 kubelet[1921]: W1216 13:19:15.766229 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.766302 kubelet[1921]: E1216 13:19:15.766252 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.766510 kubelet[1921]: E1216 13:19:15.766492 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.766510 kubelet[1921]: W1216 13:19:15.766509 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.766622 kubelet[1921]: E1216 13:19:15.766524 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.766789 kubelet[1921]: E1216 13:19:15.766772 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.766789 kubelet[1921]: W1216 13:19:15.766787 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.766913 kubelet[1921]: E1216 13:19:15.766802 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.767148 kubelet[1921]: E1216 13:19:15.767128 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.767148 kubelet[1921]: W1216 13:19:15.767146 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.767257 kubelet[1921]: E1216 13:19:15.767168 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.767445 kubelet[1921]: E1216 13:19:15.767427 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.767445 kubelet[1921]: W1216 13:19:15.767444 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.767558 kubelet[1921]: E1216 13:19:15.767459 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.767733 kubelet[1921]: E1216 13:19:15.767715 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.767733 kubelet[1921]: W1216 13:19:15.767731 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.767859 kubelet[1921]: E1216 13:19:15.767746 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.768026 kubelet[1921]: E1216 13:19:15.768008 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.768026 kubelet[1921]: W1216 13:19:15.768025 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.768156 kubelet[1921]: E1216 13:19:15.768040 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.768372 kubelet[1921]: E1216 13:19:15.768354 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.768372 kubelet[1921]: W1216 13:19:15.768369 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.768485 kubelet[1921]: E1216 13:19:15.768382 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.768608 kubelet[1921]: E1216 13:19:15.768592 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.768681 kubelet[1921]: W1216 13:19:15.768606 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.768681 kubelet[1921]: E1216 13:19:15.768626 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.768877 kubelet[1921]: E1216 13:19:15.768849 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.768877 kubelet[1921]: W1216 13:19:15.768871 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.768977 kubelet[1921]: E1216 13:19:15.768884 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.771381 kubelet[1921]: E1216 13:19:15.771340 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.771381 kubelet[1921]: W1216 13:19:15.771368 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.771601 kubelet[1921]: E1216 13:19:15.771393 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.771820 kubelet[1921]: E1216 13:19:15.771789 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.771820 kubelet[1921]: W1216 13:19:15.771819 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.771938 kubelet[1921]: E1216 13:19:15.771837 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.772164 kubelet[1921]: E1216 13:19:15.772142 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.772164 kubelet[1921]: W1216 13:19:15.772160 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.772288 kubelet[1921]: E1216 13:19:15.772175 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.772464 kubelet[1921]: E1216 13:19:15.772446 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.772464 kubelet[1921]: W1216 13:19:15.772462 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.772569 kubelet[1921]: E1216 13:19:15.772478 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.772725 kubelet[1921]: E1216 13:19:15.772705 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.772725 kubelet[1921]: W1216 13:19:15.772720 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.772826 kubelet[1921]: E1216 13:19:15.772734 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.773209 kubelet[1921]: E1216 13:19:15.773161 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.773209 kubelet[1921]: W1216 13:19:15.773181 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.773209 kubelet[1921]: E1216 13:19:15.773210 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.773401 kubelet[1921]: I1216 13:19:15.773246 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/cb5cda6c-0e08-4930-b912-35225d86fb7c-registration-dir\") pod \"csi-node-driver-ccvcz\" (UID: \"cb5cda6c-0e08-4930-b912-35225d86fb7c\") " pod="calico-system/csi-node-driver-ccvcz" Dec 16 13:19:15.773523 kubelet[1921]: E1216 13:19:15.773499 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.773523 kubelet[1921]: W1216 13:19:15.773522 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.773629 kubelet[1921]: E1216 13:19:15.773543 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.773629 kubelet[1921]: I1216 13:19:15.773573 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/cb5cda6c-0e08-4930-b912-35225d86fb7c-kubelet-dir\") pod \"csi-node-driver-ccvcz\" (UID: \"cb5cda6c-0e08-4930-b912-35225d86fb7c\") " pod="calico-system/csi-node-driver-ccvcz" Dec 16 13:19:15.773877 kubelet[1921]: E1216 13:19:15.773855 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.773877 kubelet[1921]: W1216 13:19:15.773876 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.774002 kubelet[1921]: E1216 13:19:15.773896 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.774002 kubelet[1921]: I1216 13:19:15.773922 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/cb5cda6c-0e08-4930-b912-35225d86fb7c-socket-dir\") pod \"csi-node-driver-ccvcz\" (UID: \"cb5cda6c-0e08-4930-b912-35225d86fb7c\") " pod="calico-system/csi-node-driver-ccvcz" Dec 16 13:19:15.774195 kubelet[1921]: E1216 13:19:15.774173 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.774270 kubelet[1921]: W1216 13:19:15.774195 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.774270 kubelet[1921]: E1216 13:19:15.774212 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.774270 kubelet[1921]: I1216 13:19:15.774235 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rdgnw\" (UniqueName: \"kubernetes.io/projected/cb5cda6c-0e08-4930-b912-35225d86fb7c-kube-api-access-rdgnw\") pod \"csi-node-driver-ccvcz\" (UID: \"cb5cda6c-0e08-4930-b912-35225d86fb7c\") " pod="calico-system/csi-node-driver-ccvcz" Dec 16 13:19:15.774510 kubelet[1921]: E1216 13:19:15.774491 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.774510 kubelet[1921]: W1216 13:19:15.774508 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.774637 kubelet[1921]: E1216 13:19:15.774527 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.774637 kubelet[1921]: I1216 13:19:15.774553 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/cb5cda6c-0e08-4930-b912-35225d86fb7c-varrun\") pod \"csi-node-driver-ccvcz\" (UID: \"cb5cda6c-0e08-4930-b912-35225d86fb7c\") " pod="calico-system/csi-node-driver-ccvcz" Dec 16 13:19:15.774848 kubelet[1921]: E1216 13:19:15.774827 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.774848 kubelet[1921]: W1216 13:19:15.774845 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.775262 kubelet[1921]: E1216 13:19:15.774962 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.775262 kubelet[1921]: E1216 13:19:15.775214 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.775262 kubelet[1921]: W1216 13:19:15.775227 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.775479 kubelet[1921]: E1216 13:19:15.775447 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.775479 kubelet[1921]: E1216 13:19:15.775465 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.775576 kubelet[1921]: W1216 13:19:15.775481 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.775576 kubelet[1921]: E1216 13:19:15.775505 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.775766 kubelet[1921]: E1216 13:19:15.775746 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.775766 kubelet[1921]: W1216 13:19:15.775762 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.775882 kubelet[1921]: E1216 13:19:15.775782 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.776230 kubelet[1921]: E1216 13:19:15.776017 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.776230 kubelet[1921]: W1216 13:19:15.776036 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.776230 kubelet[1921]: E1216 13:19:15.776104 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.776673 kubelet[1921]: E1216 13:19:15.776427 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.776673 kubelet[1921]: W1216 13:19:15.776446 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.776673 kubelet[1921]: E1216 13:19:15.776461 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.776843 kubelet[1921]: E1216 13:19:15.776693 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.776843 kubelet[1921]: W1216 13:19:15.776706 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.776843 kubelet[1921]: E1216 13:19:15.776721 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.777031 kubelet[1921]: E1216 13:19:15.777006 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.777031 kubelet[1921]: W1216 13:19:15.777024 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.777145 kubelet[1921]: E1216 13:19:15.777039 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.779490 kubelet[1921]: E1216 13:19:15.779455 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.779490 kubelet[1921]: W1216 13:19:15.779480 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.779675 kubelet[1921]: E1216 13:19:15.779501 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.779794 kubelet[1921]: E1216 13:19:15.779772 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.779794 kubelet[1921]: W1216 13:19:15.779788 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.779895 kubelet[1921]: E1216 13:19:15.779803 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.876225 kubelet[1921]: E1216 13:19:15.876182 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.876225 kubelet[1921]: W1216 13:19:15.876216 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.876518 kubelet[1921]: E1216 13:19:15.876254 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.876652 kubelet[1921]: E1216 13:19:15.876626 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.876715 kubelet[1921]: W1216 13:19:15.876657 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.876715 kubelet[1921]: E1216 13:19:15.876685 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.877031 kubelet[1921]: E1216 13:19:15.877010 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.877031 kubelet[1921]: W1216 13:19:15.877028 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.877146 kubelet[1921]: E1216 13:19:15.877049 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.877368 kubelet[1921]: E1216 13:19:15.877348 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.877368 kubelet[1921]: W1216 13:19:15.877365 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.877510 kubelet[1921]: E1216 13:19:15.877381 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.877673 kubelet[1921]: E1216 13:19:15.877645 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.877673 kubelet[1921]: W1216 13:19:15.877671 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.877779 kubelet[1921]: E1216 13:19:15.877686 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.878008 kubelet[1921]: E1216 13:19:15.877990 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.878008 kubelet[1921]: W1216 13:19:15.878006 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.878143 kubelet[1921]: E1216 13:19:15.878027 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.878363 kubelet[1921]: E1216 13:19:15.878342 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.878363 kubelet[1921]: W1216 13:19:15.878359 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.878544 kubelet[1921]: E1216 13:19:15.878507 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.878639 kubelet[1921]: E1216 13:19:15.878619 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.878639 kubelet[1921]: W1216 13:19:15.878637 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.878767 kubelet[1921]: E1216 13:19:15.878746 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.878945 kubelet[1921]: E1216 13:19:15.878929 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.878945 kubelet[1921]: W1216 13:19:15.878943 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.879052 kubelet[1921]: E1216 13:19:15.878970 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.879276 kubelet[1921]: E1216 13:19:15.879243 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.879276 kubelet[1921]: W1216 13:19:15.879260 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.879458 kubelet[1921]: E1216 13:19:15.879377 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.879570 kubelet[1921]: E1216 13:19:15.879547 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.879570 kubelet[1921]: W1216 13:19:15.879568 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.879693 kubelet[1921]: E1216 13:19:15.879674 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.879869 kubelet[1921]: E1216 13:19:15.879852 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.879869 kubelet[1921]: W1216 13:19:15.879866 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.880013 kubelet[1921]: E1216 13:19:15.879980 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.880137 kubelet[1921]: E1216 13:19:15.880121 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.880191 kubelet[1921]: W1216 13:19:15.880136 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.880252 kubelet[1921]: E1216 13:19:15.880231 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.880410 kubelet[1921]: E1216 13:19:15.880394 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.880460 kubelet[1921]: W1216 13:19:15.880411 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.880540 kubelet[1921]: E1216 13:19:15.880512 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.880671 kubelet[1921]: E1216 13:19:15.880655 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.880725 kubelet[1921]: W1216 13:19:15.880670 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.880782 kubelet[1921]: E1216 13:19:15.880763 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.880959 kubelet[1921]: E1216 13:19:15.880942 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.881015 kubelet[1921]: W1216 13:19:15.880958 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.881015 kubelet[1921]: E1216 13:19:15.880979 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.881257 kubelet[1921]: E1216 13:19:15.881225 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.881257 kubelet[1921]: W1216 13:19:15.881243 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.881372 kubelet[1921]: E1216 13:19:15.881339 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.881583 kubelet[1921]: E1216 13:19:15.881560 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.881583 kubelet[1921]: W1216 13:19:15.881578 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.883326 kubelet[1921]: E1216 13:19:15.883129 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.883326 kubelet[1921]: E1216 13:19:15.883187 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.883326 kubelet[1921]: W1216 13:19:15.883205 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.883326 kubelet[1921]: E1216 13:19:15.883280 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.883562 kubelet[1921]: E1216 13:19:15.883506 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.883562 kubelet[1921]: W1216 13:19:15.883520 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.883720 kubelet[1921]: E1216 13:19:15.883666 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.883927 kubelet[1921]: E1216 13:19:15.883906 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.883927 kubelet[1921]: W1216 13:19:15.883923 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.884354 kubelet[1921]: E1216 13:19:15.884057 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.884354 kubelet[1921]: E1216 13:19:15.884231 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.884354 kubelet[1921]: W1216 13:19:15.884245 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.884354 kubelet[1921]: E1216 13:19:15.884261 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.884593 kubelet[1921]: E1216 13:19:15.884573 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.884593 kubelet[1921]: W1216 13:19:15.884592 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.884748 kubelet[1921]: E1216 13:19:15.884727 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.884945 kubelet[1921]: E1216 13:19:15.884926 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.885003 kubelet[1921]: W1216 13:19:15.884942 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.885120 kubelet[1921]: E1216 13:19:15.885082 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.885274 kubelet[1921]: E1216 13:19:15.885257 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.885335 kubelet[1921]: W1216 13:19:15.885274 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.885335 kubelet[1921]: E1216 13:19:15.885289 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:15.891874 kubelet[1921]: E1216 13:19:15.891721 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:19:15.892960 env[1193]: time="2024-12-16T13:19:15.892889243Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-569ddb9599-dl9kn,Uid:52fd151f-c9dd-4dab-978c-5d58c084b28a,Namespace:calico-system,Attempt:0,}" Dec 16 13:19:15.915612 kubelet[1921]: E1216 13:19:15.915559 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:15.915612 kubelet[1921]: W1216 13:19:15.915598 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:15.915835 kubelet[1921]: E1216 13:19:15.915627 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:16.000941 kubelet[1921]: E1216 13:19:16.000802 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:19:16.001604 env[1193]: time="2024-12-16T13:19:16.001535525Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-zzqjq,Uid:c54c8bdd-0cfc-4868-8aa4-f1aba1dfc109,Namespace:calico-system,Attempt:0,}" Dec 16 13:19:16.116862 env[1193]: time="2024-12-16T13:19:16.116789397Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 16 13:19:16.117987 env[1193]: time="2024-12-16T13:19:16.117908156Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 16 13:19:16.118292 env[1193]: time="2024-12-16T13:19:16.118262989Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 16 13:19:16.118679 env[1193]: time="2024-12-16T13:19:16.118646087Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/650aaf84cd3acf61dfe6fcaf928c6222563961f8ae2ffcca30e50d146ba2f176 pid=2382 runtime=io.containerd.runc.v2 Dec 16 13:19:16.135165 systemd[1]: Started cri-containerd-650aaf84cd3acf61dfe6fcaf928c6222563961f8ae2ffcca30e50d146ba2f176.scope. Dec 16 13:19:16.145876 env[1193]: time="2024-12-16T13:19:16.145780775Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 16 13:19:16.145876 env[1193]: time="2024-12-16T13:19:16.145837686Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 16 13:19:16.150146 env[1193]: time="2024-12-16T13:19:16.145860594Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 16 13:19:16.150146 env[1193]: time="2024-12-16T13:19:16.146335564Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/870239a61cf2005b535f5a34ed9baf4382902dc2e36408bad9be7c0340bfbcb3 pid=2397 runtime=io.containerd.runc.v2 Dec 16 13:19:16.159000 audit[2417]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2417 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:16.159000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffe8e855ed0 a2=0 a3=7ffe8e855ebc items=0 ppid=2042 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:16.159000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:16.163000 audit[2417]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2417 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:16.163000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe8e855ed0 a2=0 a3=0 items=0 ppid=2042 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:16.163000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:16.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.175000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.175000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.175000 audit: BPF prog-id=118 op=LOAD Dec 16 13:19:16.177000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.177000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2382 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:16.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635306161663834636433616366363164666536666361663932386336 Dec 16 13:19:16.177000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.177000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2382 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:16.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635306161663834636433616366363164666536666361663932386336 Dec 16 13:19:16.178000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.178000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.178000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.178000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.178000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.178000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.178000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.178000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.178000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.178000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.178000 audit: BPF prog-id=119 op=LOAD Dec 16 13:19:16.178000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c95e0 items=0 ppid=2382 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:16.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635306161663834636433616366363164666536666361663932386336 Dec 16 13:19:16.179000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.184319 systemd[1]: Started cri-containerd-870239a61cf2005b535f5a34ed9baf4382902dc2e36408bad9be7c0340bfbcb3.scope. Dec 16 13:19:16.179000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.179000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.179000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.179000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.179000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.179000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.179000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.179000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.179000 audit: BPF prog-id=120 op=LOAD Dec 16 13:19:16.179000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c9628 items=0 ppid=2382 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:16.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635306161663834636433616366363164666536666361663932386336 Dec 16 13:19:16.186000 audit: BPF prog-id=120 op=UNLOAD Dec 16 13:19:16.186000 audit: BPF prog-id=119 op=UNLOAD Dec 16 13:19:16.186000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.186000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.186000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.186000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.186000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.186000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.186000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.186000 audit[2394]: AVC avc: denied { perfmon } for pid=2394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.186000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.186000 audit[2394]: AVC avc: denied { bpf } for pid=2394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.186000 audit: BPF prog-id=121 op=LOAD Dec 16 13:19:16.186000 audit[2394]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c9a38 items=0 ppid=2382 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:16.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635306161663834636433616366363164666536666361663932386336 Dec 16 13:19:16.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.234000 audit: BPF prog-id=122 op=LOAD Dec 16 13:19:16.235000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.235000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2397 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:16.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837303233396136316366323030356235333566356133346564396261 Dec 16 13:19:16.235000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.235000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2397 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:16.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837303233396136316366323030356235333566356133346564396261 Dec 16 13:19:16.235000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.235000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.235000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.235000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.235000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.235000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.235000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.235000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.235000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.235000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.235000 audit: BPF prog-id=123 op=LOAD Dec 16 13:19:16.235000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00027cfa0 items=0 ppid=2397 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:16.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837303233396136316366323030356235333566356133346564396261 Dec 16 13:19:16.235000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.235000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.235000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.235000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.235000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.235000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.235000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.235000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.235000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.235000 audit: BPF prog-id=124 op=LOAD Dec 16 13:19:16.235000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00027cfe8 items=0 ppid=2397 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:16.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837303233396136316366323030356235333566356133346564396261 Dec 16 13:19:16.236000 audit: BPF prog-id=124 op=UNLOAD Dec 16 13:19:16.236000 audit: BPF prog-id=123 op=UNLOAD Dec 16 13:19:16.236000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.236000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.236000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.236000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.236000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.236000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.236000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.236000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.236000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.236000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:16.236000 audit: BPF prog-id=125 op=LOAD Dec 16 13:19:16.236000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00027d3f8 items=0 ppid=2397 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:16.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837303233396136316366323030356235333566356133346564396261 Dec 16 13:19:16.251260 env[1193]: time="2024-12-16T13:19:16.251045160Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-569ddb9599-dl9kn,Uid:52fd151f-c9dd-4dab-978c-5d58c084b28a,Namespace:calico-system,Attempt:0,} returns sandbox id \"650aaf84cd3acf61dfe6fcaf928c6222563961f8ae2ffcca30e50d146ba2f176\"" Dec 16 13:19:16.257767 kubelet[1921]: E1216 13:19:16.257734 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:19:16.260439 env[1193]: time="2024-12-16T13:19:16.260389935Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 16 13:19:16.265889 env[1193]: time="2024-12-16T13:19:16.265834592Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-zzqjq,Uid:c54c8bdd-0cfc-4868-8aa4-f1aba1dfc109,Namespace:calico-system,Attempt:0,} returns sandbox id \"870239a61cf2005b535f5a34ed9baf4382902dc2e36408bad9be7c0340bfbcb3\"" Dec 16 13:19:16.269521 kubelet[1921]: E1216 13:19:16.269481 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:19:17.432108 kubelet[1921]: E1216 13:19:17.432012 1921 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ccvcz" podUID="cb5cda6c-0e08-4930-b912-35225d86fb7c" Dec 16 13:19:17.684588 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount656209762.mount: Deactivated successfully. Dec 16 13:19:18.765215 env[1193]: time="2024-12-16T13:19:18.765129817Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:18.767201 env[1193]: time="2024-12-16T13:19:18.767129460Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:18.769226 env[1193]: time="2024-12-16T13:19:18.769163406Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:18.770441 env[1193]: time="2024-12-16T13:19:18.770392114Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:18.771537 env[1193]: time="2024-12-16T13:19:18.771482319Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 16 13:19:18.773607 env[1193]: time="2024-12-16T13:19:18.773564861Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 16 13:19:18.797080 env[1193]: time="2024-12-16T13:19:18.797004484Z" level=info msg="CreateContainer within sandbox \"650aaf84cd3acf61dfe6fcaf928c6222563961f8ae2ffcca30e50d146ba2f176\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 16 13:19:18.809827 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3609742043.mount: Deactivated successfully. Dec 16 13:19:18.814659 env[1193]: time="2024-12-16T13:19:18.814599562Z" level=info msg="CreateContainer within sandbox \"650aaf84cd3acf61dfe6fcaf928c6222563961f8ae2ffcca30e50d146ba2f176\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"f5e4056f5f88477457eccddeb399c5cd46f891c0144dc490490e1cfd60599ff7\"" Dec 16 13:19:18.818149 env[1193]: time="2024-12-16T13:19:18.817979432Z" level=info msg="StartContainer for \"f5e4056f5f88477457eccddeb399c5cd46f891c0144dc490490e1cfd60599ff7\"" Dec 16 13:19:18.847129 systemd[1]: Started cri-containerd-f5e4056f5f88477457eccddeb399c5cd46f891c0144dc490490e1cfd60599ff7.scope. Dec 16 13:19:18.881836 kernel: kauditd_printk_skb: 179 callbacks suppressed Dec 16 13:19:18.882124 kernel: audit: type=1400 audit(1734355158.880:965): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.887584 kernel: audit: type=1400 audit(1734355158.880:966): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.887758 kernel: audit: type=1400 audit(1734355158.880:967): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.893518 kernel: audit: type=1400 audit(1734355158.880:968): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.896837 kernel: audit: type=1400 audit(1734355158.880:969): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.896992 kernel: audit: type=1400 audit(1734355158.880:970): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.900013 kernel: audit: type=1400 audit(1734355158.880:971): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.903465 kernel: audit: type=1400 audit(1734355158.880:972): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.909136 kernel: audit: type=1400 audit(1734355158.880:973): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.881000 audit: BPF prog-id=126 op=LOAD Dec 16 13:19:18.881000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.913156 kernel: audit: type=1400 audit(1734355158.881:974): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.881000 audit[2466]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=2382 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:18.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635653430353666356638383437373435376563636464656233393963 Dec 16 13:19:18.881000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.881000 audit[2466]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=8 items=0 ppid=2382 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:18.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635653430353666356638383437373435376563636464656233393963 Dec 16 13:19:18.881000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.881000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.881000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.881000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.881000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.881000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.881000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.881000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.881000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.881000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.881000 audit: BPF prog-id=127 op=LOAD Dec 16 13:19:18.881000 audit[2466]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c000233990 items=0 ppid=2382 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:18.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635653430353666356638383437373435376563636464656233393963 Dec 16 13:19:18.884000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.884000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.884000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.884000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.884000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.884000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.884000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.884000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.884000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.884000 audit: BPF prog-id=128 op=LOAD Dec 16 13:19:18.884000 audit[2466]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c0002339d8 items=0 ppid=2382 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:18.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635653430353666356638383437373435376563636464656233393963 Dec 16 13:19:18.893000 audit: BPF prog-id=128 op=UNLOAD Dec 16 13:19:18.893000 audit: BPF prog-id=127 op=UNLOAD Dec 16 13:19:18.893000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.893000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.893000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.893000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.893000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.893000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.893000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.893000 audit[2466]: AVC avc: denied { perfmon } for pid=2466 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.893000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.893000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:18.893000 audit: BPF prog-id=129 op=LOAD Dec 16 13:19:18.893000 audit[2466]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c000233de8 items=0 ppid=2382 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:18.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635653430353666356638383437373435376563636464656233393963 Dec 16 13:19:18.955837 env[1193]: time="2024-12-16T13:19:18.955769964Z" level=info msg="StartContainer for \"f5e4056f5f88477457eccddeb399c5cd46f891c0144dc490490e1cfd60599ff7\" returns successfully" Dec 16 13:19:19.432861 kubelet[1921]: E1216 13:19:19.432394 1921 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ccvcz" podUID="cb5cda6c-0e08-4930-b912-35225d86fb7c" Dec 16 13:19:19.552376 kubelet[1921]: E1216 13:19:19.552322 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:19:19.603507 kubelet[1921]: E1216 13:19:19.603457 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:19.603797 kubelet[1921]: W1216 13:19:19.603760 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:19.603998 kubelet[1921]: E1216 13:19:19.603970 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:19.604563 kubelet[1921]: E1216 13:19:19.604535 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:19.604767 kubelet[1921]: W1216 13:19:19.604742 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:19.604875 kubelet[1921]: E1216 13:19:19.604857 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:19.605382 kubelet[1921]: E1216 13:19:19.605357 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:19.605545 kubelet[1921]: W1216 13:19:19.605525 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:19.605657 kubelet[1921]: E1216 13:19:19.605639 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:19.606043 kubelet[1921]: E1216 13:19:19.606021 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:19.606213 kubelet[1921]: W1216 13:19:19.606192 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:19.606313 kubelet[1921]: E1216 13:19:19.606296 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:19.606717 kubelet[1921]: E1216 13:19:19.606698 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:19.606841 kubelet[1921]: W1216 13:19:19.606820 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:19.606947 kubelet[1921]: E1216 13:19:19.606930 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:19.607321 kubelet[1921]: E1216 13:19:19.607302 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:19.607470 kubelet[1921]: W1216 13:19:19.607450 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:19.607572 kubelet[1921]: E1216 13:19:19.607554 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:19.607909 kubelet[1921]: E1216 13:19:19.607891 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:19.608090 kubelet[1921]: W1216 13:19:19.608017 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:19.608217 kubelet[1921]: E1216 13:19:19.608193 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:19.608642 kubelet[1921]: E1216 13:19:19.608618 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:19.608795 kubelet[1921]: W1216 13:19:19.608775 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:19.608903 kubelet[1921]: E1216 13:19:19.608885 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:19.609382 kubelet[1921]: E1216 13:19:19.609359 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:19.609531 kubelet[1921]: W1216 13:19:19.609511 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:19.609628 kubelet[1921]: E1216 13:19:19.609612 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:19.609987 kubelet[1921]: E1216 13:19:19.609970 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:19.610150 kubelet[1921]: W1216 13:19:19.610130 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:19.610249 kubelet[1921]: E1216 13:19:19.610232 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:19.610652 kubelet[1921]: E1216 13:19:19.610633 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:19.610783 kubelet[1921]: W1216 13:19:19.610763 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:19.610879 kubelet[1921]: E1216 13:19:19.610863 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:19.611318 kubelet[1921]: E1216 13:19:19.611300 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:19.611465 kubelet[1921]: W1216 13:19:19.611447 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:19.611572 kubelet[1921]: E1216 13:19:19.611552 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:19.611996 kubelet[1921]: E1216 13:19:19.611975 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:19.612147 kubelet[1921]: W1216 13:19:19.612126 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:19.612249 kubelet[1921]: E1216 13:19:19.612233 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:19.612706 kubelet[1921]: E1216 13:19:19.612688 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:19.612854 kubelet[1921]: W1216 13:19:19.612836 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:19.612978 kubelet[1921]: E1216 13:19:19.612961 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:19.613469 kubelet[1921]: E1216 13:19:19.613449 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:19.613599 kubelet[1921]: W1216 13:19:19.613581 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:19.613715 kubelet[1921]: E1216 13:19:19.613698 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:19.614232 kubelet[1921]: E1216 13:19:19.614212 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:19.614426 kubelet[1921]: W1216 13:19:19.614405 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:19.614533 kubelet[1921]: E1216 13:19:19.614515 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:19.615014 kubelet[1921]: E1216 13:19:19.614996 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:19.615231 kubelet[1921]: W1216 13:19:19.615210 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:19.615365 kubelet[1921]: E1216 13:19:19.615346 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:19.615815 kubelet[1921]: E1216 13:19:19.615790 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:19.615815 kubelet[1921]: W1216 13:19:19.615809 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:19.615986 kubelet[1921]: E1216 13:19:19.615829 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:19.616659 kubelet[1921]: E1216 13:19:19.616629 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:19.616659 kubelet[1921]: W1216 13:19:19.616649 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:19.616863 kubelet[1921]: E1216 13:19:19.616675 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:19.617357 kubelet[1921]: E1216 13:19:19.617312 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:19.617357 kubelet[1921]: W1216 13:19:19.617327 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:19.617615 kubelet[1921]: E1216 13:19:19.617589 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:19.618218 kubelet[1921]: E1216 13:19:19.618194 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:19.618352 kubelet[1921]: W1216 13:19:19.618333 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:19.618562 kubelet[1921]: E1216 13:19:19.618543 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:19.618917 kubelet[1921]: E1216 13:19:19.618900 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:19.619161 kubelet[1921]: W1216 13:19:19.619137 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:19.619415 kubelet[1921]: E1216 13:19:19.619394 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:19.619677 kubelet[1921]: E1216 13:19:19.619657 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:19.619802 kubelet[1921]: W1216 13:19:19.619782 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:19.620013 kubelet[1921]: E1216 13:19:19.619994 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:19.620536 kubelet[1921]: E1216 13:19:19.620516 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:19.620690 kubelet[1921]: W1216 13:19:19.620670 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:19.620959 kubelet[1921]: E1216 13:19:19.620938 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:19.621245 kubelet[1921]: E1216 13:19:19.621226 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:19.621384 kubelet[1921]: W1216 13:19:19.621365 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:19.621618 kubelet[1921]: E1216 13:19:19.621598 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:19.621810 kubelet[1921]: E1216 13:19:19.621796 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:19.621927 kubelet[1921]: W1216 13:19:19.621910 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:19.622141 kubelet[1921]: E1216 13:19:19.622124 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:19.622364 kubelet[1921]: E1216 13:19:19.622348 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:19.622469 kubelet[1921]: W1216 13:19:19.622453 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:19.622581 kubelet[1921]: E1216 13:19:19.622564 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:19.623593 kubelet[1921]: E1216 13:19:19.623570 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:19.623758 kubelet[1921]: W1216 13:19:19.623737 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:19.623869 kubelet[1921]: E1216 13:19:19.623853 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:19.624331 kubelet[1921]: E1216 13:19:19.624309 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:19.624462 kubelet[1921]: W1216 13:19:19.624443 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:19.624702 kubelet[1921]: E1216 13:19:19.624681 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:19.625253 kubelet[1921]: E1216 13:19:19.625234 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:19.625397 kubelet[1921]: W1216 13:19:19.625380 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:19.625505 kubelet[1921]: E1216 13:19:19.625488 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:19.626736 kubelet[1921]: E1216 13:19:19.626706 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:19.626889 kubelet[1921]: W1216 13:19:19.626869 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:19.626995 kubelet[1921]: E1216 13:19:19.626977 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:19.627536 kubelet[1921]: E1216 13:19:19.627513 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:19.627712 kubelet[1921]: W1216 13:19:19.627689 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:19.627827 kubelet[1921]: E1216 13:19:19.627808 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:19.628793 kubelet[1921]: E1216 13:19:19.628767 1921 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 16 13:19:19.628948 kubelet[1921]: W1216 13:19:19.628927 1921 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 16 13:19:19.629053 kubelet[1921]: E1216 13:19:19.629034 1921 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 16 13:19:20.151224 kubelet[1921]: I1216 13:19:20.151117 1921 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-569ddb9599-dl9kn" podStartSLOduration=2.638120305 podStartE2EDuration="5.151089818s" podCreationTimestamp="2024-12-16 13:19:15 +0000 UTC" firstStartedPulling="2024-12-16 13:19:16.259871035 +0000 UTC m=+21.053347930" lastFinishedPulling="2024-12-16 13:19:18.772840538 +0000 UTC m=+23.566317443" observedRunningTime="2024-12-16 13:19:19.585547616 +0000 UTC m=+24.379024561" watchObservedRunningTime="2024-12-16 13:19:20.151089818 +0000 UTC m=+24.944566738" Dec 16 13:19:20.199000 audit[2532]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2532 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:20.199000 audit[2532]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffed8f4e450 a2=0 a3=7ffed8f4e43c items=0 ppid=2042 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:20.199000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:20.203000 audit[2532]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2532 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:20.203000 audit[2532]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffed8f4e450 a2=0 a3=7ffed8f4e43c items=0 ppid=2042 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:20.203000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:20.337955 env[1193]: time="2024-12-16T13:19:20.337897634Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:20.341122 env[1193]: time="2024-12-16T13:19:20.341028443Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:20.344413 env[1193]: time="2024-12-16T13:19:20.344350523Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:20.347197 env[1193]: time="2024-12-16T13:19:20.346166415Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:20.347645 env[1193]: time="2024-12-16T13:19:20.347583963Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 16 13:19:20.352423 env[1193]: time="2024-12-16T13:19:20.352328512Z" level=info msg="CreateContainer within sandbox \"870239a61cf2005b535f5a34ed9baf4382902dc2e36408bad9be7c0340bfbcb3\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 16 13:19:20.370370 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1648455958.mount: Deactivated successfully. Dec 16 13:19:20.373790 env[1193]: time="2024-12-16T13:19:20.373733031Z" level=info msg="CreateContainer within sandbox \"870239a61cf2005b535f5a34ed9baf4382902dc2e36408bad9be7c0340bfbcb3\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"523220e65e953c7cfc74190a3080eae76b38aaacd5624d924646b35677464e65\"" Dec 16 13:19:20.374877 env[1193]: time="2024-12-16T13:19:20.374827928Z" level=info msg="StartContainer for \"523220e65e953c7cfc74190a3080eae76b38aaacd5624d924646b35677464e65\"" Dec 16 13:19:20.423933 systemd[1]: Started cri-containerd-523220e65e953c7cfc74190a3080eae76b38aaacd5624d924646b35677464e65.scope. Dec 16 13:19:20.449000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:20.449000 audit[2540]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fc7ecc80078 items=0 ppid=2397 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:20.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532333232306536356539353363376366633734313930613330383065 Dec 16 13:19:20.449000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:20.449000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:20.449000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:20.449000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:20.449000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:20.449000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:20.449000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:20.449000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:20.449000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:20.449000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:20.449000 audit: BPF prog-id=130 op=LOAD Dec 16 13:19:20.449000 audit[2540]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000345548 items=0 ppid=2397 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:20.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532333232306536356539353363376366633734313930613330383065 Dec 16 13:19:20.450000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:20.450000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:20.450000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:20.450000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:20.450000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:20.450000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:20.450000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:20.450000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:20.450000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:20.450000 audit: BPF prog-id=131 op=LOAD Dec 16 13:19:20.450000 audit[2540]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000345598 items=0 ppid=2397 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:20.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532333232306536356539353363376366633734313930613330383065 Dec 16 13:19:20.450000 audit: BPF prog-id=131 op=UNLOAD Dec 16 13:19:20.450000 audit: BPF prog-id=130 op=UNLOAD Dec 16 13:19:20.450000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:20.450000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:20.450000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:20.450000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:20.450000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:20.450000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:20.450000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:20.450000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:20.450000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:20.450000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:20.450000 audit: BPF prog-id=132 op=LOAD Dec 16 13:19:20.450000 audit[2540]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000345628 items=0 ppid=2397 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:20.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532333232306536356539353363376366633734313930613330383065 Dec 16 13:19:20.474555 env[1193]: time="2024-12-16T13:19:20.474394524Z" level=info msg="StartContainer for \"523220e65e953c7cfc74190a3080eae76b38aaacd5624d924646b35677464e65\" returns successfully" Dec 16 13:19:20.502414 systemd[1]: cri-containerd-523220e65e953c7cfc74190a3080eae76b38aaacd5624d924646b35677464e65.scope: Deactivated successfully. Dec 16 13:19:20.504000 audit: BPF prog-id=132 op=UNLOAD Dec 16 13:19:20.549784 env[1193]: time="2024-12-16T13:19:20.549704399Z" level=info msg="shim disconnected" id=523220e65e953c7cfc74190a3080eae76b38aaacd5624d924646b35677464e65 Dec 16 13:19:20.550283 env[1193]: time="2024-12-16T13:19:20.550239608Z" level=warning msg="cleaning up after shim disconnected" id=523220e65e953c7cfc74190a3080eae76b38aaacd5624d924646b35677464e65 namespace=k8s.io Dec 16 13:19:20.550451 env[1193]: time="2024-12-16T13:19:20.550426368Z" level=info msg="cleaning up dead shim" Dec 16 13:19:20.557097 kubelet[1921]: E1216 13:19:20.556635 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:19:20.558334 kubelet[1921]: E1216 13:19:20.558236 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:19:20.580127 env[1193]: time="2024-12-16T13:19:20.580046094Z" level=warning msg="cleanup warnings time=\"2024-12-16T13:19:20Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2577 runtime=io.containerd.runc.v2\n" Dec 16 13:19:20.786112 systemd[1]: run-containerd-runc-k8s.io-523220e65e953c7cfc74190a3080eae76b38aaacd5624d924646b35677464e65-runc.G7XMdi.mount: Deactivated successfully. Dec 16 13:19:20.786302 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-523220e65e953c7cfc74190a3080eae76b38aaacd5624d924646b35677464e65-rootfs.mount: Deactivated successfully. Dec 16 13:19:21.432572 kubelet[1921]: E1216 13:19:21.432512 1921 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ccvcz" podUID="cb5cda6c-0e08-4930-b912-35225d86fb7c" Dec 16 13:19:21.560974 kubelet[1921]: E1216 13:19:21.560929 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:19:21.562687 kubelet[1921]: E1216 13:19:21.562219 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:19:21.564835 env[1193]: time="2024-12-16T13:19:21.564490127Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 16 13:19:23.433530 kubelet[1921]: E1216 13:19:23.433470 1921 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ccvcz" podUID="cb5cda6c-0e08-4930-b912-35225d86fb7c" Dec 16 13:19:25.433704 kubelet[1921]: E1216 13:19:25.433643 1921 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ccvcz" podUID="cb5cda6c-0e08-4930-b912-35225d86fb7c" Dec 16 13:19:27.432650 kubelet[1921]: E1216 13:19:27.431635 1921 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ccvcz" podUID="cb5cda6c-0e08-4930-b912-35225d86fb7c" Dec 16 13:19:28.091732 env[1193]: time="2024-12-16T13:19:28.091677329Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:28.093092 env[1193]: time="2024-12-16T13:19:28.093036771Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:28.094934 env[1193]: time="2024-12-16T13:19:28.094889809Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:28.096776 env[1193]: time="2024-12-16T13:19:28.096725466Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:28.097738 env[1193]: time="2024-12-16T13:19:28.097692680Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 16 13:19:28.103137 env[1193]: time="2024-12-16T13:19:28.103059637Z" level=info msg="CreateContainer within sandbox \"870239a61cf2005b535f5a34ed9baf4382902dc2e36408bad9be7c0340bfbcb3\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 16 13:19:28.121340 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1704895345.mount: Deactivated successfully. Dec 16 13:19:28.127371 env[1193]: time="2024-12-16T13:19:28.127238908Z" level=info msg="CreateContainer within sandbox \"870239a61cf2005b535f5a34ed9baf4382902dc2e36408bad9be7c0340bfbcb3\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"e1e8c369ff412e706b0193cd4ca672dcc91bc6fe618edd63eac5ca7dc2bd7e52\"" Dec 16 13:19:28.129463 env[1193]: time="2024-12-16T13:19:28.129409504Z" level=info msg="StartContainer for \"e1e8c369ff412e706b0193cd4ca672dcc91bc6fe618edd63eac5ca7dc2bd7e52\"" Dec 16 13:19:28.173527 systemd[1]: run-containerd-runc-k8s.io-e1e8c369ff412e706b0193cd4ca672dcc91bc6fe618edd63eac5ca7dc2bd7e52-runc.tEZQJt.mount: Deactivated successfully. Dec 16 13:19:28.184041 systemd[1]: Started cri-containerd-e1e8c369ff412e706b0193cd4ca672dcc91bc6fe618edd63eac5ca7dc2bd7e52.scope. Dec 16 13:19:28.213687 kernel: kauditd_printk_skb: 97 callbacks suppressed Dec 16 13:19:28.213906 kernel: audit: type=1400 audit(1734355168.209:992): avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.209000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.209000 audit[2604]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f3ccb8ce2f8 items=0 ppid=2397 pid=2604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:28.224213 kernel: audit: type=1300 audit(1734355168.209:992): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f3ccb8ce2f8 items=0 ppid=2397 pid=2604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:28.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531653863333639666634313265373036623031393363643463613637 Dec 16 13:19:28.209000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.231439 kernel: audit: type=1327 audit(1734355168.209:992): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531653863333639666634313265373036623031393363643463613637 Dec 16 13:19:28.231543 kernel: audit: type=1400 audit(1734355168.209:993): avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.209000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.209000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.238781 kernel: audit: type=1400 audit(1734355168.209:993): avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.238926 kernel: audit: type=1400 audit(1734355168.209:993): avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.238953 kernel: audit: type=1400 audit(1734355168.209:993): avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.209000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.241360 kernel: audit: type=1400 audit(1734355168.209:993): avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.209000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.209000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.250188 kernel: audit: type=1400 audit(1734355168.209:993): avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.250323 kernel: audit: type=1400 audit(1734355168.209:993): avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.209000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.209000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.209000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.209000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.209000 audit: BPF prog-id=133 op=LOAD Dec 16 13:19:28.209000 audit[2604]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000024248 items=0 ppid=2397 pid=2604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:28.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531653863333639666634313265373036623031393363643463613637 Dec 16 13:19:28.209000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.209000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.209000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.209000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.209000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.209000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.209000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.209000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.209000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.209000 audit: BPF prog-id=134 op=LOAD Dec 16 13:19:28.209000 audit[2604]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000024298 items=0 ppid=2397 pid=2604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:28.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531653863333639666634313265373036623031393363643463613637 Dec 16 13:19:28.210000 audit: BPF prog-id=134 op=UNLOAD Dec 16 13:19:28.210000 audit: BPF prog-id=133 op=UNLOAD Dec 16 13:19:28.210000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.210000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.210000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.210000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.210000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.210000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.210000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.210000 audit[2604]: AVC avc: denied { perfmon } for pid=2604 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.210000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.210000 audit[2604]: AVC avc: denied { bpf } for pid=2604 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:28.210000 audit: BPF prog-id=135 op=LOAD Dec 16 13:19:28.210000 audit[2604]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000024328 items=0 ppid=2397 pid=2604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:28.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531653863333639666634313265373036623031393363643463613637 Dec 16 13:19:28.258233 env[1193]: time="2024-12-16T13:19:28.258155664Z" level=info msg="StartContainer for \"e1e8c369ff412e706b0193cd4ca672dcc91bc6fe618edd63eac5ca7dc2bd7e52\" returns successfully" Dec 16 13:19:28.582135 kubelet[1921]: E1216 13:19:28.582092 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:19:28.947596 env[1193]: time="2024-12-16T13:19:28.947456231Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 16 13:19:28.952391 systemd[1]: cri-containerd-e1e8c369ff412e706b0193cd4ca672dcc91bc6fe618edd63eac5ca7dc2bd7e52.scope: Deactivated successfully. Dec 16 13:19:28.957000 audit: BPF prog-id=135 op=UNLOAD Dec 16 13:19:28.990023 env[1193]: time="2024-12-16T13:19:28.989938471Z" level=info msg="shim disconnected" id=e1e8c369ff412e706b0193cd4ca672dcc91bc6fe618edd63eac5ca7dc2bd7e52 Dec 16 13:19:28.990023 env[1193]: time="2024-12-16T13:19:28.990012181Z" level=warning msg="cleaning up after shim disconnected" id=e1e8c369ff412e706b0193cd4ca672dcc91bc6fe618edd63eac5ca7dc2bd7e52 namespace=k8s.io Dec 16 13:19:28.990023 env[1193]: time="2024-12-16T13:19:28.990026278Z" level=info msg="cleaning up dead shim" Dec 16 13:19:29.000328 kubelet[1921]: I1216 13:19:28.998547 1921 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Dec 16 13:19:29.015288 env[1193]: time="2024-12-16T13:19:29.015227612Z" level=warning msg="cleanup warnings time=\"2024-12-16T13:19:28Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2644 runtime=io.containerd.runc.v2\n" Dec 16 13:19:29.046258 systemd[1]: Created slice kubepods-burstable-pod40f13eb9_6107_4fcd_b21f_7f9d38717259.slice. Dec 16 13:19:29.056326 kubelet[1921]: W1216 13:19:29.056272 1921 reflector.go:561] object-"kube-system"/"coredns": failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:ci-3510.3.6-6-0e268b98cf" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.6-6-0e268b98cf' and this object Dec 16 13:19:29.056666 kubelet[1921]: E1216 13:19:29.056620 1921 reflector.go:158] "Unhandled Error" err="object-\"kube-system\"/\"coredns\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"coredns\" is forbidden: User \"system:node:ci-3510.3.6-6-0e268b98cf\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"kube-system\": no relationship found between node 'ci-3510.3.6-6-0e268b98cf' and this object" logger="UnhandledError" Dec 16 13:19:29.063711 systemd[1]: Created slice kubepods-burstable-pode13621c2_02f4_41d6_80b5_938bac2450b8.slice. Dec 16 13:19:29.082189 systemd[1]: Created slice kubepods-besteffort-pod61d905b8_c93e_4490_90af_dacf4743676a.slice. Dec 16 13:19:29.090147 systemd[1]: Created slice kubepods-besteffort-pod7351e6b4_48f5_49f2_9546_d89197754a12.slice. Dec 16 13:19:29.103465 systemd[1]: Created slice kubepods-besteffort-podb2f42d08_5884_4b97_8d28_7b9e8434133d.slice. Dec 16 13:19:29.108767 kubelet[1921]: I1216 13:19:29.108699 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/40f13eb9-6107-4fcd-b21f-7f9d38717259-config-volume\") pod \"coredns-6f6b679f8f-bz7zq\" (UID: \"40f13eb9-6107-4fcd-b21f-7f9d38717259\") " pod="kube-system/coredns-6f6b679f8f-bz7zq" Dec 16 13:19:29.109282 kubelet[1921]: I1216 13:19:29.109246 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-br4vq\" (UniqueName: \"kubernetes.io/projected/40f13eb9-6107-4fcd-b21f-7f9d38717259-kube-api-access-br4vq\") pod \"coredns-6f6b679f8f-bz7zq\" (UID: \"40f13eb9-6107-4fcd-b21f-7f9d38717259\") " pod="kube-system/coredns-6f6b679f8f-bz7zq" Dec 16 13:19:29.109546 kubelet[1921]: I1216 13:19:29.109498 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vrqgq\" (UniqueName: \"kubernetes.io/projected/7351e6b4-48f5-49f2-9546-d89197754a12-kube-api-access-vrqgq\") pod \"calico-kube-controllers-758bd67986-7dfsz\" (UID: \"7351e6b4-48f5-49f2-9546-d89197754a12\") " pod="calico-system/calico-kube-controllers-758bd67986-7dfsz" Dec 16 13:19:29.109715 kubelet[1921]: I1216 13:19:29.109688 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7pcjs\" (UniqueName: \"kubernetes.io/projected/b2f42d08-5884-4b97-8d28-7b9e8434133d-kube-api-access-7pcjs\") pod \"calico-apiserver-78458c5f95-8rqzt\" (UID: \"b2f42d08-5884-4b97-8d28-7b9e8434133d\") " pod="calico-apiserver/calico-apiserver-78458c5f95-8rqzt" Dec 16 13:19:29.109934 kubelet[1921]: I1216 13:19:29.109852 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/e13621c2-02f4-41d6-80b5-938bac2450b8-config-volume\") pod \"coredns-6f6b679f8f-fmtjs\" (UID: \"e13621c2-02f4-41d6-80b5-938bac2450b8\") " pod="kube-system/coredns-6f6b679f8f-fmtjs" Dec 16 13:19:29.110149 kubelet[1921]: I1216 13:19:29.110126 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/b2f42d08-5884-4b97-8d28-7b9e8434133d-calico-apiserver-certs\") pod \"calico-apiserver-78458c5f95-8rqzt\" (UID: \"b2f42d08-5884-4b97-8d28-7b9e8434133d\") " pod="calico-apiserver/calico-apiserver-78458c5f95-8rqzt" Dec 16 13:19:29.110321 kubelet[1921]: I1216 13:19:29.110300 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vtn77\" (UniqueName: \"kubernetes.io/projected/e13621c2-02f4-41d6-80b5-938bac2450b8-kube-api-access-vtn77\") pod \"coredns-6f6b679f8f-fmtjs\" (UID: \"e13621c2-02f4-41d6-80b5-938bac2450b8\") " pod="kube-system/coredns-6f6b679f8f-fmtjs" Dec 16 13:19:29.110488 kubelet[1921]: I1216 13:19:29.110468 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/7351e6b4-48f5-49f2-9546-d89197754a12-tigera-ca-bundle\") pod \"calico-kube-controllers-758bd67986-7dfsz\" (UID: \"7351e6b4-48f5-49f2-9546-d89197754a12\") " pod="calico-system/calico-kube-controllers-758bd67986-7dfsz" Dec 16 13:19:29.110661 kubelet[1921]: I1216 13:19:29.110626 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/61d905b8-c93e-4490-90af-dacf4743676a-calico-apiserver-certs\") pod \"calico-apiserver-78458c5f95-xn82q\" (UID: \"61d905b8-c93e-4490-90af-dacf4743676a\") " pod="calico-apiserver/calico-apiserver-78458c5f95-xn82q" Dec 16 13:19:29.110880 kubelet[1921]: I1216 13:19:29.110839 1921 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4hjc9\" (UniqueName: \"kubernetes.io/projected/61d905b8-c93e-4490-90af-dacf4743676a-kube-api-access-4hjc9\") pod \"calico-apiserver-78458c5f95-xn82q\" (UID: \"61d905b8-c93e-4490-90af-dacf4743676a\") " pod="calico-apiserver/calico-apiserver-78458c5f95-xn82q" Dec 16 13:19:29.116619 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e1e8c369ff412e706b0193cd4ca672dcc91bc6fe618edd63eac5ca7dc2bd7e52-rootfs.mount: Deactivated successfully. Dec 16 13:19:29.390141 env[1193]: time="2024-12-16T13:19:29.389578931Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-78458c5f95-xn82q,Uid:61d905b8-c93e-4490-90af-dacf4743676a,Namespace:calico-apiserver,Attempt:0,}" Dec 16 13:19:29.415603 env[1193]: time="2024-12-16T13:19:29.415526502Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-78458c5f95-8rqzt,Uid:b2f42d08-5884-4b97-8d28-7b9e8434133d,Namespace:calico-apiserver,Attempt:0,}" Dec 16 13:19:29.416314 env[1193]: time="2024-12-16T13:19:29.416272633Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-758bd67986-7dfsz,Uid:7351e6b4-48f5-49f2-9546-d89197754a12,Namespace:calico-system,Attempt:0,}" Dec 16 13:19:29.439990 systemd[1]: Created slice kubepods-besteffort-podcb5cda6c_0e08_4930_b912_35225d86fb7c.slice. Dec 16 13:19:29.447638 env[1193]: time="2024-12-16T13:19:29.447564824Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ccvcz,Uid:cb5cda6c-0e08-4930-b912-35225d86fb7c,Namespace:calico-system,Attempt:0,}" Dec 16 13:19:29.587035 kubelet[1921]: E1216 13:19:29.586998 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:19:29.590859 env[1193]: time="2024-12-16T13:19:29.590810980Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 16 13:19:29.682171 env[1193]: time="2024-12-16T13:19:29.681966607Z" level=error msg="Failed to destroy network for sandbox \"79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:29.683020 env[1193]: time="2024-12-16T13:19:29.682961945Z" level=error msg="encountered an error cleaning up failed sandbox \"79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:29.683323 env[1193]: time="2024-12-16T13:19:29.683274337Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-78458c5f95-xn82q,Uid:61d905b8-c93e-4490-90af-dacf4743676a,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:29.684124 kubelet[1921]: E1216 13:19:29.683848 1921 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:29.684124 kubelet[1921]: E1216 13:19:29.683955 1921 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-78458c5f95-xn82q" Dec 16 13:19:29.684124 kubelet[1921]: E1216 13:19:29.683989 1921 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-78458c5f95-xn82q" Dec 16 13:19:29.684460 kubelet[1921]: E1216 13:19:29.684053 1921 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-78458c5f95-xn82q_calico-apiserver(61d905b8-c93e-4490-90af-dacf4743676a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-78458c5f95-xn82q_calico-apiserver(61d905b8-c93e-4490-90af-dacf4743676a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-78458c5f95-xn82q" podUID="61d905b8-c93e-4490-90af-dacf4743676a" Dec 16 13:19:29.702250 env[1193]: time="2024-12-16T13:19:29.702160224Z" level=error msg="Failed to destroy network for sandbox \"9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:29.702804 env[1193]: time="2024-12-16T13:19:29.702761109Z" level=error msg="encountered an error cleaning up failed sandbox \"9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:29.702995 env[1193]: time="2024-12-16T13:19:29.702960321Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-78458c5f95-8rqzt,Uid:b2f42d08-5884-4b97-8d28-7b9e8434133d,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:29.703811 kubelet[1921]: E1216 13:19:29.703422 1921 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:29.703811 kubelet[1921]: E1216 13:19:29.703486 1921 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-78458c5f95-8rqzt" Dec 16 13:19:29.703811 kubelet[1921]: E1216 13:19:29.703508 1921 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-78458c5f95-8rqzt" Dec 16 13:19:29.704027 kubelet[1921]: E1216 13:19:29.703558 1921 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-78458c5f95-8rqzt_calico-apiserver(b2f42d08-5884-4b97-8d28-7b9e8434133d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-78458c5f95-8rqzt_calico-apiserver(b2f42d08-5884-4b97-8d28-7b9e8434133d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-78458c5f95-8rqzt" podUID="b2f42d08-5884-4b97-8d28-7b9e8434133d" Dec 16 13:19:29.706015 env[1193]: time="2024-12-16T13:19:29.705920707Z" level=error msg="Failed to destroy network for sandbox \"c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:29.706271 env[1193]: time="2024-12-16T13:19:29.706180035Z" level=error msg="Failed to destroy network for sandbox \"c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:29.707268 env[1193]: time="2024-12-16T13:19:29.707208530Z" level=error msg="encountered an error cleaning up failed sandbox \"c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:29.707403 env[1193]: time="2024-12-16T13:19:29.707295351Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ccvcz,Uid:cb5cda6c-0e08-4930-b912-35225d86fb7c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:29.707784 kubelet[1921]: E1216 13:19:29.707599 1921 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:29.707784 kubelet[1921]: E1216 13:19:29.707667 1921 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-ccvcz" Dec 16 13:19:29.707784 kubelet[1921]: E1216 13:19:29.707690 1921 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-ccvcz" Dec 16 13:19:29.707932 kubelet[1921]: E1216 13:19:29.707740 1921 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-ccvcz_calico-system(cb5cda6c-0e08-4930-b912-35225d86fb7c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-ccvcz_calico-system(cb5cda6c-0e08-4930-b912-35225d86fb7c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-ccvcz" podUID="cb5cda6c-0e08-4930-b912-35225d86fb7c" Dec 16 13:19:29.708215 env[1193]: time="2024-12-16T13:19:29.707460560Z" level=error msg="encountered an error cleaning up failed sandbox \"c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:29.708365 env[1193]: time="2024-12-16T13:19:29.708324473Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-758bd67986-7dfsz,Uid:7351e6b4-48f5-49f2-9546-d89197754a12,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:29.708769 kubelet[1921]: E1216 13:19:29.708706 1921 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:29.708872 kubelet[1921]: E1216 13:19:29.708806 1921 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-758bd67986-7dfsz" Dec 16 13:19:29.708872 kubelet[1921]: E1216 13:19:29.708837 1921 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-758bd67986-7dfsz" Dec 16 13:19:29.710194 kubelet[1921]: E1216 13:19:29.710110 1921 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-758bd67986-7dfsz_calico-system(7351e6b4-48f5-49f2-9546-d89197754a12)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-758bd67986-7dfsz_calico-system(7351e6b4-48f5-49f2-9546-d89197754a12)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-758bd67986-7dfsz" podUID="7351e6b4-48f5-49f2-9546-d89197754a12" Dec 16 13:19:30.212886 kubelet[1921]: E1216 13:19:30.212821 1921 configmap.go:193] Couldn't get configMap kube-system/coredns: failed to sync configmap cache: timed out waiting for the condition Dec 16 13:19:30.215427 kubelet[1921]: E1216 13:19:30.215365 1921 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/e13621c2-02f4-41d6-80b5-938bac2450b8-config-volume podName:e13621c2-02f4-41d6-80b5-938bac2450b8 nodeName:}" failed. No retries permitted until 2024-12-16 13:19:30.712960581 +0000 UTC m=+35.506437483 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "config-volume" (UniqueName: "kubernetes.io/configmap/e13621c2-02f4-41d6-80b5-938bac2450b8-config-volume") pod "coredns-6f6b679f8f-fmtjs" (UID: "e13621c2-02f4-41d6-80b5-938bac2450b8") : failed to sync configmap cache: timed out waiting for the condition Dec 16 13:19:30.217405 kubelet[1921]: E1216 13:19:30.217134 1921 configmap.go:193] Couldn't get configMap kube-system/coredns: failed to sync configmap cache: timed out waiting for the condition Dec 16 13:19:30.217405 kubelet[1921]: E1216 13:19:30.217351 1921 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/40f13eb9-6107-4fcd-b21f-7f9d38717259-config-volume podName:40f13eb9-6107-4fcd-b21f-7f9d38717259 nodeName:}" failed. No retries permitted until 2024-12-16 13:19:30.717319035 +0000 UTC m=+35.510795953 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "config-volume" (UniqueName: "kubernetes.io/configmap/40f13eb9-6107-4fcd-b21f-7f9d38717259-config-volume") pod "coredns-6f6b679f8f-bz7zq" (UID: "40f13eb9-6107-4fcd-b21f-7f9d38717259") : failed to sync configmap cache: timed out waiting for the condition Dec 16 13:19:30.592548 kubelet[1921]: I1216 13:19:30.591773 1921 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" Dec 16 13:19:30.595803 env[1193]: time="2024-12-16T13:19:30.594353381Z" level=info msg="StopPodSandbox for \"9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041\"" Dec 16 13:19:30.597799 kubelet[1921]: I1216 13:19:30.597759 1921 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" Dec 16 13:19:30.601764 env[1193]: time="2024-12-16T13:19:30.600775747Z" level=info msg="StopPodSandbox for \"c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1\"" Dec 16 13:19:30.604253 kubelet[1921]: I1216 13:19:30.604004 1921 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" Dec 16 13:19:30.605684 env[1193]: time="2024-12-16T13:19:30.604906769Z" level=info msg="StopPodSandbox for \"79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764\"" Dec 16 13:19:30.611554 kubelet[1921]: I1216 13:19:30.610803 1921 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" Dec 16 13:19:30.614243 env[1193]: time="2024-12-16T13:19:30.614025973Z" level=info msg="StopPodSandbox for \"c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7\"" Dec 16 13:19:30.729845 env[1193]: time="2024-12-16T13:19:30.729752135Z" level=error msg="StopPodSandbox for \"c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1\" failed" error="failed to destroy network for sandbox \"c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:30.730196 kubelet[1921]: E1216 13:19:30.730127 1921 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" Dec 16 13:19:30.730347 kubelet[1921]: E1216 13:19:30.730239 1921 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1"} Dec 16 13:19:30.730419 kubelet[1921]: E1216 13:19:30.730361 1921 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7351e6b4-48f5-49f2-9546-d89197754a12\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 16 13:19:30.730533 kubelet[1921]: E1216 13:19:30.730411 1921 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7351e6b4-48f5-49f2-9546-d89197754a12\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-758bd67986-7dfsz" podUID="7351e6b4-48f5-49f2-9546-d89197754a12" Dec 16 13:19:30.732536 env[1193]: time="2024-12-16T13:19:30.732458849Z" level=error msg="StopPodSandbox for \"79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764\" failed" error="failed to destroy network for sandbox \"79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:30.732978 kubelet[1921]: E1216 13:19:30.732894 1921 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" Dec 16 13:19:30.733218 kubelet[1921]: E1216 13:19:30.732991 1921 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764"} Dec 16 13:19:30.733218 kubelet[1921]: E1216 13:19:30.733042 1921 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"61d905b8-c93e-4490-90af-dacf4743676a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 16 13:19:30.733218 kubelet[1921]: E1216 13:19:30.733105 1921 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"61d905b8-c93e-4490-90af-dacf4743676a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-78458c5f95-xn82q" podUID="61d905b8-c93e-4490-90af-dacf4743676a" Dec 16 13:19:30.745088 env[1193]: time="2024-12-16T13:19:30.744980086Z" level=error msg="StopPodSandbox for \"9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041\" failed" error="failed to destroy network for sandbox \"9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:30.745501 kubelet[1921]: E1216 13:19:30.745416 1921 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" Dec 16 13:19:30.745661 kubelet[1921]: E1216 13:19:30.745511 1921 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041"} Dec 16 13:19:30.745661 kubelet[1921]: E1216 13:19:30.745579 1921 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b2f42d08-5884-4b97-8d28-7b9e8434133d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 16 13:19:30.745661 kubelet[1921]: E1216 13:19:30.745636 1921 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b2f42d08-5884-4b97-8d28-7b9e8434133d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-78458c5f95-8rqzt" podUID="b2f42d08-5884-4b97-8d28-7b9e8434133d" Dec 16 13:19:30.755382 env[1193]: time="2024-12-16T13:19:30.755268178Z" level=error msg="StopPodSandbox for \"c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7\" failed" error="failed to destroy network for sandbox \"c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:30.756021 kubelet[1921]: E1216 13:19:30.755805 1921 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" Dec 16 13:19:30.756021 kubelet[1921]: E1216 13:19:30.755886 1921 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7"} Dec 16 13:19:30.756021 kubelet[1921]: E1216 13:19:30.755937 1921 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cb5cda6c-0e08-4930-b912-35225d86fb7c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 16 13:19:30.756021 kubelet[1921]: E1216 13:19:30.755970 1921 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cb5cda6c-0e08-4930-b912-35225d86fb7c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-ccvcz" podUID="cb5cda6c-0e08-4930-b912-35225d86fb7c" Dec 16 13:19:30.851253 kubelet[1921]: E1216 13:19:30.851117 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:19:30.853307 env[1193]: time="2024-12-16T13:19:30.853239697Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-bz7zq,Uid:40f13eb9-6107-4fcd-b21f-7f9d38717259,Namespace:kube-system,Attempt:0,}" Dec 16 13:19:30.871174 kubelet[1921]: E1216 13:19:30.871132 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:19:30.873042 env[1193]: time="2024-12-16T13:19:30.872984939Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-fmtjs,Uid:e13621c2-02f4-41d6-80b5-938bac2450b8,Namespace:kube-system,Attempt:0,}" Dec 16 13:19:31.006367 env[1193]: time="2024-12-16T13:19:31.006278303Z" level=error msg="Failed to destroy network for sandbox \"d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:31.006851 env[1193]: time="2024-12-16T13:19:31.006796569Z" level=error msg="encountered an error cleaning up failed sandbox \"d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:31.006997 env[1193]: time="2024-12-16T13:19:31.006864316Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-bz7zq,Uid:40f13eb9-6107-4fcd-b21f-7f9d38717259,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:31.007227 kubelet[1921]: E1216 13:19:31.007176 1921 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:31.007383 kubelet[1921]: E1216 13:19:31.007252 1921 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-bz7zq" Dec 16 13:19:31.007383 kubelet[1921]: E1216 13:19:31.007279 1921 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-bz7zq" Dec 16 13:19:31.007383 kubelet[1921]: E1216 13:19:31.007336 1921 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-bz7zq_kube-system(40f13eb9-6107-4fcd-b21f-7f9d38717259)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-bz7zq_kube-system(40f13eb9-6107-4fcd-b21f-7f9d38717259)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-bz7zq" podUID="40f13eb9-6107-4fcd-b21f-7f9d38717259" Dec 16 13:19:31.022598 env[1193]: time="2024-12-16T13:19:31.022513198Z" level=error msg="Failed to destroy network for sandbox \"3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:31.023520 env[1193]: time="2024-12-16T13:19:31.023441663Z" level=error msg="encountered an error cleaning up failed sandbox \"3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:31.023836 env[1193]: time="2024-12-16T13:19:31.023772848Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-fmtjs,Uid:e13621c2-02f4-41d6-80b5-938bac2450b8,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:31.024410 kubelet[1921]: E1216 13:19:31.024348 1921 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:31.024548 kubelet[1921]: E1216 13:19:31.024431 1921 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-fmtjs" Dec 16 13:19:31.024548 kubelet[1921]: E1216 13:19:31.024462 1921 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-fmtjs" Dec 16 13:19:31.024548 kubelet[1921]: E1216 13:19:31.024524 1921 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-fmtjs_kube-system(e13621c2-02f4-41d6-80b5-938bac2450b8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-fmtjs_kube-system(e13621c2-02f4-41d6-80b5-938bac2450b8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-fmtjs" podUID="e13621c2-02f4-41d6-80b5-938bac2450b8" Dec 16 13:19:31.117798 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155-shm.mount: Deactivated successfully. Dec 16 13:19:31.117988 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32-shm.mount: Deactivated successfully. Dec 16 13:19:31.614580 kubelet[1921]: I1216 13:19:31.614529 1921 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" Dec 16 13:19:31.617773 env[1193]: time="2024-12-16T13:19:31.617710326Z" level=info msg="StopPodSandbox for \"3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155\"" Dec 16 13:19:31.629454 kubelet[1921]: I1216 13:19:31.628510 1921 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" Dec 16 13:19:31.631054 env[1193]: time="2024-12-16T13:19:31.630728487Z" level=info msg="StopPodSandbox for \"d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32\"" Dec 16 13:19:31.715362 env[1193]: time="2024-12-16T13:19:31.715285111Z" level=error msg="StopPodSandbox for \"d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32\" failed" error="failed to destroy network for sandbox \"d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:31.715921 kubelet[1921]: E1216 13:19:31.715751 1921 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" Dec 16 13:19:31.715921 kubelet[1921]: E1216 13:19:31.715804 1921 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32"} Dec 16 13:19:31.715921 kubelet[1921]: E1216 13:19:31.715844 1921 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"40f13eb9-6107-4fcd-b21f-7f9d38717259\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 16 13:19:31.715921 kubelet[1921]: E1216 13:19:31.715877 1921 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"40f13eb9-6107-4fcd-b21f-7f9d38717259\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-bz7zq" podUID="40f13eb9-6107-4fcd-b21f-7f9d38717259" Dec 16 13:19:31.722170 env[1193]: time="2024-12-16T13:19:31.722026525Z" level=error msg="StopPodSandbox for \"3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155\" failed" error="failed to destroy network for sandbox \"3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 16 13:19:31.723120 kubelet[1921]: E1216 13:19:31.722888 1921 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" Dec 16 13:19:31.723120 kubelet[1921]: E1216 13:19:31.722947 1921 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155"} Dec 16 13:19:31.723120 kubelet[1921]: E1216 13:19:31.722985 1921 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e13621c2-02f4-41d6-80b5-938bac2450b8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 16 13:19:31.723120 kubelet[1921]: E1216 13:19:31.723017 1921 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e13621c2-02f4-41d6-80b5-938bac2450b8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-fmtjs" podUID="e13621c2-02f4-41d6-80b5-938bac2450b8" Dec 16 13:19:38.496658 systemd[1]: Started sshd@7-164.92.94.164:22-139.178.89.65:57046.service. Dec 16 13:19:38.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-164.92.94.164:22-139.178.89.65:57046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:38.500127 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 16 13:19:38.500274 kernel: audit: type=1130 audit(1734355178.497:999): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-164.92.94.164:22-139.178.89.65:57046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:38.582000 audit[2973]: USER_ACCT pid=2973 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:38.586252 sshd[2973]: Accepted publickey for core from 139.178.89.65 port 57046 ssh2: RSA SHA256:Q+lFULKB/jVvshRdfdjHJzJxBGhdic6R851DS3iyBTE Dec 16 13:19:38.589177 kernel: audit: type=1101 audit(1734355178.582:1000): pid=2973 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:38.588000 audit[2973]: CRED_ACQ pid=2973 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:38.590674 sshd[2973]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 16 13:19:38.594172 kernel: audit: type=1103 audit(1734355178.588:1001): pid=2973 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:38.598186 kernel: audit: type=1006 audit(1734355178.588:1002): pid=2973 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Dec 16 13:19:38.588000 audit[2973]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc02b64150 a2=3 a3=0 items=0 ppid=1 pid=2973 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:38.603105 kernel: audit: type=1300 audit(1734355178.588:1002): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc02b64150 a2=3 a3=0 items=0 ppid=1 pid=2973 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:38.588000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 16 13:19:38.606121 kernel: audit: type=1327 audit(1734355178.588:1002): proctitle=737368643A20636F7265205B707269765D Dec 16 13:19:38.613272 systemd[1]: Started session-8.scope. Dec 16 13:19:38.613682 systemd-logind[1181]: New session 8 of user core. Dec 16 13:19:38.623000 audit[2973]: USER_START pid=2973 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:38.630123 kernel: audit: type=1105 audit(1734355178.623:1003): pid=2973 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:38.630292 kernel: audit: type=1103 audit(1734355178.628:1004): pid=2975 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:38.628000 audit[2975]: CRED_ACQ pid=2975 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:39.131251 sshd[2973]: pam_unix(sshd:session): session closed for user core Dec 16 13:19:39.134000 audit[2973]: USER_END pid=2973 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:39.141280 kernel: audit: type=1106 audit(1734355179.134:1005): pid=2973 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:39.140000 audit[2973]: CRED_DISP pid=2973 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:39.148363 kernel: audit: type=1104 audit(1734355179.140:1006): pid=2973 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:39.148888 systemd[1]: sshd@7-164.92.94.164:22-139.178.89.65:57046.service: Deactivated successfully. Dec 16 13:19:39.148000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-164.92.94.164:22-139.178.89.65:57046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:39.150249 systemd[1]: session-8.scope: Deactivated successfully. Dec 16 13:19:39.151305 systemd-logind[1181]: Session 8 logged out. Waiting for processes to exit. Dec 16 13:19:39.152942 systemd-logind[1181]: Removed session 8. Dec 16 13:19:39.587773 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1407040915.mount: Deactivated successfully. Dec 16 13:19:39.642800 env[1193]: time="2024-12-16T13:19:39.642726470Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:39.644871 env[1193]: time="2024-12-16T13:19:39.644813730Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:39.646800 env[1193]: time="2024-12-16T13:19:39.646752198Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:39.649160 env[1193]: time="2024-12-16T13:19:39.648938390Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:39.649868 env[1193]: time="2024-12-16T13:19:39.649811108Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 16 13:19:39.711119 env[1193]: time="2024-12-16T13:19:39.710844174Z" level=info msg="CreateContainer within sandbox \"870239a61cf2005b535f5a34ed9baf4382902dc2e36408bad9be7c0340bfbcb3\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 16 13:19:39.739248 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3721357348.mount: Deactivated successfully. Dec 16 13:19:39.744934 env[1193]: time="2024-12-16T13:19:39.744847556Z" level=info msg="CreateContainer within sandbox \"870239a61cf2005b535f5a34ed9baf4382902dc2e36408bad9be7c0340bfbcb3\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"80d7aaa1846544168d8dc4ad3c496f6a874d369a39dbade2b4b4570d925058e5\"" Dec 16 13:19:39.750081 env[1193]: time="2024-12-16T13:19:39.749738471Z" level=info msg="StartContainer for \"80d7aaa1846544168d8dc4ad3c496f6a874d369a39dbade2b4b4570d925058e5\"" Dec 16 13:19:39.793470 systemd[1]: Started cri-containerd-80d7aaa1846544168d8dc4ad3c496f6a874d369a39dbade2b4b4570d925058e5.scope. Dec 16 13:19:39.847000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:39.847000 audit[2993]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f097942bf08 items=0 ppid=2397 pid=2993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:39.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830643761616131383436353434313638643864633461643363343936 Dec 16 13:19:39.847000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:39.847000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:39.847000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:39.847000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:39.847000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:39.847000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:39.847000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:39.847000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:39.847000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:39.847000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:39.847000 audit: BPF prog-id=136 op=LOAD Dec 16 13:19:39.847000 audit[2993]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000383ac8 items=0 ppid=2397 pid=2993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:39.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830643761616131383436353434313638643864633461643363343936 Dec 16 13:19:39.847000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:39.847000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:39.847000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:39.847000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:39.847000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:39.847000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:39.847000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:39.847000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:39.847000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:39.847000 audit: BPF prog-id=137 op=LOAD Dec 16 13:19:39.847000 audit[2993]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000383b18 items=0 ppid=2397 pid=2993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:39.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830643761616131383436353434313638643864633461643363343936 Dec 16 13:19:39.848000 audit: BPF prog-id=137 op=UNLOAD Dec 16 13:19:39.848000 audit: BPF prog-id=136 op=UNLOAD Dec 16 13:19:39.848000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:39.848000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:39.848000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:39.848000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:39.848000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:39.848000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:39.848000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:39.848000 audit[2993]: AVC avc: denied { perfmon } for pid=2993 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:39.848000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:39.848000 audit[2993]: AVC avc: denied { bpf } for pid=2993 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:39.848000 audit: BPF prog-id=138 op=LOAD Dec 16 13:19:39.848000 audit[2993]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000383ba8 items=0 ppid=2397 pid=2993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:39.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830643761616131383436353434313638643864633461643363343936 Dec 16 13:19:39.973648 env[1193]: time="2024-12-16T13:19:39.973564406Z" level=info msg="StartContainer for \"80d7aaa1846544168d8dc4ad3c496f6a874d369a39dbade2b4b4570d925058e5\" returns successfully" Dec 16 13:19:40.629123 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 16 13:19:40.629373 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 16 13:19:40.716022 systemd[1]: run-containerd-runc-k8s.io-80d7aaa1846544168d8dc4ad3c496f6a874d369a39dbade2b4b4570d925058e5-runc.e5siUP.mount: Deactivated successfully. Dec 16 13:19:40.723341 kubelet[1921]: E1216 13:19:40.722870 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:19:40.764707 kubelet[1921]: I1216 13:19:40.764602 1921 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-zzqjq" podStartSLOduration=2.382584853 podStartE2EDuration="25.76363464s" podCreationTimestamp="2024-12-16 13:19:15 +0000 UTC" firstStartedPulling="2024-12-16 13:19:16.272805738 +0000 UTC m=+21.066282646" lastFinishedPulling="2024-12-16 13:19:39.653855513 +0000 UTC m=+44.447332433" observedRunningTime="2024-12-16 13:19:40.762164018 +0000 UTC m=+45.555640937" watchObservedRunningTime="2024-12-16 13:19:40.76363464 +0000 UTC m=+45.557111560" Dec 16 13:19:41.434660 env[1193]: time="2024-12-16T13:19:41.434591194Z" level=info msg="StopPodSandbox for \"9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041\"" Dec 16 13:19:41.671703 kubelet[1921]: E1216 13:19:41.671641 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:19:41.714833 systemd[1]: run-containerd-runc-k8s.io-80d7aaa1846544168d8dc4ad3c496f6a874d369a39dbade2b4b4570d925058e5-runc.Ao5Eaa.mount: Deactivated successfully. Dec 16 13:19:41.742465 env[1193]: 2024-12-16 13:19:41.528 [INFO][3083] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" Dec 16 13:19:41.742465 env[1193]: 2024-12-16 13:19:41.530 [INFO][3083] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" iface="eth0" netns="/var/run/netns/cni-1d0096a8-0dd4-63ef-c49a-2eb2837c987d" Dec 16 13:19:41.742465 env[1193]: 2024-12-16 13:19:41.530 [INFO][3083] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" iface="eth0" netns="/var/run/netns/cni-1d0096a8-0dd4-63ef-c49a-2eb2837c987d" Dec 16 13:19:41.742465 env[1193]: 2024-12-16 13:19:41.531 [INFO][3083] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" iface="eth0" netns="/var/run/netns/cni-1d0096a8-0dd4-63ef-c49a-2eb2837c987d" Dec 16 13:19:41.742465 env[1193]: 2024-12-16 13:19:41.531 [INFO][3083] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" Dec 16 13:19:41.742465 env[1193]: 2024-12-16 13:19:41.531 [INFO][3083] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" Dec 16 13:19:41.742465 env[1193]: 2024-12-16 13:19:41.690 [INFO][3089] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" HandleID="k8s-pod-network.9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" Workload="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--8rqzt-eth0" Dec 16 13:19:41.742465 env[1193]: 2024-12-16 13:19:41.693 [INFO][3089] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 16 13:19:41.742465 env[1193]: 2024-12-16 13:19:41.693 [INFO][3089] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 16 13:19:41.742465 env[1193]: 2024-12-16 13:19:41.732 [WARNING][3089] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" HandleID="k8s-pod-network.9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" Workload="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--8rqzt-eth0" Dec 16 13:19:41.742465 env[1193]: 2024-12-16 13:19:41.732 [INFO][3089] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" HandleID="k8s-pod-network.9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" Workload="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--8rqzt-eth0" Dec 16 13:19:41.742465 env[1193]: 2024-12-16 13:19:41.736 [INFO][3089] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 16 13:19:41.742465 env[1193]: 2024-12-16 13:19:41.739 [INFO][3083] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" Dec 16 13:19:41.749876 env[1193]: time="2024-12-16T13:19:41.748641784Z" level=info msg="TearDown network for sandbox \"9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041\" successfully" Dec 16 13:19:41.749876 env[1193]: time="2024-12-16T13:19:41.748715792Z" level=info msg="StopPodSandbox for \"9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041\" returns successfully" Dec 16 13:19:41.746764 systemd[1]: run-netns-cni\x2d1d0096a8\x2d0dd4\x2d63ef\x2dc49a\x2d2eb2837c987d.mount: Deactivated successfully. Dec 16 13:19:41.751088 env[1193]: time="2024-12-16T13:19:41.751015593Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-78458c5f95-8rqzt,Uid:b2f42d08-5884-4b97-8d28-7b9e8434133d,Namespace:calico-apiserver,Attempt:1,}" Dec 16 13:19:42.036582 systemd-networkd[1003]: cali2d4673266bd: Link UP Dec 16 13:19:42.040371 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 16 13:19:42.040964 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2d4673266bd: link becomes ready Dec 16 13:19:42.042183 systemd-networkd[1003]: cali2d4673266bd: Gained carrier Dec 16 13:19:42.067178 env[1193]: 2024-12-16 13:19:41.827 [INFO][3112] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 16 13:19:42.067178 env[1193]: 2024-12-16 13:19:41.863 [INFO][3112] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--8rqzt-eth0 calico-apiserver-78458c5f95- calico-apiserver b2f42d08-5884-4b97-8d28-7b9e8434133d 869 0 2024-12-16 13:19:15 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:78458c5f95 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.6-6-0e268b98cf calico-apiserver-78458c5f95-8rqzt eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali2d4673266bd [] []}} ContainerID="f8346740bd605f9bade63fa377caf2c687c702ccfda62fa1f5c45b23ca60eec6" Namespace="calico-apiserver" Pod="calico-apiserver-78458c5f95-8rqzt" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--8rqzt-" Dec 16 13:19:42.067178 env[1193]: 2024-12-16 13:19:41.864 [INFO][3112] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f8346740bd605f9bade63fa377caf2c687c702ccfda62fa1f5c45b23ca60eec6" Namespace="calico-apiserver" Pod="calico-apiserver-78458c5f95-8rqzt" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--8rqzt-eth0" Dec 16 13:19:42.067178 env[1193]: 2024-12-16 13:19:41.940 [INFO][3128] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f8346740bd605f9bade63fa377caf2c687c702ccfda62fa1f5c45b23ca60eec6" HandleID="k8s-pod-network.f8346740bd605f9bade63fa377caf2c687c702ccfda62fa1f5c45b23ca60eec6" Workload="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--8rqzt-eth0" Dec 16 13:19:42.067178 env[1193]: 2024-12-16 13:19:41.957 [INFO][3128] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f8346740bd605f9bade63fa377caf2c687c702ccfda62fa1f5c45b23ca60eec6" HandleID="k8s-pod-network.f8346740bd605f9bade63fa377caf2c687c702ccfda62fa1f5c45b23ca60eec6" Workload="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--8rqzt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00011df00), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.6-6-0e268b98cf", "pod":"calico-apiserver-78458c5f95-8rqzt", "timestamp":"2024-12-16 13:19:41.940347321 +0000 UTC"}, Hostname:"ci-3510.3.6-6-0e268b98cf", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 16 13:19:42.067178 env[1193]: 2024-12-16 13:19:41.957 [INFO][3128] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 16 13:19:42.067178 env[1193]: 2024-12-16 13:19:41.957 [INFO][3128] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 16 13:19:42.067178 env[1193]: 2024-12-16 13:19:41.957 [INFO][3128] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-6-0e268b98cf' Dec 16 13:19:42.067178 env[1193]: 2024-12-16 13:19:41.962 [INFO][3128] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f8346740bd605f9bade63fa377caf2c687c702ccfda62fa1f5c45b23ca60eec6" host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:42.067178 env[1193]: 2024-12-16 13:19:41.974 [INFO][3128] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:42.067178 env[1193]: 2024-12-16 13:19:41.984 [INFO][3128] ipam/ipam.go 489: Trying affinity for 192.168.3.192/26 host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:42.067178 env[1193]: 2024-12-16 13:19:41.988 [INFO][3128] ipam/ipam.go 155: Attempting to load block cidr=192.168.3.192/26 host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:42.067178 env[1193]: 2024-12-16 13:19:41.993 [INFO][3128] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.3.192/26 host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:42.067178 env[1193]: 2024-12-16 13:19:41.993 [INFO][3128] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.3.192/26 handle="k8s-pod-network.f8346740bd605f9bade63fa377caf2c687c702ccfda62fa1f5c45b23ca60eec6" host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:42.067178 env[1193]: 2024-12-16 13:19:41.997 [INFO][3128] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.f8346740bd605f9bade63fa377caf2c687c702ccfda62fa1f5c45b23ca60eec6 Dec 16 13:19:42.067178 env[1193]: 2024-12-16 13:19:42.004 [INFO][3128] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.3.192/26 handle="k8s-pod-network.f8346740bd605f9bade63fa377caf2c687c702ccfda62fa1f5c45b23ca60eec6" host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:42.067178 env[1193]: 2024-12-16 13:19:42.012 [INFO][3128] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.3.193/26] block=192.168.3.192/26 handle="k8s-pod-network.f8346740bd605f9bade63fa377caf2c687c702ccfda62fa1f5c45b23ca60eec6" host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:42.067178 env[1193]: 2024-12-16 13:19:42.012 [INFO][3128] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.3.193/26] handle="k8s-pod-network.f8346740bd605f9bade63fa377caf2c687c702ccfda62fa1f5c45b23ca60eec6" host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:42.067178 env[1193]: 2024-12-16 13:19:42.012 [INFO][3128] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 16 13:19:42.067178 env[1193]: 2024-12-16 13:19:42.012 [INFO][3128] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.3.193/26] IPv6=[] ContainerID="f8346740bd605f9bade63fa377caf2c687c702ccfda62fa1f5c45b23ca60eec6" HandleID="k8s-pod-network.f8346740bd605f9bade63fa377caf2c687c702ccfda62fa1f5c45b23ca60eec6" Workload="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--8rqzt-eth0" Dec 16 13:19:42.068404 env[1193]: 2024-12-16 13:19:42.017 [INFO][3112] cni-plugin/k8s.go 386: Populated endpoint ContainerID="f8346740bd605f9bade63fa377caf2c687c702ccfda62fa1f5c45b23ca60eec6" Namespace="calico-apiserver" Pod="calico-apiserver-78458c5f95-8rqzt" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--8rqzt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--8rqzt-eth0", GenerateName:"calico-apiserver-78458c5f95-", Namespace:"calico-apiserver", SelfLink:"", UID:"b2f42d08-5884-4b97-8d28-7b9e8434133d", ResourceVersion:"869", Generation:0, CreationTimestamp:time.Date(2024, time.December, 16, 13, 19, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"78458c5f95", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-6-0e268b98cf", ContainerID:"", Pod:"calico-apiserver-78458c5f95-8rqzt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.3.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2d4673266bd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 16 13:19:42.068404 env[1193]: 2024-12-16 13:19:42.017 [INFO][3112] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.3.193/32] ContainerID="f8346740bd605f9bade63fa377caf2c687c702ccfda62fa1f5c45b23ca60eec6" Namespace="calico-apiserver" Pod="calico-apiserver-78458c5f95-8rqzt" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--8rqzt-eth0" Dec 16 13:19:42.068404 env[1193]: 2024-12-16 13:19:42.017 [INFO][3112] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2d4673266bd ContainerID="f8346740bd605f9bade63fa377caf2c687c702ccfda62fa1f5c45b23ca60eec6" Namespace="calico-apiserver" Pod="calico-apiserver-78458c5f95-8rqzt" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--8rqzt-eth0" Dec 16 13:19:42.068404 env[1193]: 2024-12-16 13:19:42.041 [INFO][3112] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f8346740bd605f9bade63fa377caf2c687c702ccfda62fa1f5c45b23ca60eec6" Namespace="calico-apiserver" Pod="calico-apiserver-78458c5f95-8rqzt" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--8rqzt-eth0" Dec 16 13:19:42.068404 env[1193]: 2024-12-16 13:19:42.043 [INFO][3112] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f8346740bd605f9bade63fa377caf2c687c702ccfda62fa1f5c45b23ca60eec6" Namespace="calico-apiserver" Pod="calico-apiserver-78458c5f95-8rqzt" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--8rqzt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--8rqzt-eth0", GenerateName:"calico-apiserver-78458c5f95-", Namespace:"calico-apiserver", SelfLink:"", UID:"b2f42d08-5884-4b97-8d28-7b9e8434133d", ResourceVersion:"869", Generation:0, CreationTimestamp:time.Date(2024, time.December, 16, 13, 19, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"78458c5f95", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-6-0e268b98cf", ContainerID:"f8346740bd605f9bade63fa377caf2c687c702ccfda62fa1f5c45b23ca60eec6", Pod:"calico-apiserver-78458c5f95-8rqzt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.3.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2d4673266bd", MAC:"3a:a0:73:c3:82:5c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 16 13:19:42.068404 env[1193]: 2024-12-16 13:19:42.063 [INFO][3112] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="f8346740bd605f9bade63fa377caf2c687c702ccfda62fa1f5c45b23ca60eec6" Namespace="calico-apiserver" Pod="calico-apiserver-78458c5f95-8rqzt" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--8rqzt-eth0" Dec 16 13:19:42.097458 env[1193]: time="2024-12-16T13:19:42.097307502Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 16 13:19:42.097722 env[1193]: time="2024-12-16T13:19:42.097677271Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 16 13:19:42.097974 env[1193]: time="2024-12-16T13:19:42.097929841Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 16 13:19:42.099097 env[1193]: time="2024-12-16T13:19:42.098600195Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f8346740bd605f9bade63fa377caf2c687c702ccfda62fa1f5c45b23ca60eec6 pid=3156 runtime=io.containerd.runc.v2 Dec 16 13:19:42.119783 systemd[1]: Started cri-containerd-f8346740bd605f9bade63fa377caf2c687c702ccfda62fa1f5c45b23ca60eec6.scope. Dec 16 13:19:42.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.141000 audit: BPF prog-id=139 op=LOAD Dec 16 13:19:42.143000 audit[3167]: AVC avc: denied { bpf } for pid=3167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.143000 audit[3167]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3156 pid=3167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638333436373430626436303566396261646536336661333737636166 Dec 16 13:19:42.143000 audit[3167]: AVC avc: denied { perfmon } for pid=3167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.143000 audit[3167]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3156 pid=3167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638333436373430626436303566396261646536336661333737636166 Dec 16 13:19:42.143000 audit[3167]: AVC avc: denied { bpf } for pid=3167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.143000 audit[3167]: AVC avc: denied { bpf } for pid=3167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.143000 audit[3167]: AVC avc: denied { bpf } for pid=3167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.143000 audit[3167]: AVC avc: denied { perfmon } for pid=3167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.143000 audit[3167]: AVC avc: denied { perfmon } for pid=3167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.143000 audit[3167]: AVC avc: denied { perfmon } for pid=3167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.143000 audit[3167]: AVC avc: denied { perfmon } for pid=3167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.143000 audit[3167]: AVC avc: denied { perfmon } for pid=3167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.143000 audit[3167]: AVC avc: denied { bpf } for pid=3167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.143000 audit[3167]: AVC avc: denied { bpf } for pid=3167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.143000 audit: BPF prog-id=140 op=LOAD Dec 16 13:19:42.143000 audit[3167]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00018bf20 items=0 ppid=3156 pid=3167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638333436373430626436303566396261646536336661333737636166 Dec 16 13:19:42.143000 audit[3167]: AVC avc: denied { bpf } for pid=3167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.143000 audit[3167]: AVC avc: denied { bpf } for pid=3167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.143000 audit[3167]: AVC avc: denied { perfmon } for pid=3167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.143000 audit[3167]: AVC avc: denied { perfmon } for pid=3167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.143000 audit[3167]: AVC avc: denied { perfmon } for pid=3167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.143000 audit[3167]: AVC avc: denied { perfmon } for pid=3167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.143000 audit[3167]: AVC avc: denied { perfmon } for pid=3167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.143000 audit[3167]: AVC avc: denied { bpf } for pid=3167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.143000 audit[3167]: AVC avc: denied { bpf } for pid=3167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.143000 audit: BPF prog-id=141 op=LOAD Dec 16 13:19:42.143000 audit[3167]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00018bf68 items=0 ppid=3156 pid=3167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638333436373430626436303566396261646536336661333737636166 Dec 16 13:19:42.144000 audit: BPF prog-id=141 op=UNLOAD Dec 16 13:19:42.144000 audit: BPF prog-id=140 op=UNLOAD Dec 16 13:19:42.144000 audit[3167]: AVC avc: denied { bpf } for pid=3167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.144000 audit[3167]: AVC avc: denied { bpf } for pid=3167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.144000 audit[3167]: AVC avc: denied { bpf } for pid=3167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.144000 audit[3167]: AVC avc: denied { perfmon } for pid=3167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.144000 audit[3167]: AVC avc: denied { perfmon } for pid=3167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.144000 audit[3167]: AVC avc: denied { perfmon } for pid=3167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.144000 audit[3167]: AVC avc: denied { perfmon } for pid=3167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.144000 audit[3167]: AVC avc: denied { perfmon } for pid=3167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.144000 audit[3167]: AVC avc: denied { bpf } for pid=3167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.144000 audit[3167]: AVC avc: denied { bpf } for pid=3167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.144000 audit: BPF prog-id=142 op=LOAD Dec 16 13:19:42.144000 audit[3167]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c2378 items=0 ppid=3156 pid=3167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638333436373430626436303566396261646536336661333737636166 Dec 16 13:19:42.202545 env[1193]: time="2024-12-16T13:19:42.202475677Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-78458c5f95-8rqzt,Uid:b2f42d08-5884-4b97-8d28-7b9e8434133d,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"f8346740bd605f9bade63fa377caf2c687c702ccfda62fa1f5c45b23ca60eec6\"" Dec 16 13:19:42.206027 env[1193]: time="2024-12-16T13:19:42.205935411Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 16 13:19:42.251000 audit[3227]: AVC avc: denied { write } for pid=3227 comm="tee" name="fd" dev="proc" ino=24838 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 16 13:19:42.251000 audit[3227]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe5070fa09 a2=241 a3=1b6 items=1 ppid=3200 pid=3227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.251000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 16 13:19:42.251000 audit: PATH item=0 name="/dev/fd/63" inode=24565 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:42.251000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 16 13:19:42.329000 audit[3246]: AVC avc: denied { write } for pid=3246 comm="tee" name="fd" dev="proc" ino=24871 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 16 13:19:42.329000 audit[3246]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff902d2a09 a2=241 a3=1b6 items=1 ppid=3207 pid=3246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.329000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 16 13:19:42.329000 audit: PATH item=0 name="/dev/fd/63" inode=24853 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:42.329000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 16 13:19:42.349000 audit[3263]: AVC avc: denied { write } for pid=3263 comm="tee" name="fd" dev="proc" ino=25616 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 16 13:19:42.349000 audit[3263]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffdde16a09 a2=241 a3=1b6 items=1 ppid=3210 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.349000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 16 13:19:42.349000 audit: PATH item=0 name="/dev/fd/63" inode=24866 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:42.349000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 16 13:19:42.354000 audit[3253]: AVC avc: denied { write } for pid=3253 comm="tee" name="fd" dev="proc" ino=24879 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 16 13:19:42.367000 audit[3256]: AVC avc: denied { write } for pid=3256 comm="tee" name="fd" dev="proc" ino=24882 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 16 13:19:42.354000 audit[3253]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd459049f9 a2=241 a3=1b6 items=1 ppid=3205 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.354000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 16 13:19:42.354000 audit: PATH item=0 name="/dev/fd/63" inode=24862 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:42.354000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 16 13:19:42.376000 audit[3261]: AVC avc: denied { write } for pid=3261 comm="tee" name="fd" dev="proc" ino=25627 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 16 13:19:42.376000 audit[3261]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff583009fa a2=241 a3=1b6 items=1 ppid=3214 pid=3261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.376000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 16 13:19:42.376000 audit: PATH item=0 name="/dev/fd/63" inode=25612 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:42.376000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 16 13:19:42.367000 audit[3256]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcd483ba0a a2=241 a3=1b6 items=1 ppid=3208 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.367000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 16 13:19:42.367000 audit: PATH item=0 name="/dev/fd/63" inode=24865 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:42.367000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 16 13:19:42.383000 audit[3267]: AVC avc: denied { write } for pid=3267 comm="tee" name="fd" dev="proc" ino=24887 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 16 13:19:42.383000 audit[3267]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff585ada0b a2=241 a3=1b6 items=1 ppid=3199 pid=3267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.383000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 16 13:19:42.383000 audit: PATH item=0 name="/dev/fd/63" inode=25613 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 16 13:19:42.383000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 16 13:19:42.661000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.661000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.661000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.661000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.661000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.661000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.661000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.661000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.661000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.661000 audit: BPF prog-id=143 op=LOAD Dec 16 13:19:42.661000 audit[3289]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffde1f78000 a2=98 a3=3 items=0 ppid=3202 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.661000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:19:42.663000 audit: BPF prog-id=143 op=UNLOAD Dec 16 13:19:42.674000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.674000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.674000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.674000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.674000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.674000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.674000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.674000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.674000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.674000 audit: BPF prog-id=144 op=LOAD Dec 16 13:19:42.674000 audit[3289]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffde1f77de0 a2=74 a3=540051 items=0 ppid=3202 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.674000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:19:42.674000 audit: BPF prog-id=144 op=UNLOAD Dec 16 13:19:42.674000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.674000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.674000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.674000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.674000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.674000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.674000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.674000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.674000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.674000 audit: BPF prog-id=145 op=LOAD Dec 16 13:19:42.674000 audit[3289]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffde1f77e10 a2=94 a3=2 items=0 ppid=3202 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.674000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:19:42.674000 audit: BPF prog-id=145 op=UNLOAD Dec 16 13:19:42.919000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.919000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.919000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.919000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.919000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.919000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.919000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.919000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.919000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.919000 audit: BPF prog-id=146 op=LOAD Dec 16 13:19:42.919000 audit[3289]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffde1f77cd0 a2=40 a3=1 items=0 ppid=3202 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.919000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:19:42.922000 audit: BPF prog-id=146 op=UNLOAD Dec 16 13:19:42.922000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.922000 audit[3289]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffde1f77da0 a2=50 a3=7ffde1f77e80 items=0 ppid=3202 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.922000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:19:42.939000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.939000 audit[3289]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffde1f77ce0 a2=28 a3=0 items=0 ppid=3202 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.939000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:19:42.940000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.940000 audit[3289]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffde1f77d10 a2=28 a3=0 items=0 ppid=3202 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.940000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:19:42.941000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.941000 audit[3289]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffde1f77c20 a2=28 a3=0 items=0 ppid=3202 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.941000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:19:42.941000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.941000 audit[3289]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffde1f77d30 a2=28 a3=0 items=0 ppid=3202 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.941000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:19:42.942000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.942000 audit[3289]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffde1f77d10 a2=28 a3=0 items=0 ppid=3202 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.942000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:19:42.942000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.942000 audit[3289]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffde1f77d00 a2=28 a3=0 items=0 ppid=3202 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.942000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:19:42.942000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.942000 audit[3289]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffde1f77d30 a2=28 a3=0 items=0 ppid=3202 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.942000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:19:42.942000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.942000 audit[3289]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffde1f77d10 a2=28 a3=0 items=0 ppid=3202 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.942000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:19:42.942000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.942000 audit[3289]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffde1f77d30 a2=28 a3=0 items=0 ppid=3202 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.942000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:19:42.942000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.942000 audit[3289]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffde1f77d00 a2=28 a3=0 items=0 ppid=3202 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.942000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:19:42.943000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.943000 audit[3289]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffde1f77d70 a2=28 a3=0 items=0 ppid=3202 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.943000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:19:42.943000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.943000 audit[3289]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffde1f77b20 a2=50 a3=1 items=0 ppid=3202 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.943000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:19:42.943000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.943000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.943000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.943000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.943000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.943000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.943000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.943000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.943000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.943000 audit: BPF prog-id=147 op=LOAD Dec 16 13:19:42.943000 audit[3289]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffde1f77b20 a2=94 a3=5 items=0 ppid=3202 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.943000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:19:42.943000 audit: BPF prog-id=147 op=UNLOAD Dec 16 13:19:42.943000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.943000 audit[3289]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffde1f77bd0 a2=50 a3=1 items=0 ppid=3202 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.943000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:19:42.943000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.943000 audit[3289]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffde1f77cf0 a2=4 a3=38 items=0 ppid=3202 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.943000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:19:42.943000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.943000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.943000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.943000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.943000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.943000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.943000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.943000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.943000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.943000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.943000 audit[3289]: AVC avc: denied { confidentiality } for pid=3289 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:19:42.943000 audit[3289]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffde1f77d40 a2=94 a3=6 items=0 ppid=3202 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.943000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:19:42.943000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.943000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.943000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.943000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.943000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.943000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.943000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.943000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.943000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.943000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.943000 audit[3289]: AVC avc: denied { confidentiality } for pid=3289 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:19:42.943000 audit[3289]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffde1f774f0 a2=94 a3=83 items=0 ppid=3202 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.943000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:19:42.944000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.944000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.944000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.944000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.944000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.944000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.944000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.944000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.944000 audit[3289]: AVC avc: denied { perfmon } for pid=3289 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.944000 audit[3289]: AVC avc: denied { bpf } for pid=3289 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.944000 audit[3289]: AVC avc: denied { confidentiality } for pid=3289 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:19:42.944000 audit[3289]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffde1f774f0 a2=94 a3=83 items=0 ppid=3202 pid=3289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.944000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 16 13:19:42.961000 audit[3313]: AVC avc: denied { bpf } for pid=3313 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.961000 audit[3313]: AVC avc: denied { bpf } for pid=3313 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.961000 audit[3313]: AVC avc: denied { perfmon } for pid=3313 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.961000 audit[3313]: AVC avc: denied { perfmon } for pid=3313 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.961000 audit[3313]: AVC avc: denied { perfmon } for pid=3313 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.961000 audit[3313]: AVC avc: denied { perfmon } for pid=3313 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.961000 audit[3313]: AVC avc: denied { perfmon } for pid=3313 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.961000 audit[3313]: AVC avc: denied { bpf } for pid=3313 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.961000 audit[3313]: AVC avc: denied { bpf } for pid=3313 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.961000 audit: BPF prog-id=148 op=LOAD Dec 16 13:19:42.961000 audit[3313]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd17b0dae0 a2=98 a3=1999999999999999 items=0 ppid=3202 pid=3313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.961000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 16 13:19:42.962000 audit: BPF prog-id=148 op=UNLOAD Dec 16 13:19:42.962000 audit[3313]: AVC avc: denied { bpf } for pid=3313 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.962000 audit[3313]: AVC avc: denied { bpf } for pid=3313 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.962000 audit[3313]: AVC avc: denied { perfmon } for pid=3313 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.962000 audit[3313]: AVC avc: denied { perfmon } for pid=3313 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.962000 audit[3313]: AVC avc: denied { perfmon } for pid=3313 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.962000 audit[3313]: AVC avc: denied { perfmon } for pid=3313 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.962000 audit[3313]: AVC avc: denied { perfmon } for pid=3313 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.962000 audit[3313]: AVC avc: denied { bpf } for pid=3313 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.962000 audit[3313]: AVC avc: denied { bpf } for pid=3313 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.962000 audit: BPF prog-id=149 op=LOAD Dec 16 13:19:42.962000 audit[3313]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd17b0d9c0 a2=74 a3=ffff items=0 ppid=3202 pid=3313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.962000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 16 13:19:42.964000 audit: BPF prog-id=149 op=UNLOAD Dec 16 13:19:42.964000 audit[3313]: AVC avc: denied { bpf } for pid=3313 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.964000 audit[3313]: AVC avc: denied { bpf } for pid=3313 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.964000 audit[3313]: AVC avc: denied { perfmon } for pid=3313 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.964000 audit[3313]: AVC avc: denied { perfmon } for pid=3313 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.964000 audit[3313]: AVC avc: denied { perfmon } for pid=3313 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.964000 audit[3313]: AVC avc: denied { perfmon } for pid=3313 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.964000 audit[3313]: AVC avc: denied { perfmon } for pid=3313 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.964000 audit[3313]: AVC avc: denied { bpf } for pid=3313 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.964000 audit[3313]: AVC avc: denied { bpf } for pid=3313 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:42.964000 audit: BPF prog-id=150 op=LOAD Dec 16 13:19:42.964000 audit[3313]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd17b0da00 a2=40 a3=7ffd17b0dbe0 items=0 ppid=3202 pid=3313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:42.964000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 16 13:19:42.965000 audit: BPF prog-id=150 op=UNLOAD Dec 16 13:19:43.065980 systemd-networkd[1003]: vxlan.calico: Link UP Dec 16 13:19:43.065993 systemd-networkd[1003]: vxlan.calico: Gained carrier Dec 16 13:19:43.121000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.121000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.121000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.121000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.121000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.121000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.121000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.121000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.121000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.121000 audit: BPF prog-id=151 op=LOAD Dec 16 13:19:43.121000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd91e6df20 a2=98 a3=ffffffff items=0 ppid=3202 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.121000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:19:43.121000 audit: BPF prog-id=151 op=UNLOAD Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit: BPF prog-id=152 op=LOAD Dec 16 13:19:43.122000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd91e6dd30 a2=74 a3=540051 items=0 ppid=3202 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.122000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:19:43.122000 audit: BPF prog-id=152 op=UNLOAD Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit: BPF prog-id=153 op=LOAD Dec 16 13:19:43.122000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd91e6dd60 a2=94 a3=2 items=0 ppid=3202 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.122000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:19:43.122000 audit: BPF prog-id=153 op=UNLOAD Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd91e6dc30 a2=28 a3=0 items=0 ppid=3202 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.122000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd91e6dc60 a2=28 a3=0 items=0 ppid=3202 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.122000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd91e6db70 a2=28 a3=0 items=0 ppid=3202 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.122000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd91e6dc80 a2=28 a3=0 items=0 ppid=3202 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.122000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd91e6dc60 a2=28 a3=0 items=0 ppid=3202 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.122000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd91e6dc50 a2=28 a3=0 items=0 ppid=3202 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.122000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd91e6dc80 a2=28 a3=0 items=0 ppid=3202 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.122000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd91e6dc60 a2=28 a3=0 items=0 ppid=3202 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.122000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd91e6dc80 a2=28 a3=0 items=0 ppid=3202 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.122000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd91e6dc50 a2=28 a3=0 items=0 ppid=3202 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.122000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd91e6dcc0 a2=28 a3=0 items=0 ppid=3202 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.122000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.122000 audit: BPF prog-id=154 op=LOAD Dec 16 13:19:43.122000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd91e6db30 a2=40 a3=0 items=0 ppid=3202 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.122000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:19:43.122000 audit: BPF prog-id=154 op=UNLOAD Dec 16 13:19:43.123000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.123000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd91e6db20 a2=50 a3=2800 items=0 ppid=3202 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.123000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:19:43.123000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.123000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffd91e6db20 a2=50 a3=2800 items=0 ppid=3202 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.123000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:19:43.123000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.123000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.123000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.123000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.123000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.123000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.123000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.123000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.123000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.123000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.123000 audit: BPF prog-id=155 op=LOAD Dec 16 13:19:43.123000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd91e6d340 a2=94 a3=2 items=0 ppid=3202 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.123000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:19:43.123000 audit: BPF prog-id=155 op=UNLOAD Dec 16 13:19:43.123000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.123000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.123000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.123000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.123000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.123000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.123000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.123000 audit[3340]: AVC avc: denied { perfmon } for pid=3340 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.123000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.123000 audit[3340]: AVC avc: denied { bpf } for pid=3340 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.123000 audit: BPF prog-id=156 op=LOAD Dec 16 13:19:43.123000 audit[3340]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd91e6d440 a2=94 a3=2d items=0 ppid=3202 pid=3340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.123000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 16 13:19:43.131000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.131000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.131000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.131000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.131000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.131000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.131000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.131000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.131000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.131000 audit: BPF prog-id=157 op=LOAD Dec 16 13:19:43.131000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd7b1f8a70 a2=98 a3=0 items=0 ppid=3202 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.131000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:19:43.131000 audit: BPF prog-id=157 op=UNLOAD Dec 16 13:19:43.131000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.131000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.131000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.131000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.131000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.131000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.131000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.131000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.131000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.131000 audit: BPF prog-id=158 op=LOAD Dec 16 13:19:43.131000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd7b1f8850 a2=74 a3=540051 items=0 ppid=3202 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.131000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:19:43.132000 audit: BPF prog-id=158 op=UNLOAD Dec 16 13:19:43.132000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.132000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.132000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.132000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.132000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.132000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.132000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.132000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.132000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.132000 audit: BPF prog-id=159 op=LOAD Dec 16 13:19:43.132000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd7b1f8880 a2=94 a3=2 items=0 ppid=3202 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.132000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:19:43.132000 audit: BPF prog-id=159 op=UNLOAD Dec 16 13:19:43.358000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.358000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.358000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.358000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.358000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.358000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.358000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.358000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.358000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.358000 audit: BPF prog-id=160 op=LOAD Dec 16 13:19:43.358000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd7b1f8740 a2=40 a3=1 items=0 ppid=3202 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.358000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:19:43.359000 audit: BPF prog-id=160 op=UNLOAD Dec 16 13:19:43.359000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.359000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd7b1f8810 a2=50 a3=7ffd7b1f88f0 items=0 ppid=3202 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.359000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:19:43.375000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.375000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd7b1f8750 a2=28 a3=0 items=0 ppid=3202 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.375000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:19:43.375000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.375000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd7b1f8780 a2=28 a3=0 items=0 ppid=3202 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.375000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:19:43.375000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.375000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd7b1f8690 a2=28 a3=0 items=0 ppid=3202 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.375000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:19:43.375000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.375000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd7b1f87a0 a2=28 a3=0 items=0 ppid=3202 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.375000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:19:43.375000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.375000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd7b1f8780 a2=28 a3=0 items=0 ppid=3202 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.375000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:19:43.375000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.375000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd7b1f8770 a2=28 a3=0 items=0 ppid=3202 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.375000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:19:43.375000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.375000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd7b1f87a0 a2=28 a3=0 items=0 ppid=3202 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.375000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:19:43.375000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.375000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd7b1f8780 a2=28 a3=0 items=0 ppid=3202 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.375000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:19:43.375000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.375000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd7b1f87a0 a2=28 a3=0 items=0 ppid=3202 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.375000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:19:43.375000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.375000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd7b1f8770 a2=28 a3=0 items=0 ppid=3202 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.375000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:19:43.376000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.376000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd7b1f87e0 a2=28 a3=0 items=0 ppid=3202 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.376000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:19:43.376000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.376000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd7b1f8590 a2=50 a3=1 items=0 ppid=3202 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.376000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:19:43.376000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.376000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.376000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.376000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.376000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.376000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.376000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.376000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.376000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.376000 audit: BPF prog-id=161 op=LOAD Dec 16 13:19:43.376000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd7b1f8590 a2=94 a3=5 items=0 ppid=3202 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.376000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:19:43.376000 audit: BPF prog-id=161 op=UNLOAD Dec 16 13:19:43.376000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.376000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd7b1f8640 a2=50 a3=1 items=0 ppid=3202 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.376000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:19:43.376000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.376000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd7b1f8760 a2=4 a3=38 items=0 ppid=3202 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.376000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:19:43.376000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.376000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.376000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.376000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.376000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.376000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.376000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.376000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.376000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.376000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.376000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:19:43.376000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd7b1f87b0 a2=94 a3=6 items=0 ppid=3202 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.376000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:19:43.377000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.377000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.377000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.377000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.377000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.377000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.377000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.377000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.377000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.377000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.377000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:19:43.377000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd7b1f7f60 a2=94 a3=83 items=0 ppid=3202 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.377000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:19:43.377000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.377000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.377000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.377000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.377000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.377000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.377000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.377000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.377000 audit[3342]: AVC avc: denied { perfmon } for pid=3342 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.377000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.377000 audit[3342]: AVC avc: denied { confidentiality } for pid=3342 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 16 13:19:43.377000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd7b1f7f60 a2=94 a3=83 items=0 ppid=3202 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.377000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:19:43.378000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.378000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd7b1f99a0 a2=10 a3=f1f00800 items=0 ppid=3202 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.378000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:19:43.378000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.378000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd7b1f9840 a2=10 a3=3 items=0 ppid=3202 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.378000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:19:43.378000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.378000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd7b1f97e0 a2=10 a3=3 items=0 ppid=3202 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.378000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:19:43.378000 audit[3342]: AVC avc: denied { bpf } for pid=3342 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:43.378000 audit[3342]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd7b1f97e0 a2=10 a3=7 items=0 ppid=3202 pid=3342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.378000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 16 13:19:43.394000 audit: BPF prog-id=156 op=UNLOAD Dec 16 13:19:43.435583 env[1193]: time="2024-12-16T13:19:43.435521698Z" level=info msg="StopPodSandbox for \"79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764\"" Dec 16 13:19:43.436992 env[1193]: time="2024-12-16T13:19:43.436345960Z" level=info msg="StopPodSandbox for \"d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32\"" Dec 16 13:19:43.525787 systemd-networkd[1003]: cali2d4673266bd: Gained IPv6LL Dec 16 13:19:43.551517 kernel: kauditd_printk_skb: 604 callbacks suppressed Dec 16 13:19:43.551734 kernel: audit: type=1325 audit(1734355183.537:1130): table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3408 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 16 13:19:43.552128 kernel: audit: type=1300 audit(1734355183.537:1130): arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd9e2cc200 a2=0 a3=7ffd9e2cc1ec items=0 ppid=3202 pid=3408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.552198 kernel: audit: type=1327 audit(1734355183.537:1130): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 16 13:19:43.537000 audit[3408]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3408 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 16 13:19:43.537000 audit[3408]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd9e2cc200 a2=0 a3=7ffd9e2cc1ec items=0 ppid=3202 pid=3408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.537000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 16 13:19:43.578000 audit[3407]: NETFILTER_CFG table=raw:98 family=2 entries=21 op=nft_register_chain pid=3407 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 16 13:19:43.581221 kernel: audit: type=1325 audit(1734355183.578:1131): table=raw:98 family=2 entries=21 op=nft_register_chain pid=3407 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 16 13:19:43.578000 audit[3407]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd5c022b30 a2=0 a3=7ffd5c022b1c items=0 ppid=3202 pid=3407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.587704 kernel: audit: type=1300 audit(1734355183.578:1131): arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd5c022b30 a2=0 a3=7ffd5c022b1c items=0 ppid=3202 pid=3407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.587887 kernel: audit: type=1325 audit(1734355183.580:1132): table=filter:99 family=2 entries=75 op=nft_register_chain pid=3413 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 16 13:19:43.580000 audit[3413]: NETFILTER_CFG table=filter:99 family=2 entries=75 op=nft_register_chain pid=3413 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 16 13:19:43.580000 audit[3413]: SYSCALL arch=c000003e syscall=46 success=yes exit=40748 a0=3 a1=7ffe771c3e80 a2=0 a3=7ffe771c3e6c items=0 ppid=3202 pid=3413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.599471 kernel: audit: type=1300 audit(1734355183.580:1132): arch=c000003e syscall=46 success=yes exit=40748 a0=3 a1=7ffe771c3e80 a2=0 a3=7ffe771c3e6c items=0 ppid=3202 pid=3413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.599645 kernel: audit: type=1327 audit(1734355183.580:1132): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 16 13:19:43.580000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 16 13:19:43.587000 audit[3409]: NETFILTER_CFG table=nat:100 family=2 entries=15 op=nft_register_chain pid=3409 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 16 13:19:43.604244 kernel: audit: type=1325 audit(1734355183.587:1133): table=nat:100 family=2 entries=15 op=nft_register_chain pid=3409 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 16 13:19:43.614618 kernel: audit: type=1300 audit(1734355183.587:1133): arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffe6248b060 a2=0 a3=7ffe6248b04c items=0 ppid=3202 pid=3409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.587000 audit[3409]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffe6248b060 a2=0 a3=7ffe6248b04c items=0 ppid=3202 pid=3409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:43.587000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 16 13:19:43.578000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 16 13:19:43.751127 env[1193]: 2024-12-16 13:19:43.646 [INFO][3389] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" Dec 16 13:19:43.751127 env[1193]: 2024-12-16 13:19:43.646 [INFO][3389] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" iface="eth0" netns="/var/run/netns/cni-8662cfec-3fe1-2334-d3f0-3a3142157c84" Dec 16 13:19:43.751127 env[1193]: 2024-12-16 13:19:43.646 [INFO][3389] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" iface="eth0" netns="/var/run/netns/cni-8662cfec-3fe1-2334-d3f0-3a3142157c84" Dec 16 13:19:43.751127 env[1193]: 2024-12-16 13:19:43.647 [INFO][3389] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" iface="eth0" netns="/var/run/netns/cni-8662cfec-3fe1-2334-d3f0-3a3142157c84" Dec 16 13:19:43.751127 env[1193]: 2024-12-16 13:19:43.648 [INFO][3389] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" Dec 16 13:19:43.751127 env[1193]: 2024-12-16 13:19:43.648 [INFO][3389] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" Dec 16 13:19:43.751127 env[1193]: 2024-12-16 13:19:43.718 [INFO][3423] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" HandleID="k8s-pod-network.79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" Workload="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--xn82q-eth0" Dec 16 13:19:43.751127 env[1193]: 2024-12-16 13:19:43.718 [INFO][3423] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 16 13:19:43.751127 env[1193]: 2024-12-16 13:19:43.718 [INFO][3423] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 16 13:19:43.751127 env[1193]: 2024-12-16 13:19:43.728 [WARNING][3423] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" HandleID="k8s-pod-network.79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" Workload="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--xn82q-eth0" Dec 16 13:19:43.751127 env[1193]: 2024-12-16 13:19:43.728 [INFO][3423] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" HandleID="k8s-pod-network.79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" Workload="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--xn82q-eth0" Dec 16 13:19:43.751127 env[1193]: 2024-12-16 13:19:43.731 [INFO][3423] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 16 13:19:43.751127 env[1193]: 2024-12-16 13:19:43.747 [INFO][3389] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" Dec 16 13:19:43.755392 env[1193]: time="2024-12-16T13:19:43.755334414Z" level=info msg="TearDown network for sandbox \"79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764\" successfully" Dec 16 13:19:43.755591 env[1193]: time="2024-12-16T13:19:43.755571055Z" level=info msg="StopPodSandbox for \"79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764\" returns successfully" Dec 16 13:19:43.756357 systemd[1]: run-netns-cni\x2d8662cfec\x2d3fe1\x2d2334\x2dd3f0\x2d3a3142157c84.mount: Deactivated successfully. Dec 16 13:19:43.757926 env[1193]: time="2024-12-16T13:19:43.757884859Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-78458c5f95-xn82q,Uid:61d905b8-c93e-4490-90af-dacf4743676a,Namespace:calico-apiserver,Attempt:1,}" Dec 16 13:19:43.824422 env[1193]: 2024-12-16 13:19:43.684 [INFO][3390] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" Dec 16 13:19:43.824422 env[1193]: 2024-12-16 13:19:43.684 [INFO][3390] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" iface="eth0" netns="/var/run/netns/cni-e7f59a91-ad3f-7446-f72d-fbf10abf6983" Dec 16 13:19:43.824422 env[1193]: 2024-12-16 13:19:43.684 [INFO][3390] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" iface="eth0" netns="/var/run/netns/cni-e7f59a91-ad3f-7446-f72d-fbf10abf6983" Dec 16 13:19:43.824422 env[1193]: 2024-12-16 13:19:43.684 [INFO][3390] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" iface="eth0" netns="/var/run/netns/cni-e7f59a91-ad3f-7446-f72d-fbf10abf6983" Dec 16 13:19:43.824422 env[1193]: 2024-12-16 13:19:43.685 [INFO][3390] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" Dec 16 13:19:43.824422 env[1193]: 2024-12-16 13:19:43.685 [INFO][3390] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" Dec 16 13:19:43.824422 env[1193]: 2024-12-16 13:19:43.792 [INFO][3427] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" HandleID="k8s-pod-network.d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" Workload="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--bz7zq-eth0" Dec 16 13:19:43.824422 env[1193]: 2024-12-16 13:19:43.792 [INFO][3427] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 16 13:19:43.824422 env[1193]: 2024-12-16 13:19:43.792 [INFO][3427] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 16 13:19:43.824422 env[1193]: 2024-12-16 13:19:43.809 [WARNING][3427] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" HandleID="k8s-pod-network.d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" Workload="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--bz7zq-eth0" Dec 16 13:19:43.824422 env[1193]: 2024-12-16 13:19:43.809 [INFO][3427] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" HandleID="k8s-pod-network.d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" Workload="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--bz7zq-eth0" Dec 16 13:19:43.824422 env[1193]: 2024-12-16 13:19:43.813 [INFO][3427] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 16 13:19:43.824422 env[1193]: 2024-12-16 13:19:43.821 [INFO][3390] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" Dec 16 13:19:43.831683 env[1193]: time="2024-12-16T13:19:43.830097341Z" level=info msg="TearDown network for sandbox \"d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32\" successfully" Dec 16 13:19:43.831683 env[1193]: time="2024-12-16T13:19:43.830155682Z" level=info msg="StopPodSandbox for \"d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32\" returns successfully" Dec 16 13:19:43.828628 systemd[1]: run-netns-cni\x2de7f59a91\x2dad3f\x2d7446\x2df72d\x2dfbf10abf6983.mount: Deactivated successfully. Dec 16 13:19:43.835331 kubelet[1921]: E1216 13:19:43.832481 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:19:43.836354 env[1193]: time="2024-12-16T13:19:43.833844297Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-bz7zq,Uid:40f13eb9-6107-4fcd-b21f-7f9d38717259,Namespace:kube-system,Attempt:1,}" Dec 16 13:19:44.138204 systemd[1]: Started sshd@8-164.92.94.164:22-139.178.89.65:57056.service. Dec 16 13:19:44.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-164.92.94.164:22-139.178.89.65:57056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:44.193436 systemd-networkd[1003]: cali77193f13e71: Link UP Dec 16 13:19:44.196186 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 16 13:19:44.196391 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali77193f13e71: link becomes ready Dec 16 13:19:44.195955 systemd-networkd[1003]: cali77193f13e71: Gained carrier Dec 16 13:19:44.229300 env[1193]: 2024-12-16 13:19:44.011 [INFO][3449] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--bz7zq-eth0 coredns-6f6b679f8f- kube-system 40f13eb9-6107-4fcd-b21f-7f9d38717259 891 0 2024-12-16 13:19:00 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.6-6-0e268b98cf coredns-6f6b679f8f-bz7zq eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali77193f13e71 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="7120397a0d4747a9d923e6fdb3cc16de94cd7babeebb1955d9770ea55da101c6" Namespace="kube-system" Pod="coredns-6f6b679f8f-bz7zq" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--bz7zq-" Dec 16 13:19:44.229300 env[1193]: 2024-12-16 13:19:44.011 [INFO][3449] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="7120397a0d4747a9d923e6fdb3cc16de94cd7babeebb1955d9770ea55da101c6" Namespace="kube-system" Pod="coredns-6f6b679f8f-bz7zq" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--bz7zq-eth0" Dec 16 13:19:44.229300 env[1193]: 2024-12-16 13:19:44.079 [INFO][3468] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7120397a0d4747a9d923e6fdb3cc16de94cd7babeebb1955d9770ea55da101c6" HandleID="k8s-pod-network.7120397a0d4747a9d923e6fdb3cc16de94cd7babeebb1955d9770ea55da101c6" Workload="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--bz7zq-eth0" Dec 16 13:19:44.229300 env[1193]: 2024-12-16 13:19:44.099 [INFO][3468] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="7120397a0d4747a9d923e6fdb3cc16de94cd7babeebb1955d9770ea55da101c6" HandleID="k8s-pod-network.7120397a0d4747a9d923e6fdb3cc16de94cd7babeebb1955d9770ea55da101c6" Workload="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--bz7zq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000312960), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.6-6-0e268b98cf", "pod":"coredns-6f6b679f8f-bz7zq", "timestamp":"2024-12-16 13:19:44.07934727 +0000 UTC"}, Hostname:"ci-3510.3.6-6-0e268b98cf", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 16 13:19:44.229300 env[1193]: 2024-12-16 13:19:44.099 [INFO][3468] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 16 13:19:44.229300 env[1193]: 2024-12-16 13:19:44.099 [INFO][3468] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 16 13:19:44.229300 env[1193]: 2024-12-16 13:19:44.099 [INFO][3468] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-6-0e268b98cf' Dec 16 13:19:44.229300 env[1193]: 2024-12-16 13:19:44.107 [INFO][3468] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7120397a0d4747a9d923e6fdb3cc16de94cd7babeebb1955d9770ea55da101c6" host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:44.229300 env[1193]: 2024-12-16 13:19:44.116 [INFO][3468] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:44.229300 env[1193]: 2024-12-16 13:19:44.127 [INFO][3468] ipam/ipam.go 489: Trying affinity for 192.168.3.192/26 host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:44.229300 env[1193]: 2024-12-16 13:19:44.139 [INFO][3468] ipam/ipam.go 155: Attempting to load block cidr=192.168.3.192/26 host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:44.229300 env[1193]: 2024-12-16 13:19:44.146 [INFO][3468] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.3.192/26 host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:44.229300 env[1193]: 2024-12-16 13:19:44.146 [INFO][3468] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.3.192/26 handle="k8s-pod-network.7120397a0d4747a9d923e6fdb3cc16de94cd7babeebb1955d9770ea55da101c6" host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:44.229300 env[1193]: 2024-12-16 13:19:44.150 [INFO][3468] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.7120397a0d4747a9d923e6fdb3cc16de94cd7babeebb1955d9770ea55da101c6 Dec 16 13:19:44.229300 env[1193]: 2024-12-16 13:19:44.170 [INFO][3468] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.3.192/26 handle="k8s-pod-network.7120397a0d4747a9d923e6fdb3cc16de94cd7babeebb1955d9770ea55da101c6" host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:44.229300 env[1193]: 2024-12-16 13:19:44.182 [INFO][3468] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.3.194/26] block=192.168.3.192/26 handle="k8s-pod-network.7120397a0d4747a9d923e6fdb3cc16de94cd7babeebb1955d9770ea55da101c6" host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:44.229300 env[1193]: 2024-12-16 13:19:44.182 [INFO][3468] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.3.194/26] handle="k8s-pod-network.7120397a0d4747a9d923e6fdb3cc16de94cd7babeebb1955d9770ea55da101c6" host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:44.229300 env[1193]: 2024-12-16 13:19:44.182 [INFO][3468] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 16 13:19:44.229300 env[1193]: 2024-12-16 13:19:44.182 [INFO][3468] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.3.194/26] IPv6=[] ContainerID="7120397a0d4747a9d923e6fdb3cc16de94cd7babeebb1955d9770ea55da101c6" HandleID="k8s-pod-network.7120397a0d4747a9d923e6fdb3cc16de94cd7babeebb1955d9770ea55da101c6" Workload="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--bz7zq-eth0" Dec 16 13:19:44.232376 env[1193]: 2024-12-16 13:19:44.186 [INFO][3449] cni-plugin/k8s.go 386: Populated endpoint ContainerID="7120397a0d4747a9d923e6fdb3cc16de94cd7babeebb1955d9770ea55da101c6" Namespace="kube-system" Pod="coredns-6f6b679f8f-bz7zq" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--bz7zq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--bz7zq-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"40f13eb9-6107-4fcd-b21f-7f9d38717259", ResourceVersion:"891", Generation:0, CreationTimestamp:time.Date(2024, time.December, 16, 13, 19, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-6-0e268b98cf", ContainerID:"", Pod:"coredns-6f6b679f8f-bz7zq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.3.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali77193f13e71", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 16 13:19:44.232376 env[1193]: 2024-12-16 13:19:44.186 [INFO][3449] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.3.194/32] ContainerID="7120397a0d4747a9d923e6fdb3cc16de94cd7babeebb1955d9770ea55da101c6" Namespace="kube-system" Pod="coredns-6f6b679f8f-bz7zq" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--bz7zq-eth0" Dec 16 13:19:44.232376 env[1193]: 2024-12-16 13:19:44.187 [INFO][3449] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali77193f13e71 ContainerID="7120397a0d4747a9d923e6fdb3cc16de94cd7babeebb1955d9770ea55da101c6" Namespace="kube-system" Pod="coredns-6f6b679f8f-bz7zq" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--bz7zq-eth0" Dec 16 13:19:44.232376 env[1193]: 2024-12-16 13:19:44.196 [INFO][3449] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="7120397a0d4747a9d923e6fdb3cc16de94cd7babeebb1955d9770ea55da101c6" Namespace="kube-system" Pod="coredns-6f6b679f8f-bz7zq" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--bz7zq-eth0" Dec 16 13:19:44.232376 env[1193]: 2024-12-16 13:19:44.196 [INFO][3449] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="7120397a0d4747a9d923e6fdb3cc16de94cd7babeebb1955d9770ea55da101c6" Namespace="kube-system" Pod="coredns-6f6b679f8f-bz7zq" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--bz7zq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--bz7zq-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"40f13eb9-6107-4fcd-b21f-7f9d38717259", ResourceVersion:"891", Generation:0, CreationTimestamp:time.Date(2024, time.December, 16, 13, 19, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-6-0e268b98cf", ContainerID:"7120397a0d4747a9d923e6fdb3cc16de94cd7babeebb1955d9770ea55da101c6", Pod:"coredns-6f6b679f8f-bz7zq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.3.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali77193f13e71", MAC:"f6:fb:d4:35:8f:2f", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 16 13:19:44.232376 env[1193]: 2024-12-16 13:19:44.211 [INFO][3449] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="7120397a0d4747a9d923e6fdb3cc16de94cd7babeebb1955d9770ea55da101c6" Namespace="kube-system" Pod="coredns-6f6b679f8f-bz7zq" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--bz7zq-eth0" Dec 16 13:19:44.265000 audit[3490]: NETFILTER_CFG table=filter:101 family=2 entries=38 op=nft_register_chain pid=3490 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 16 13:19:44.265000 audit[3490]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffd5eda7300 a2=0 a3=7ffd5eda72ec items=0 ppid=3202 pid=3490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:44.265000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 16 13:19:44.272000 audit[3477]: USER_ACCT pid=3477 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:44.273549 sshd[3477]: Accepted publickey for core from 139.178.89.65 port 57056 ssh2: RSA SHA256:Q+lFULKB/jVvshRdfdjHJzJxBGhdic6R851DS3iyBTE Dec 16 13:19:44.274000 audit[3477]: CRED_ACQ pid=3477 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:44.275000 audit[3477]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd55839cd0 a2=3 a3=0 items=0 ppid=1 pid=3477 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:44.275000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 16 13:19:44.277048 sshd[3477]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 16 13:19:44.284884 systemd-logind[1181]: New session 9 of user core. Dec 16 13:19:44.286808 systemd[1]: Started session-9.scope. Dec 16 13:19:44.293000 audit[3477]: USER_START pid=3477 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:44.295000 audit[3492]: CRED_ACQ pid=3492 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:44.353514 env[1193]: time="2024-12-16T13:19:44.353095426Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 16 13:19:44.353514 env[1193]: time="2024-12-16T13:19:44.353184923Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 16 13:19:44.353514 env[1193]: time="2024-12-16T13:19:44.353202467Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 16 13:19:44.353976 env[1193]: time="2024-12-16T13:19:44.353533497Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7120397a0d4747a9d923e6fdb3cc16de94cd7babeebb1955d9770ea55da101c6 pid=3500 runtime=io.containerd.runc.v2 Dec 16 13:19:44.362199 systemd-networkd[1003]: cali0c4ebdccb47: Link UP Dec 16 13:19:44.397131 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0c4ebdccb47: link becomes ready Dec 16 13:19:44.416401 systemd-networkd[1003]: cali0c4ebdccb47: Gained carrier Dec 16 13:19:44.453718 env[1193]: 2024-12-16 13:19:43.963 [INFO][3435] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--xn82q-eth0 calico-apiserver-78458c5f95- calico-apiserver 61d905b8-c93e-4490-90af-dacf4743676a 890 0 2024-12-16 13:19:15 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:78458c5f95 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.6-6-0e268b98cf calico-apiserver-78458c5f95-xn82q eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali0c4ebdccb47 [] []}} ContainerID="ba7a602aa90c20636af790b1a18e0ffd4ae9480a755ab2dec5e69d7baec0971f" Namespace="calico-apiserver" Pod="calico-apiserver-78458c5f95-xn82q" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--xn82q-" Dec 16 13:19:44.453718 env[1193]: 2024-12-16 13:19:43.963 [INFO][3435] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ba7a602aa90c20636af790b1a18e0ffd4ae9480a755ab2dec5e69d7baec0971f" Namespace="calico-apiserver" Pod="calico-apiserver-78458c5f95-xn82q" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--xn82q-eth0" Dec 16 13:19:44.453718 env[1193]: 2024-12-16 13:19:44.093 [INFO][3462] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ba7a602aa90c20636af790b1a18e0ffd4ae9480a755ab2dec5e69d7baec0971f" HandleID="k8s-pod-network.ba7a602aa90c20636af790b1a18e0ffd4ae9480a755ab2dec5e69d7baec0971f" Workload="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--xn82q-eth0" Dec 16 13:19:44.453718 env[1193]: 2024-12-16 13:19:44.127 [INFO][3462] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ba7a602aa90c20636af790b1a18e0ffd4ae9480a755ab2dec5e69d7baec0971f" HandleID="k8s-pod-network.ba7a602aa90c20636af790b1a18e0ffd4ae9480a755ab2dec5e69d7baec0971f" Workload="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--xn82q-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000404450), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.6-6-0e268b98cf", "pod":"calico-apiserver-78458c5f95-xn82q", "timestamp":"2024-12-16 13:19:44.093313076 +0000 UTC"}, Hostname:"ci-3510.3.6-6-0e268b98cf", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 16 13:19:44.453718 env[1193]: 2024-12-16 13:19:44.128 [INFO][3462] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 16 13:19:44.453718 env[1193]: 2024-12-16 13:19:44.183 [INFO][3462] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 16 13:19:44.453718 env[1193]: 2024-12-16 13:19:44.183 [INFO][3462] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-6-0e268b98cf' Dec 16 13:19:44.453718 env[1193]: 2024-12-16 13:19:44.228 [INFO][3462] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ba7a602aa90c20636af790b1a18e0ffd4ae9480a755ab2dec5e69d7baec0971f" host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:44.453718 env[1193]: 2024-12-16 13:19:44.245 [INFO][3462] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:44.453718 env[1193]: 2024-12-16 13:19:44.264 [INFO][3462] ipam/ipam.go 489: Trying affinity for 192.168.3.192/26 host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:44.453718 env[1193]: 2024-12-16 13:19:44.267 [INFO][3462] ipam/ipam.go 155: Attempting to load block cidr=192.168.3.192/26 host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:44.453718 env[1193]: 2024-12-16 13:19:44.278 [INFO][3462] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.3.192/26 host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:44.453718 env[1193]: 2024-12-16 13:19:44.278 [INFO][3462] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.3.192/26 handle="k8s-pod-network.ba7a602aa90c20636af790b1a18e0ffd4ae9480a755ab2dec5e69d7baec0971f" host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:44.453718 env[1193]: 2024-12-16 13:19:44.288 [INFO][3462] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ba7a602aa90c20636af790b1a18e0ffd4ae9480a755ab2dec5e69d7baec0971f Dec 16 13:19:44.453718 env[1193]: 2024-12-16 13:19:44.305 [INFO][3462] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.3.192/26 handle="k8s-pod-network.ba7a602aa90c20636af790b1a18e0ffd4ae9480a755ab2dec5e69d7baec0971f" host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:44.453718 env[1193]: 2024-12-16 13:19:44.333 [INFO][3462] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.3.195/26] block=192.168.3.192/26 handle="k8s-pod-network.ba7a602aa90c20636af790b1a18e0ffd4ae9480a755ab2dec5e69d7baec0971f" host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:44.453718 env[1193]: 2024-12-16 13:19:44.333 [INFO][3462] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.3.195/26] handle="k8s-pod-network.ba7a602aa90c20636af790b1a18e0ffd4ae9480a755ab2dec5e69d7baec0971f" host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:44.453718 env[1193]: 2024-12-16 13:19:44.333 [INFO][3462] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 16 13:19:44.453718 env[1193]: 2024-12-16 13:19:44.333 [INFO][3462] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.3.195/26] IPv6=[] ContainerID="ba7a602aa90c20636af790b1a18e0ffd4ae9480a755ab2dec5e69d7baec0971f" HandleID="k8s-pod-network.ba7a602aa90c20636af790b1a18e0ffd4ae9480a755ab2dec5e69d7baec0971f" Workload="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--xn82q-eth0" Dec 16 13:19:44.461040 env[1193]: 2024-12-16 13:19:44.336 [INFO][3435] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ba7a602aa90c20636af790b1a18e0ffd4ae9480a755ab2dec5e69d7baec0971f" Namespace="calico-apiserver" Pod="calico-apiserver-78458c5f95-xn82q" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--xn82q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--xn82q-eth0", GenerateName:"calico-apiserver-78458c5f95-", Namespace:"calico-apiserver", SelfLink:"", UID:"61d905b8-c93e-4490-90af-dacf4743676a", ResourceVersion:"890", Generation:0, CreationTimestamp:time.Date(2024, time.December, 16, 13, 19, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"78458c5f95", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-6-0e268b98cf", ContainerID:"", Pod:"calico-apiserver-78458c5f95-xn82q", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.3.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0c4ebdccb47", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 16 13:19:44.461040 env[1193]: 2024-12-16 13:19:44.336 [INFO][3435] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.3.195/32] ContainerID="ba7a602aa90c20636af790b1a18e0ffd4ae9480a755ab2dec5e69d7baec0971f" Namespace="calico-apiserver" Pod="calico-apiserver-78458c5f95-xn82q" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--xn82q-eth0" Dec 16 13:19:44.461040 env[1193]: 2024-12-16 13:19:44.336 [INFO][3435] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0c4ebdccb47 ContainerID="ba7a602aa90c20636af790b1a18e0ffd4ae9480a755ab2dec5e69d7baec0971f" Namespace="calico-apiserver" Pod="calico-apiserver-78458c5f95-xn82q" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--xn82q-eth0" Dec 16 13:19:44.461040 env[1193]: 2024-12-16 13:19:44.419 [INFO][3435] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ba7a602aa90c20636af790b1a18e0ffd4ae9480a755ab2dec5e69d7baec0971f" Namespace="calico-apiserver" Pod="calico-apiserver-78458c5f95-xn82q" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--xn82q-eth0" Dec 16 13:19:44.461040 env[1193]: 2024-12-16 13:19:44.420 [INFO][3435] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ba7a602aa90c20636af790b1a18e0ffd4ae9480a755ab2dec5e69d7baec0971f" Namespace="calico-apiserver" Pod="calico-apiserver-78458c5f95-xn82q" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--xn82q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--xn82q-eth0", GenerateName:"calico-apiserver-78458c5f95-", Namespace:"calico-apiserver", SelfLink:"", UID:"61d905b8-c93e-4490-90af-dacf4743676a", ResourceVersion:"890", Generation:0, CreationTimestamp:time.Date(2024, time.December, 16, 13, 19, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"78458c5f95", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-6-0e268b98cf", ContainerID:"ba7a602aa90c20636af790b1a18e0ffd4ae9480a755ab2dec5e69d7baec0971f", Pod:"calico-apiserver-78458c5f95-xn82q", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.3.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0c4ebdccb47", MAC:"d6:48:a5:5f:d9:29", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 16 13:19:44.461040 env[1193]: 2024-12-16 13:19:44.439 [INFO][3435] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ba7a602aa90c20636af790b1a18e0ffd4ae9480a755ab2dec5e69d7baec0971f" Namespace="calico-apiserver" Pod="calico-apiserver-78458c5f95-xn82q" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--xn82q-eth0" Dec 16 13:19:44.466000 audit[3527]: NETFILTER_CFG table=filter:102 family=2 entries=38 op=nft_register_chain pid=3527 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 16 13:19:44.466000 audit[3527]: SYSCALL arch=c000003e syscall=46 success=yes exit=21516 a0=3 a1=7ffc4d456440 a2=0 a3=7ffc4d45642c items=0 ppid=3202 pid=3527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:44.466000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 16 13:19:44.478603 systemd[1]: Started cri-containerd-7120397a0d4747a9d923e6fdb3cc16de94cd7babeebb1955d9770ea55da101c6.scope. Dec 16 13:19:44.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.514000 audit: BPF prog-id=162 op=LOAD Dec 16 13:19:44.516000 audit[3515]: AVC avc: denied { bpf } for pid=3515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.516000 audit[3515]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3500 pid=3515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:44.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731323033393761306434373437613964393233653666646233636331 Dec 16 13:19:44.516000 audit[3515]: AVC avc: denied { perfmon } for pid=3515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.516000 audit[3515]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3500 pid=3515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:44.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731323033393761306434373437613964393233653666646233636331 Dec 16 13:19:44.516000 audit[3515]: AVC avc: denied { bpf } for pid=3515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.516000 audit[3515]: AVC avc: denied { bpf } for pid=3515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.516000 audit[3515]: AVC avc: denied { bpf } for pid=3515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.516000 audit[3515]: AVC avc: denied { perfmon } for pid=3515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.516000 audit[3515]: AVC avc: denied { perfmon } for pid=3515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.516000 audit[3515]: AVC avc: denied { perfmon } for pid=3515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.516000 audit[3515]: AVC avc: denied { perfmon } for pid=3515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.516000 audit[3515]: AVC avc: denied { perfmon } for pid=3515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.516000 audit[3515]: AVC avc: denied { bpf } for pid=3515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.516000 audit[3515]: AVC avc: denied { bpf } for pid=3515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.516000 audit: BPF prog-id=163 op=LOAD Dec 16 13:19:44.516000 audit[3515]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000386ba0 items=0 ppid=3500 pid=3515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:44.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731323033393761306434373437613964393233653666646233636331 Dec 16 13:19:44.516000 audit[3515]: AVC avc: denied { bpf } for pid=3515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.516000 audit[3515]: AVC avc: denied { bpf } for pid=3515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.516000 audit[3515]: AVC avc: denied { perfmon } for pid=3515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.516000 audit[3515]: AVC avc: denied { perfmon } for pid=3515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.516000 audit[3515]: AVC avc: denied { perfmon } for pid=3515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.516000 audit[3515]: AVC avc: denied { perfmon } for pid=3515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.516000 audit[3515]: AVC avc: denied { perfmon } for pid=3515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.516000 audit[3515]: AVC avc: denied { bpf } for pid=3515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.516000 audit[3515]: AVC avc: denied { bpf } for pid=3515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.516000 audit: BPF prog-id=164 op=LOAD Dec 16 13:19:44.516000 audit[3515]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000386be8 items=0 ppid=3500 pid=3515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:44.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731323033393761306434373437613964393233653666646233636331 Dec 16 13:19:44.516000 audit: BPF prog-id=164 op=UNLOAD Dec 16 13:19:44.516000 audit: BPF prog-id=163 op=UNLOAD Dec 16 13:19:44.516000 audit[3515]: AVC avc: denied { bpf } for pid=3515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.516000 audit[3515]: AVC avc: denied { bpf } for pid=3515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.516000 audit[3515]: AVC avc: denied { bpf } for pid=3515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.516000 audit[3515]: AVC avc: denied { perfmon } for pid=3515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.516000 audit[3515]: AVC avc: denied { perfmon } for pid=3515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.516000 audit[3515]: AVC avc: denied { perfmon } for pid=3515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.516000 audit[3515]: AVC avc: denied { perfmon } for pid=3515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.516000 audit[3515]: AVC avc: denied { perfmon } for pid=3515 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.516000 audit[3515]: AVC avc: denied { bpf } for pid=3515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.516000 audit[3515]: AVC avc: denied { bpf } for pid=3515 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.516000 audit: BPF prog-id=165 op=LOAD Dec 16 13:19:44.516000 audit[3515]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000386ff8 items=0 ppid=3500 pid=3515 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:44.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731323033393761306434373437613964393233653666646233636331 Dec 16 13:19:44.553921 env[1193]: time="2024-12-16T13:19:44.553310344Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 16 13:19:44.553921 env[1193]: time="2024-12-16T13:19:44.553392117Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 16 13:19:44.553921 env[1193]: time="2024-12-16T13:19:44.553410710Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 16 13:19:44.553921 env[1193]: time="2024-12-16T13:19:44.553712062Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ba7a602aa90c20636af790b1a18e0ffd4ae9480a755ab2dec5e69d7baec0971f pid=3554 runtime=io.containerd.runc.v2 Dec 16 13:19:44.638242 systemd[1]: Started cri-containerd-ba7a602aa90c20636af790b1a18e0ffd4ae9480a755ab2dec5e69d7baec0971f.scope. Dec 16 13:19:44.642317 env[1193]: time="2024-12-16T13:19:44.642242099Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-bz7zq,Uid:40f13eb9-6107-4fcd-b21f-7f9d38717259,Namespace:kube-system,Attempt:1,} returns sandbox id \"7120397a0d4747a9d923e6fdb3cc16de94cd7babeebb1955d9770ea55da101c6\"" Dec 16 13:19:44.680893 env[1193]: time="2024-12-16T13:19:44.680750565Z" level=info msg="StopPodSandbox for \"c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1\"" Dec 16 13:19:44.703873 env[1193]: time="2024-12-16T13:19:44.703783136Z" level=info msg="StopPodSandbox for \"3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155\"" Dec 16 13:19:44.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.713000 audit: BPF prog-id=166 op=LOAD Dec 16 13:19:44.717000 audit[3563]: AVC avc: denied { bpf } for pid=3563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.717000 audit[3563]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3554 pid=3563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:44.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261376136303261613930633230363336616637393062316131386530 Dec 16 13:19:44.718000 audit[3563]: AVC avc: denied { perfmon } for pid=3563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.718000 audit[3563]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3554 pid=3563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:44.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261376136303261613930633230363336616637393062316131386530 Dec 16 13:19:44.718000 audit[3563]: AVC avc: denied { bpf } for pid=3563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.718000 audit[3563]: AVC avc: denied { bpf } for pid=3563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.718000 audit[3563]: AVC avc: denied { bpf } for pid=3563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.718000 audit[3563]: AVC avc: denied { perfmon } for pid=3563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.718000 audit[3563]: AVC avc: denied { perfmon } for pid=3563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.718000 audit[3563]: AVC avc: denied { perfmon } for pid=3563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.718000 audit[3563]: AVC avc: denied { perfmon } for pid=3563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.718000 audit[3563]: AVC avc: denied { perfmon } for pid=3563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.718000 audit[3563]: AVC avc: denied { bpf } for pid=3563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.718000 audit[3563]: AVC avc: denied { bpf } for pid=3563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.718000 audit: BPF prog-id=167 op=LOAD Dec 16 13:19:44.718000 audit[3563]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003a8c20 items=0 ppid=3554 pid=3563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:44.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261376136303261613930633230363336616637393062316131386530 Dec 16 13:19:44.718000 audit[3563]: AVC avc: denied { bpf } for pid=3563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.718000 audit[3563]: AVC avc: denied { bpf } for pid=3563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.718000 audit[3563]: AVC avc: denied { perfmon } for pid=3563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.718000 audit[3563]: AVC avc: denied { perfmon } for pid=3563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.718000 audit[3563]: AVC avc: denied { perfmon } for pid=3563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.718000 audit[3563]: AVC avc: denied { perfmon } for pid=3563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.718000 audit[3563]: AVC avc: denied { perfmon } for pid=3563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.718000 audit[3563]: AVC avc: denied { bpf } for pid=3563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.718000 audit[3563]: AVC avc: denied { bpf } for pid=3563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.718000 audit: BPF prog-id=168 op=LOAD Dec 16 13:19:44.718000 audit[3563]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003a8c68 items=0 ppid=3554 pid=3563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:44.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261376136303261613930633230363336616637393062316131386530 Dec 16 13:19:44.719000 audit: BPF prog-id=168 op=UNLOAD Dec 16 13:19:44.719000 audit: BPF prog-id=167 op=UNLOAD Dec 16 13:19:44.719000 audit[3563]: AVC avc: denied { bpf } for pid=3563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.719000 audit[3563]: AVC avc: denied { bpf } for pid=3563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.719000 audit[3563]: AVC avc: denied { bpf } for pid=3563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.719000 audit[3563]: AVC avc: denied { perfmon } for pid=3563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.719000 audit[3563]: AVC avc: denied { perfmon } for pid=3563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.719000 audit[3563]: AVC avc: denied { perfmon } for pid=3563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.719000 audit[3563]: AVC avc: denied { perfmon } for pid=3563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.719000 audit[3563]: AVC avc: denied { perfmon } for pid=3563 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.719000 audit[3563]: AVC avc: denied { bpf } for pid=3563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.719000 audit[3563]: AVC avc: denied { bpf } for pid=3563 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:44.719000 audit: BPF prog-id=169 op=LOAD Dec 16 13:19:44.719000 audit[3563]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003a9078 items=0 ppid=3554 pid=3563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:44.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261376136303261613930633230363336616637393062316131386530 Dec 16 13:19:44.730167 kubelet[1921]: E1216 13:19:44.727440 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:19:44.738026 env[1193]: time="2024-12-16T13:19:44.704591994Z" level=info msg="StopPodSandbox for \"c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7\"" Dec 16 13:19:44.997602 systemd-networkd[1003]: vxlan.calico: Gained IPv6LL Dec 16 13:19:45.050121 env[1193]: time="2024-12-16T13:19:45.050043141Z" level=info msg="CreateContainer within sandbox \"7120397a0d4747a9d923e6fdb3cc16de94cd7babeebb1955d9770ea55da101c6\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 16 13:19:45.052569 env[1193]: time="2024-12-16T13:19:45.052497804Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-78458c5f95-xn82q,Uid:61d905b8-c93e-4490-90af-dacf4743676a,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"ba7a602aa90c20636af790b1a18e0ffd4ae9480a755ab2dec5e69d7baec0971f\"" Dec 16 13:19:45.135568 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2715677181.mount: Deactivated successfully. Dec 16 13:19:45.157658 sshd[3477]: pam_unix(sshd:session): session closed for user core Dec 16 13:19:45.159000 audit[3477]: USER_END pid=3477 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:45.160000 audit[3477]: CRED_DISP pid=3477 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:45.164117 env[1193]: time="2024-12-16T13:19:45.161031142Z" level=info msg="CreateContainer within sandbox \"7120397a0d4747a9d923e6fdb3cc16de94cd7babeebb1955d9770ea55da101c6\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"3afb6280cfc62038a42b6cca641bc293b35c464bfee1847794cb94045dbe9e99\"" Dec 16 13:19:45.165805 systemd[1]: sshd@8-164.92.94.164:22-139.178.89.65:57056.service: Deactivated successfully. Dec 16 13:19:45.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-164.92.94.164:22-139.178.89.65:57056 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:45.168731 env[1193]: time="2024-12-16T13:19:45.168296603Z" level=info msg="StartContainer for \"3afb6280cfc62038a42b6cca641bc293b35c464bfee1847794cb94045dbe9e99\"" Dec 16 13:19:45.168397 systemd[1]: session-9.scope: Deactivated successfully. Dec 16 13:19:45.170695 systemd-logind[1181]: Session 9 logged out. Waiting for processes to exit. Dec 16 13:19:45.173025 systemd-logind[1181]: Removed session 9. Dec 16 13:19:45.381566 systemd[1]: Started cri-containerd-3afb6280cfc62038a42b6cca641bc293b35c464bfee1847794cb94045dbe9e99.scope. Dec 16 13:19:45.466330 env[1193]: 2024-12-16 13:19:45.085 [INFO][3618] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" Dec 16 13:19:45.466330 env[1193]: 2024-12-16 13:19:45.085 [INFO][3618] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" iface="eth0" netns="/var/run/netns/cni-09115e97-7db8-5f9f-ae87-1faa1fc77499" Dec 16 13:19:45.466330 env[1193]: 2024-12-16 13:19:45.086 [INFO][3618] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" iface="eth0" netns="/var/run/netns/cni-09115e97-7db8-5f9f-ae87-1faa1fc77499" Dec 16 13:19:45.466330 env[1193]: 2024-12-16 13:19:45.091 [INFO][3618] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" iface="eth0" netns="/var/run/netns/cni-09115e97-7db8-5f9f-ae87-1faa1fc77499" Dec 16 13:19:45.466330 env[1193]: 2024-12-16 13:19:45.091 [INFO][3618] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" Dec 16 13:19:45.466330 env[1193]: 2024-12-16 13:19:45.091 [INFO][3618] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" Dec 16 13:19:45.466330 env[1193]: 2024-12-16 13:19:45.379 [INFO][3651] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" HandleID="k8s-pod-network.c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" Workload="ci--3510.3.6--6--0e268b98cf-k8s-calico--kube--controllers--758bd67986--7dfsz-eth0" Dec 16 13:19:45.466330 env[1193]: 2024-12-16 13:19:45.379 [INFO][3651] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 16 13:19:45.466330 env[1193]: 2024-12-16 13:19:45.379 [INFO][3651] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 16 13:19:45.466330 env[1193]: 2024-12-16 13:19:45.425 [WARNING][3651] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" HandleID="k8s-pod-network.c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" Workload="ci--3510.3.6--6--0e268b98cf-k8s-calico--kube--controllers--758bd67986--7dfsz-eth0" Dec 16 13:19:45.466330 env[1193]: 2024-12-16 13:19:45.425 [INFO][3651] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" HandleID="k8s-pod-network.c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" Workload="ci--3510.3.6--6--0e268b98cf-k8s-calico--kube--controllers--758bd67986--7dfsz-eth0" Dec 16 13:19:45.466330 env[1193]: 2024-12-16 13:19:45.442 [INFO][3651] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 16 13:19:45.466330 env[1193]: 2024-12-16 13:19:45.457 [INFO][3618] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" Dec 16 13:19:45.468129 env[1193]: time="2024-12-16T13:19:45.468030605Z" level=info msg="TearDown network for sandbox \"c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1\" successfully" Dec 16 13:19:45.468377 env[1193]: time="2024-12-16T13:19:45.468318862Z" level=info msg="StopPodSandbox for \"c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1\" returns successfully" Dec 16 13:19:45.470461 env[1193]: time="2024-12-16T13:19:45.470410729Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-758bd67986-7dfsz,Uid:7351e6b4-48f5-49f2-9546-d89197754a12,Namespace:calico-system,Attempt:1,}" Dec 16 13:19:45.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.572000 audit: BPF prog-id=170 op=LOAD Dec 16 13:19:45.574000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.574000 audit[3666]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3500 pid=3666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361666236323830636663363230333861343262366363613634316263 Dec 16 13:19:45.575000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.575000 audit[3666]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3500 pid=3666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361666236323830636663363230333861343262366363613634316263 Dec 16 13:19:45.575000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.575000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.575000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.575000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.575000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.575000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.575000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.575000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.575000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.575000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.575000 audit: BPF prog-id=171 op=LOAD Dec 16 13:19:45.575000 audit[3666]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0001e1de0 items=0 ppid=3500 pid=3666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361666236323830636663363230333861343262366363613634316263 Dec 16 13:19:45.575000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.575000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.575000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.575000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.575000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.575000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.575000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.575000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.575000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.575000 audit: BPF prog-id=172 op=LOAD Dec 16 13:19:45.575000 audit[3666]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0001e1e28 items=0 ppid=3500 pid=3666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361666236323830636663363230333861343262366363613634316263 Dec 16 13:19:45.575000 audit: BPF prog-id=172 op=UNLOAD Dec 16 13:19:45.576000 audit: BPF prog-id=171 op=UNLOAD Dec 16 13:19:45.576000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.576000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.576000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.576000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.576000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.576000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.576000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.576000 audit[3666]: AVC avc: denied { perfmon } for pid=3666 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.576000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.576000 audit[3666]: AVC avc: denied { bpf } for pid=3666 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:45.576000 audit: BPF prog-id=173 op=LOAD Dec 16 13:19:45.576000 audit[3666]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000320238 items=0 ppid=3500 pid=3666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:45.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361666236323830636663363230333861343262366363613634316263 Dec 16 13:19:45.613682 env[1193]: 2024-12-16 13:19:45.369 [INFO][3631] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" Dec 16 13:19:45.613682 env[1193]: 2024-12-16 13:19:45.369 [INFO][3631] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" iface="eth0" netns="/var/run/netns/cni-859a12a8-7082-5e64-317f-e530a5759b9d" Dec 16 13:19:45.613682 env[1193]: 2024-12-16 13:19:45.369 [INFO][3631] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" iface="eth0" netns="/var/run/netns/cni-859a12a8-7082-5e64-317f-e530a5759b9d" Dec 16 13:19:45.613682 env[1193]: 2024-12-16 13:19:45.369 [INFO][3631] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" iface="eth0" netns="/var/run/netns/cni-859a12a8-7082-5e64-317f-e530a5759b9d" Dec 16 13:19:45.613682 env[1193]: 2024-12-16 13:19:45.370 [INFO][3631] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" Dec 16 13:19:45.613682 env[1193]: 2024-12-16 13:19:45.370 [INFO][3631] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" Dec 16 13:19:45.613682 env[1193]: 2024-12-16 13:19:45.520 [INFO][3680] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" HandleID="k8s-pod-network.3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" Workload="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--fmtjs-eth0" Dec 16 13:19:45.613682 env[1193]: 2024-12-16 13:19:45.520 [INFO][3680] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 16 13:19:45.613682 env[1193]: 2024-12-16 13:19:45.521 [INFO][3680] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 16 13:19:45.613682 env[1193]: 2024-12-16 13:19:45.560 [WARNING][3680] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" HandleID="k8s-pod-network.3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" Workload="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--fmtjs-eth0" Dec 16 13:19:45.613682 env[1193]: 2024-12-16 13:19:45.572 [INFO][3680] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" HandleID="k8s-pod-network.3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" Workload="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--fmtjs-eth0" Dec 16 13:19:45.613682 env[1193]: 2024-12-16 13:19:45.598 [INFO][3680] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 16 13:19:45.613682 env[1193]: 2024-12-16 13:19:45.604 [INFO][3631] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" Dec 16 13:19:45.614865 env[1193]: time="2024-12-16T13:19:45.614805532Z" level=info msg="TearDown network for sandbox \"3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155\" successfully" Dec 16 13:19:45.615026 env[1193]: time="2024-12-16T13:19:45.615001483Z" level=info msg="StopPodSandbox for \"3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155\" returns successfully" Dec 16 13:19:45.616272 kubelet[1921]: E1216 13:19:45.615545 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:19:45.617469 env[1193]: time="2024-12-16T13:19:45.617410898Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-fmtjs,Uid:e13621c2-02f4-41d6-80b5-938bac2450b8,Namespace:kube-system,Attempt:1,}" Dec 16 13:19:45.684494 env[1193]: 2024-12-16 13:19:45.270 [INFO][3640] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" Dec 16 13:19:45.684494 env[1193]: 2024-12-16 13:19:45.270 [INFO][3640] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" iface="eth0" netns="/var/run/netns/cni-e3963a13-edfd-5683-6dcb-93cfee4b2d14" Dec 16 13:19:45.684494 env[1193]: 2024-12-16 13:19:45.271 [INFO][3640] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" iface="eth0" netns="/var/run/netns/cni-e3963a13-edfd-5683-6dcb-93cfee4b2d14" Dec 16 13:19:45.684494 env[1193]: 2024-12-16 13:19:45.271 [INFO][3640] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" iface="eth0" netns="/var/run/netns/cni-e3963a13-edfd-5683-6dcb-93cfee4b2d14" Dec 16 13:19:45.684494 env[1193]: 2024-12-16 13:19:45.271 [INFO][3640] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" Dec 16 13:19:45.684494 env[1193]: 2024-12-16 13:19:45.271 [INFO][3640] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" Dec 16 13:19:45.684494 env[1193]: 2024-12-16 13:19:45.601 [INFO][3668] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" HandleID="k8s-pod-network.c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" Workload="ci--3510.3.6--6--0e268b98cf-k8s-csi--node--driver--ccvcz-eth0" Dec 16 13:19:45.684494 env[1193]: 2024-12-16 13:19:45.601 [INFO][3668] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 16 13:19:45.684494 env[1193]: 2024-12-16 13:19:45.602 [INFO][3668] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 16 13:19:45.684494 env[1193]: 2024-12-16 13:19:45.648 [WARNING][3668] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" HandleID="k8s-pod-network.c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" Workload="ci--3510.3.6--6--0e268b98cf-k8s-csi--node--driver--ccvcz-eth0" Dec 16 13:19:45.684494 env[1193]: 2024-12-16 13:19:45.648 [INFO][3668] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" HandleID="k8s-pod-network.c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" Workload="ci--3510.3.6--6--0e268b98cf-k8s-csi--node--driver--ccvcz-eth0" Dec 16 13:19:45.684494 env[1193]: 2024-12-16 13:19:45.657 [INFO][3668] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 16 13:19:45.684494 env[1193]: 2024-12-16 13:19:45.662 [INFO][3640] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" Dec 16 13:19:45.685895 env[1193]: time="2024-12-16T13:19:45.685827934Z" level=info msg="TearDown network for sandbox \"c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7\" successfully" Dec 16 13:19:45.686148 env[1193]: time="2024-12-16T13:19:45.686108229Z" level=info msg="StopPodSandbox for \"c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7\" returns successfully" Dec 16 13:19:45.687527 env[1193]: time="2024-12-16T13:19:45.687474560Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ccvcz,Uid:cb5cda6c-0e08-4930-b912-35225d86fb7c,Namespace:calico-system,Attempt:1,}" Dec 16 13:19:45.703328 systemd-networkd[1003]: cali0c4ebdccb47: Gained IPv6LL Dec 16 13:19:45.749895 env[1193]: time="2024-12-16T13:19:45.749808201Z" level=info msg="StartContainer for \"3afb6280cfc62038a42b6cca641bc293b35c464bfee1847794cb94045dbe9e99\" returns successfully" Dec 16 13:19:45.764836 systemd[1]: run-netns-cni\x2d859a12a8\x2d7082\x2d5e64\x2d317f\x2de530a5759b9d.mount: Deactivated successfully. Dec 16 13:19:45.764998 systemd[1]: run-netns-cni\x2de3963a13\x2dedfd\x2d5683\x2d6dcb\x2d93cfee4b2d14.mount: Deactivated successfully. Dec 16 13:19:45.771963 systemd[1]: run-netns-cni\x2d09115e97\x2d7db8\x2d5f9f\x2dae87\x2d1faa1fc77499.mount: Deactivated successfully. Dec 16 13:19:45.795844 systemd[1]: Started sshd@9-164.92.94.164:22-218.92.0.166:56136.service. Dec 16 13:19:45.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-164.92.94.164:22-218.92.0.166:56136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:45.829853 systemd-networkd[1003]: cali77193f13e71: Gained IPv6LL Dec 16 13:19:46.083669 kubelet[1921]: E1216 13:19:46.082930 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:19:46.182871 systemd-networkd[1003]: calid089a4fb365: Link UP Dec 16 13:19:46.200239 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 16 13:19:46.200444 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid089a4fb365: link becomes ready Dec 16 13:19:46.200736 systemd-networkd[1003]: calid089a4fb365: Gained carrier Dec 16 13:19:46.241772 kubelet[1921]: I1216 13:19:46.241445 1921 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-bz7zq" podStartSLOduration=46.241411458 podStartE2EDuration="46.241411458s" podCreationTimestamp="2024-12-16 13:19:00 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-16 13:19:46.170640893 +0000 UTC m=+50.964117809" watchObservedRunningTime="2024-12-16 13:19:46.241411458 +0000 UTC m=+51.034888379" Dec 16 13:19:46.249336 env[1193]: 2024-12-16 13:19:45.760 [INFO][3694] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--6--0e268b98cf-k8s-calico--kube--controllers--758bd67986--7dfsz-eth0 calico-kube-controllers-758bd67986- calico-system 7351e6b4-48f5-49f2-9546-d89197754a12 907 0 2024-12-16 13:19:15 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:758bd67986 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.6-6-0e268b98cf calico-kube-controllers-758bd67986-7dfsz eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calid089a4fb365 [] []}} ContainerID="85c9574081e52ea45de4a192d631844608b5e36ab4566576bbd19a012981660a" Namespace="calico-system" Pod="calico-kube-controllers-758bd67986-7dfsz" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-calico--kube--controllers--758bd67986--7dfsz-" Dec 16 13:19:46.249336 env[1193]: 2024-12-16 13:19:45.761 [INFO][3694] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="85c9574081e52ea45de4a192d631844608b5e36ab4566576bbd19a012981660a" Namespace="calico-system" Pod="calico-kube-controllers-758bd67986-7dfsz" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-calico--kube--controllers--758bd67986--7dfsz-eth0" Dec 16 13:19:46.249336 env[1193]: 2024-12-16 13:19:45.939 [INFO][3741] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="85c9574081e52ea45de4a192d631844608b5e36ab4566576bbd19a012981660a" HandleID="k8s-pod-network.85c9574081e52ea45de4a192d631844608b5e36ab4566576bbd19a012981660a" Workload="ci--3510.3.6--6--0e268b98cf-k8s-calico--kube--controllers--758bd67986--7dfsz-eth0" Dec 16 13:19:46.249336 env[1193]: 2024-12-16 13:19:45.972 [INFO][3741] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="85c9574081e52ea45de4a192d631844608b5e36ab4566576bbd19a012981660a" HandleID="k8s-pod-network.85c9574081e52ea45de4a192d631844608b5e36ab4566576bbd19a012981660a" Workload="ci--3510.3.6--6--0e268b98cf-k8s-calico--kube--controllers--758bd67986--7dfsz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003b4ca0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.6-6-0e268b98cf", "pod":"calico-kube-controllers-758bd67986-7dfsz", "timestamp":"2024-12-16 13:19:45.932904694 +0000 UTC"}, Hostname:"ci-3510.3.6-6-0e268b98cf", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 16 13:19:46.249336 env[1193]: 2024-12-16 13:19:45.972 [INFO][3741] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 16 13:19:46.249336 env[1193]: 2024-12-16 13:19:45.972 [INFO][3741] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 16 13:19:46.249336 env[1193]: 2024-12-16 13:19:45.972 [INFO][3741] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-6-0e268b98cf' Dec 16 13:19:46.249336 env[1193]: 2024-12-16 13:19:45.981 [INFO][3741] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.85c9574081e52ea45de4a192d631844608b5e36ab4566576bbd19a012981660a" host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:46.249336 env[1193]: 2024-12-16 13:19:45.997 [INFO][3741] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:46.249336 env[1193]: 2024-12-16 13:19:46.023 [INFO][3741] ipam/ipam.go 489: Trying affinity for 192.168.3.192/26 host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:46.249336 env[1193]: 2024-12-16 13:19:46.034 [INFO][3741] ipam/ipam.go 155: Attempting to load block cidr=192.168.3.192/26 host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:46.249336 env[1193]: 2024-12-16 13:19:46.044 [INFO][3741] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.3.192/26 host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:46.249336 env[1193]: 2024-12-16 13:19:46.044 [INFO][3741] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.3.192/26 handle="k8s-pod-network.85c9574081e52ea45de4a192d631844608b5e36ab4566576bbd19a012981660a" host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:46.249336 env[1193]: 2024-12-16 13:19:46.051 [INFO][3741] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.85c9574081e52ea45de4a192d631844608b5e36ab4566576bbd19a012981660a Dec 16 13:19:46.249336 env[1193]: 2024-12-16 13:19:46.068 [INFO][3741] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.3.192/26 handle="k8s-pod-network.85c9574081e52ea45de4a192d631844608b5e36ab4566576bbd19a012981660a" host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:46.249336 env[1193]: 2024-12-16 13:19:46.138 [INFO][3741] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.3.196/26] block=192.168.3.192/26 handle="k8s-pod-network.85c9574081e52ea45de4a192d631844608b5e36ab4566576bbd19a012981660a" host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:46.249336 env[1193]: 2024-12-16 13:19:46.138 [INFO][3741] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.3.196/26] handle="k8s-pod-network.85c9574081e52ea45de4a192d631844608b5e36ab4566576bbd19a012981660a" host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:46.249336 env[1193]: 2024-12-16 13:19:46.138 [INFO][3741] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 16 13:19:46.249336 env[1193]: 2024-12-16 13:19:46.138 [INFO][3741] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.3.196/26] IPv6=[] ContainerID="85c9574081e52ea45de4a192d631844608b5e36ab4566576bbd19a012981660a" HandleID="k8s-pod-network.85c9574081e52ea45de4a192d631844608b5e36ab4566576bbd19a012981660a" Workload="ci--3510.3.6--6--0e268b98cf-k8s-calico--kube--controllers--758bd67986--7dfsz-eth0" Dec 16 13:19:46.250549 env[1193]: 2024-12-16 13:19:46.146 [INFO][3694] cni-plugin/k8s.go 386: Populated endpoint ContainerID="85c9574081e52ea45de4a192d631844608b5e36ab4566576bbd19a012981660a" Namespace="calico-system" Pod="calico-kube-controllers-758bd67986-7dfsz" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-calico--kube--controllers--758bd67986--7dfsz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--6--0e268b98cf-k8s-calico--kube--controllers--758bd67986--7dfsz-eth0", GenerateName:"calico-kube-controllers-758bd67986-", Namespace:"calico-system", SelfLink:"", UID:"7351e6b4-48f5-49f2-9546-d89197754a12", ResourceVersion:"907", Generation:0, CreationTimestamp:time.Date(2024, time.December, 16, 13, 19, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"758bd67986", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-6-0e268b98cf", ContainerID:"", Pod:"calico-kube-controllers-758bd67986-7dfsz", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.3.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid089a4fb365", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 16 13:19:46.250549 env[1193]: 2024-12-16 13:19:46.147 [INFO][3694] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.3.196/32] ContainerID="85c9574081e52ea45de4a192d631844608b5e36ab4566576bbd19a012981660a" Namespace="calico-system" Pod="calico-kube-controllers-758bd67986-7dfsz" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-calico--kube--controllers--758bd67986--7dfsz-eth0" Dec 16 13:19:46.250549 env[1193]: 2024-12-16 13:19:46.147 [INFO][3694] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid089a4fb365 ContainerID="85c9574081e52ea45de4a192d631844608b5e36ab4566576bbd19a012981660a" Namespace="calico-system" Pod="calico-kube-controllers-758bd67986-7dfsz" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-calico--kube--controllers--758bd67986--7dfsz-eth0" Dec 16 13:19:46.250549 env[1193]: 2024-12-16 13:19:46.203 [INFO][3694] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="85c9574081e52ea45de4a192d631844608b5e36ab4566576bbd19a012981660a" Namespace="calico-system" Pod="calico-kube-controllers-758bd67986-7dfsz" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-calico--kube--controllers--758bd67986--7dfsz-eth0" Dec 16 13:19:46.250549 env[1193]: 2024-12-16 13:19:46.204 [INFO][3694] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="85c9574081e52ea45de4a192d631844608b5e36ab4566576bbd19a012981660a" Namespace="calico-system" Pod="calico-kube-controllers-758bd67986-7dfsz" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-calico--kube--controllers--758bd67986--7dfsz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--6--0e268b98cf-k8s-calico--kube--controllers--758bd67986--7dfsz-eth0", GenerateName:"calico-kube-controllers-758bd67986-", Namespace:"calico-system", SelfLink:"", UID:"7351e6b4-48f5-49f2-9546-d89197754a12", ResourceVersion:"907", Generation:0, CreationTimestamp:time.Date(2024, time.December, 16, 13, 19, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"758bd67986", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-6-0e268b98cf", ContainerID:"85c9574081e52ea45de4a192d631844608b5e36ab4566576bbd19a012981660a", Pod:"calico-kube-controllers-758bd67986-7dfsz", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.3.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid089a4fb365", MAC:"ca:91:04:01:fd:f2", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 16 13:19:46.250549 env[1193]: 2024-12-16 13:19:46.242 [INFO][3694] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="85c9574081e52ea45de4a192d631844608b5e36ab4566576bbd19a012981660a" Namespace="calico-system" Pod="calico-kube-controllers-758bd67986-7dfsz" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-calico--kube--controllers--758bd67986--7dfsz-eth0" Dec 16 13:19:46.371247 env[1193]: time="2024-12-16T13:19:46.369571779Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 16 13:19:46.371247 env[1193]: time="2024-12-16T13:19:46.369630756Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 16 13:19:46.371247 env[1193]: time="2024-12-16T13:19:46.369642148Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 16 13:19:46.373297 env[1193]: time="2024-12-16T13:19:46.371675197Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/85c9574081e52ea45de4a192d631844608b5e36ab4566576bbd19a012981660a pid=3787 runtime=io.containerd.runc.v2 Dec 16 13:19:46.414797 systemd-networkd[1003]: cali658f54677c6: Link UP Dec 16 13:19:46.421790 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali658f54677c6: link becomes ready Dec 16 13:19:46.421330 systemd-networkd[1003]: cali658f54677c6: Gained carrier Dec 16 13:19:46.448669 systemd[1]: run-containerd-runc-k8s.io-85c9574081e52ea45de4a192d631844608b5e36ab4566576bbd19a012981660a-runc.B2hHT9.mount: Deactivated successfully. Dec 16 13:19:46.470462 systemd[1]: Started cri-containerd-85c9574081e52ea45de4a192d631844608b5e36ab4566576bbd19a012981660a.scope. Dec 16 13:19:46.506646 env[1193]: 2024-12-16 13:19:46.013 [INFO][3723] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--6--0e268b98cf-k8s-csi--node--driver--ccvcz-eth0 csi-node-driver- calico-system cb5cda6c-0e08-4930-b912-35225d86fb7c 913 0 2024-12-16 13:19:15 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:56747c9949 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510.3.6-6-0e268b98cf csi-node-driver-ccvcz eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali658f54677c6 [] []}} ContainerID="38372f10132264ba8e644ff33c4f7483f5f4246f392419ecd0153e69c0f25852" Namespace="calico-system" Pod="csi-node-driver-ccvcz" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-csi--node--driver--ccvcz-" Dec 16 13:19:46.506646 env[1193]: 2024-12-16 13:19:46.015 [INFO][3723] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="38372f10132264ba8e644ff33c4f7483f5f4246f392419ecd0153e69c0f25852" Namespace="calico-system" Pod="csi-node-driver-ccvcz" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-csi--node--driver--ccvcz-eth0" Dec 16 13:19:46.506646 env[1193]: 2024-12-16 13:19:46.263 [INFO][3754] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="38372f10132264ba8e644ff33c4f7483f5f4246f392419ecd0153e69c0f25852" HandleID="k8s-pod-network.38372f10132264ba8e644ff33c4f7483f5f4246f392419ecd0153e69c0f25852" Workload="ci--3510.3.6--6--0e268b98cf-k8s-csi--node--driver--ccvcz-eth0" Dec 16 13:19:46.506646 env[1193]: 2024-12-16 13:19:46.311 [INFO][3754] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="38372f10132264ba8e644ff33c4f7483f5f4246f392419ecd0153e69c0f25852" HandleID="k8s-pod-network.38372f10132264ba8e644ff33c4f7483f5f4246f392419ecd0153e69c0f25852" Workload="ci--3510.3.6--6--0e268b98cf-k8s-csi--node--driver--ccvcz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00038e7a0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.6-6-0e268b98cf", "pod":"csi-node-driver-ccvcz", "timestamp":"2024-12-16 13:19:46.262895112 +0000 UTC"}, Hostname:"ci-3510.3.6-6-0e268b98cf", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 16 13:19:46.506646 env[1193]: 2024-12-16 13:19:46.312 [INFO][3754] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 16 13:19:46.506646 env[1193]: 2024-12-16 13:19:46.314 [INFO][3754] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 16 13:19:46.506646 env[1193]: 2024-12-16 13:19:46.314 [INFO][3754] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-6-0e268b98cf' Dec 16 13:19:46.506646 env[1193]: 2024-12-16 13:19:46.319 [INFO][3754] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.38372f10132264ba8e644ff33c4f7483f5f4246f392419ecd0153e69c0f25852" host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:46.506646 env[1193]: 2024-12-16 13:19:46.333 [INFO][3754] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:46.506646 env[1193]: 2024-12-16 13:19:46.342 [INFO][3754] ipam/ipam.go 489: Trying affinity for 192.168.3.192/26 host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:46.506646 env[1193]: 2024-12-16 13:19:46.347 [INFO][3754] ipam/ipam.go 155: Attempting to load block cidr=192.168.3.192/26 host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:46.506646 env[1193]: 2024-12-16 13:19:46.353 [INFO][3754] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.3.192/26 host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:46.506646 env[1193]: 2024-12-16 13:19:46.353 [INFO][3754] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.3.192/26 handle="k8s-pod-network.38372f10132264ba8e644ff33c4f7483f5f4246f392419ecd0153e69c0f25852" host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:46.506646 env[1193]: 2024-12-16 13:19:46.359 [INFO][3754] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.38372f10132264ba8e644ff33c4f7483f5f4246f392419ecd0153e69c0f25852 Dec 16 13:19:46.506646 env[1193]: 2024-12-16 13:19:46.368 [INFO][3754] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.3.192/26 handle="k8s-pod-network.38372f10132264ba8e644ff33c4f7483f5f4246f392419ecd0153e69c0f25852" host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:46.506646 env[1193]: 2024-12-16 13:19:46.397 [INFO][3754] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.3.197/26] block=192.168.3.192/26 handle="k8s-pod-network.38372f10132264ba8e644ff33c4f7483f5f4246f392419ecd0153e69c0f25852" host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:46.506646 env[1193]: 2024-12-16 13:19:46.397 [INFO][3754] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.3.197/26] handle="k8s-pod-network.38372f10132264ba8e644ff33c4f7483f5f4246f392419ecd0153e69c0f25852" host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:46.506646 env[1193]: 2024-12-16 13:19:46.397 [INFO][3754] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 16 13:19:46.506646 env[1193]: 2024-12-16 13:19:46.397 [INFO][3754] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.3.197/26] IPv6=[] ContainerID="38372f10132264ba8e644ff33c4f7483f5f4246f392419ecd0153e69c0f25852" HandleID="k8s-pod-network.38372f10132264ba8e644ff33c4f7483f5f4246f392419ecd0153e69c0f25852" Workload="ci--3510.3.6--6--0e268b98cf-k8s-csi--node--driver--ccvcz-eth0" Dec 16 13:19:46.507818 env[1193]: 2024-12-16 13:19:46.401 [INFO][3723] cni-plugin/k8s.go 386: Populated endpoint ContainerID="38372f10132264ba8e644ff33c4f7483f5f4246f392419ecd0153e69c0f25852" Namespace="calico-system" Pod="csi-node-driver-ccvcz" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-csi--node--driver--ccvcz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--6--0e268b98cf-k8s-csi--node--driver--ccvcz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cb5cda6c-0e08-4930-b912-35225d86fb7c", ResourceVersion:"913", Generation:0, CreationTimestamp:time.Date(2024, time.December, 16, 13, 19, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-6-0e268b98cf", ContainerID:"", Pod:"csi-node-driver-ccvcz", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.3.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali658f54677c6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 16 13:19:46.507818 env[1193]: 2024-12-16 13:19:46.401 [INFO][3723] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.3.197/32] ContainerID="38372f10132264ba8e644ff33c4f7483f5f4246f392419ecd0153e69c0f25852" Namespace="calico-system" Pod="csi-node-driver-ccvcz" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-csi--node--driver--ccvcz-eth0" Dec 16 13:19:46.507818 env[1193]: 2024-12-16 13:19:46.401 [INFO][3723] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali658f54677c6 ContainerID="38372f10132264ba8e644ff33c4f7483f5f4246f392419ecd0153e69c0f25852" Namespace="calico-system" Pod="csi-node-driver-ccvcz" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-csi--node--driver--ccvcz-eth0" Dec 16 13:19:46.507818 env[1193]: 2024-12-16 13:19:46.427 [INFO][3723] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="38372f10132264ba8e644ff33c4f7483f5f4246f392419ecd0153e69c0f25852" Namespace="calico-system" Pod="csi-node-driver-ccvcz" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-csi--node--driver--ccvcz-eth0" Dec 16 13:19:46.507818 env[1193]: 2024-12-16 13:19:46.456 [INFO][3723] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="38372f10132264ba8e644ff33c4f7483f5f4246f392419ecd0153e69c0f25852" Namespace="calico-system" Pod="csi-node-driver-ccvcz" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-csi--node--driver--ccvcz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--6--0e268b98cf-k8s-csi--node--driver--ccvcz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cb5cda6c-0e08-4930-b912-35225d86fb7c", ResourceVersion:"913", Generation:0, CreationTimestamp:time.Date(2024, time.December, 16, 13, 19, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-6-0e268b98cf", ContainerID:"38372f10132264ba8e644ff33c4f7483f5f4246f392419ecd0153e69c0f25852", Pod:"csi-node-driver-ccvcz", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.3.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali658f54677c6", MAC:"fa:b8:a4:1f:18:12", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 16 13:19:46.507818 env[1193]: 2024-12-16 13:19:46.500 [INFO][3723] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="38372f10132264ba8e644ff33c4f7483f5f4246f392419ecd0153e69c0f25852" Namespace="calico-system" Pod="csi-node-driver-ccvcz" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-csi--node--driver--ccvcz-eth0" Dec 16 13:19:46.568697 env[1193]: time="2024-12-16T13:19:46.568557394Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 16 13:19:46.568895 env[1193]: time="2024-12-16T13:19:46.568709952Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 16 13:19:46.568895 env[1193]: time="2024-12-16T13:19:46.568749289Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 16 13:19:46.569281 env[1193]: time="2024-12-16T13:19:46.569157794Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/38372f10132264ba8e644ff33c4f7483f5f4246f392419ecd0153e69c0f25852 pid=3830 runtime=io.containerd.runc.v2 Dec 16 13:19:46.615693 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali05140dd29f5: link becomes ready Dec 16 13:19:46.615173 systemd-networkd[1003]: cali05140dd29f5: Link UP Dec 16 13:19:46.615449 systemd-networkd[1003]: cali05140dd29f5: Gained carrier Dec 16 13:19:46.621005 systemd[1]: Started cri-containerd-38372f10132264ba8e644ff33c4f7483f5f4246f392419ecd0153e69c0f25852.scope. Dec 16 13:19:46.658873 env[1193]: 2024-12-16 13:19:46.045 [INFO][3708] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--fmtjs-eth0 coredns-6f6b679f8f- kube-system e13621c2-02f4-41d6-80b5-938bac2450b8 915 0 2024-12-16 13:19:00 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.6-6-0e268b98cf coredns-6f6b679f8f-fmtjs eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali05140dd29f5 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="f8e6e99a7f221e57e065cb0ef2977e18cffc7aad3152a586b0dea47f605c579a" Namespace="kube-system" Pod="coredns-6f6b679f8f-fmtjs" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--fmtjs-" Dec 16 13:19:46.658873 env[1193]: 2024-12-16 13:19:46.045 [INFO][3708] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="f8e6e99a7f221e57e065cb0ef2977e18cffc7aad3152a586b0dea47f605c579a" Namespace="kube-system" Pod="coredns-6f6b679f8f-fmtjs" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--fmtjs-eth0" Dec 16 13:19:46.658873 env[1193]: 2024-12-16 13:19:46.377 [INFO][3758] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f8e6e99a7f221e57e065cb0ef2977e18cffc7aad3152a586b0dea47f605c579a" HandleID="k8s-pod-network.f8e6e99a7f221e57e065cb0ef2977e18cffc7aad3152a586b0dea47f605c579a" Workload="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--fmtjs-eth0" Dec 16 13:19:46.658873 env[1193]: 2024-12-16 13:19:46.450 [INFO][3758] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f8e6e99a7f221e57e065cb0ef2977e18cffc7aad3152a586b0dea47f605c579a" HandleID="k8s-pod-network.f8e6e99a7f221e57e065cb0ef2977e18cffc7aad3152a586b0dea47f605c579a" Workload="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--fmtjs-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00039f730), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.6-6-0e268b98cf", "pod":"coredns-6f6b679f8f-fmtjs", "timestamp":"2024-12-16 13:19:46.374731015 +0000 UTC"}, Hostname:"ci-3510.3.6-6-0e268b98cf", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 16 13:19:46.658873 env[1193]: 2024-12-16 13:19:46.455 [INFO][3758] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 16 13:19:46.658873 env[1193]: 2024-12-16 13:19:46.459 [INFO][3758] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 16 13:19:46.658873 env[1193]: 2024-12-16 13:19:46.459 [INFO][3758] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-6-0e268b98cf' Dec 16 13:19:46.658873 env[1193]: 2024-12-16 13:19:46.484 [INFO][3758] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f8e6e99a7f221e57e065cb0ef2977e18cffc7aad3152a586b0dea47f605c579a" host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:46.658873 env[1193]: 2024-12-16 13:19:46.515 [INFO][3758] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:46.658873 env[1193]: 2024-12-16 13:19:46.531 [INFO][3758] ipam/ipam.go 489: Trying affinity for 192.168.3.192/26 host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:46.658873 env[1193]: 2024-12-16 13:19:46.535 [INFO][3758] ipam/ipam.go 155: Attempting to load block cidr=192.168.3.192/26 host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:46.658873 env[1193]: 2024-12-16 13:19:46.543 [INFO][3758] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.3.192/26 host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:46.658873 env[1193]: 2024-12-16 13:19:46.543 [INFO][3758] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.3.192/26 handle="k8s-pod-network.f8e6e99a7f221e57e065cb0ef2977e18cffc7aad3152a586b0dea47f605c579a" host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:46.658873 env[1193]: 2024-12-16 13:19:46.551 [INFO][3758] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.f8e6e99a7f221e57e065cb0ef2977e18cffc7aad3152a586b0dea47f605c579a Dec 16 13:19:46.658873 env[1193]: 2024-12-16 13:19:46.564 [INFO][3758] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.3.192/26 handle="k8s-pod-network.f8e6e99a7f221e57e065cb0ef2977e18cffc7aad3152a586b0dea47f605c579a" host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:46.658873 env[1193]: 2024-12-16 13:19:46.601 [INFO][3758] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.3.198/26] block=192.168.3.192/26 handle="k8s-pod-network.f8e6e99a7f221e57e065cb0ef2977e18cffc7aad3152a586b0dea47f605c579a" host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:46.658873 env[1193]: 2024-12-16 13:19:46.601 [INFO][3758] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.3.198/26] handle="k8s-pod-network.f8e6e99a7f221e57e065cb0ef2977e18cffc7aad3152a586b0dea47f605c579a" host="ci-3510.3.6-6-0e268b98cf" Dec 16 13:19:46.658873 env[1193]: 2024-12-16 13:19:46.601 [INFO][3758] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 16 13:19:46.658873 env[1193]: 2024-12-16 13:19:46.601 [INFO][3758] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.3.198/26] IPv6=[] ContainerID="f8e6e99a7f221e57e065cb0ef2977e18cffc7aad3152a586b0dea47f605c579a" HandleID="k8s-pod-network.f8e6e99a7f221e57e065cb0ef2977e18cffc7aad3152a586b0dea47f605c579a" Workload="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--fmtjs-eth0" Dec 16 13:19:46.660295 env[1193]: 2024-12-16 13:19:46.610 [INFO][3708] cni-plugin/k8s.go 386: Populated endpoint ContainerID="f8e6e99a7f221e57e065cb0ef2977e18cffc7aad3152a586b0dea47f605c579a" Namespace="kube-system" Pod="coredns-6f6b679f8f-fmtjs" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--fmtjs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--fmtjs-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"e13621c2-02f4-41d6-80b5-938bac2450b8", ResourceVersion:"915", Generation:0, CreationTimestamp:time.Date(2024, time.December, 16, 13, 19, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-6-0e268b98cf", ContainerID:"", Pod:"coredns-6f6b679f8f-fmtjs", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.3.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali05140dd29f5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 16 13:19:46.660295 env[1193]: 2024-12-16 13:19:46.610 [INFO][3708] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.3.198/32] ContainerID="f8e6e99a7f221e57e065cb0ef2977e18cffc7aad3152a586b0dea47f605c579a" Namespace="kube-system" Pod="coredns-6f6b679f8f-fmtjs" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--fmtjs-eth0" Dec 16 13:19:46.660295 env[1193]: 2024-12-16 13:19:46.610 [INFO][3708] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali05140dd29f5 ContainerID="f8e6e99a7f221e57e065cb0ef2977e18cffc7aad3152a586b0dea47f605c579a" Namespace="kube-system" Pod="coredns-6f6b679f8f-fmtjs" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--fmtjs-eth0" Dec 16 13:19:46.660295 env[1193]: 2024-12-16 13:19:46.614 [INFO][3708] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f8e6e99a7f221e57e065cb0ef2977e18cffc7aad3152a586b0dea47f605c579a" Namespace="kube-system" Pod="coredns-6f6b679f8f-fmtjs" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--fmtjs-eth0" Dec 16 13:19:46.660295 env[1193]: 2024-12-16 13:19:46.631 [INFO][3708] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="f8e6e99a7f221e57e065cb0ef2977e18cffc7aad3152a586b0dea47f605c579a" Namespace="kube-system" Pod="coredns-6f6b679f8f-fmtjs" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--fmtjs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--fmtjs-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"e13621c2-02f4-41d6-80b5-938bac2450b8", ResourceVersion:"915", Generation:0, CreationTimestamp:time.Date(2024, time.December, 16, 13, 19, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-6-0e268b98cf", ContainerID:"f8e6e99a7f221e57e065cb0ef2977e18cffc7aad3152a586b0dea47f605c579a", Pod:"coredns-6f6b679f8f-fmtjs", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.3.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali05140dd29f5", MAC:"5e:b2:08:85:9d:4d", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 16 13:19:46.660295 env[1193]: 2024-12-16 13:19:46.649 [INFO][3708] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="f8e6e99a7f221e57e065cb0ef2977e18cffc7aad3152a586b0dea47f605c579a" Namespace="kube-system" Pod="coredns-6f6b679f8f-fmtjs" WorkloadEndpoint="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--fmtjs-eth0" Dec 16 13:19:46.725943 env[1193]: time="2024-12-16T13:19:46.723328443Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 16 13:19:46.725943 env[1193]: time="2024-12-16T13:19:46.723404743Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 16 13:19:46.725943 env[1193]: time="2024-12-16T13:19:46.723420193Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 16 13:19:46.725943 env[1193]: time="2024-12-16T13:19:46.723628425Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f8e6e99a7f221e57e065cb0ef2977e18cffc7aad3152a586b0dea47f605c579a pid=3878 runtime=io.containerd.runc.v2 Dec 16 13:19:46.793899 systemd[1]: run-containerd-runc-k8s.io-f8e6e99a7f221e57e065cb0ef2977e18cffc7aad3152a586b0dea47f605c579a-runc.d0JhWQ.mount: Deactivated successfully. Dec 16 13:19:46.803201 systemd[1]: Started cri-containerd-f8e6e99a7f221e57e065cb0ef2977e18cffc7aad3152a586b0dea47f605c579a.scope. Dec 16 13:19:46.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.815000 audit: BPF prog-id=174 op=LOAD Dec 16 13:19:46.818000 audit[3895]: NETFILTER_CFG table=filter:103 family=2 entries=46 op=nft_register_chain pid=3895 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 16 13:19:46.818000 audit[3895]: SYSCALL arch=c000003e syscall=46 success=yes exit=22712 a0=3 a1=7fff0b185b10 a2=0 a3=7fff0b185afc items=0 ppid=3202 pid=3895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:46.818000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 16 13:19:46.825000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.825000 audit[3801]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3787 pid=3801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:46.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835633935373430383165353265613435646534613139326436333138 Dec 16 13:19:46.826000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.826000 audit[3801]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3787 pid=3801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:46.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835633935373430383165353265613435646534613139326436333138 Dec 16 13:19:46.826000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.826000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.826000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.826000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.826000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.826000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.826000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.826000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.826000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.826000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.826000 audit: BPF prog-id=175 op=LOAD Dec 16 13:19:46.826000 audit[3801]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000954c0 items=0 ppid=3787 pid=3801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:46.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835633935373430383165353265613435646534613139326436333138 Dec 16 13:19:46.827000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.827000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.827000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.827000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.827000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.827000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.827000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.827000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.827000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.827000 audit: BPF prog-id=176 op=LOAD Dec 16 13:19:46.827000 audit[3801]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000095508 items=0 ppid=3787 pid=3801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:46.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835633935373430383165353265613435646534613139326436333138 Dec 16 13:19:46.828000 audit: BPF prog-id=176 op=UNLOAD Dec 16 13:19:46.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.830000 audit: BPF prog-id=177 op=LOAD Dec 16 13:19:46.831000 audit[3837]: AVC avc: denied { bpf } for pid=3837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.831000 audit[3837]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3830 pid=3837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:46.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338333732663130313332323634626138653634346666333363346637 Dec 16 13:19:46.833000 audit: BPF prog-id=175 op=UNLOAD Dec 16 13:19:46.833000 audit[3837]: AVC avc: denied { perfmon } for pid=3837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit[3837]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3830 pid=3837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:46.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338333732663130313332323634626138653634346666333363346637 Dec 16 13:19:46.833000 audit[3837]: AVC avc: denied { bpf } for pid=3837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit[3837]: AVC avc: denied { bpf } for pid=3837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit[3837]: AVC avc: denied { bpf } for pid=3837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit[3837]: AVC avc: denied { perfmon } for pid=3837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit[3837]: AVC avc: denied { perfmon } for pid=3837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit[3837]: AVC avc: denied { perfmon } for pid=3837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit[3837]: AVC avc: denied { perfmon } for pid=3837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit[3837]: AVC avc: denied { perfmon } for pid=3837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit[3837]: AVC avc: denied { bpf } for pid=3837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit[3837]: AVC avc: denied { bpf } for pid=3837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit: BPF prog-id=178 op=LOAD Dec 16 13:19:46.833000 audit[3837]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000211880 items=0 ppid=3830 pid=3837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:46.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338333732663130313332323634626138653634346666333363346637 Dec 16 13:19:46.833000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit[3837]: AVC avc: denied { bpf } for pid=3837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit[3801]: AVC avc: denied { perfmon } for pid=3801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit[3837]: AVC avc: denied { bpf } for pid=3837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit[3837]: AVC avc: denied { perfmon } for pid=3837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit[3837]: AVC avc: denied { perfmon } for pid=3837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit[3837]: AVC avc: denied { perfmon } for pid=3837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit[3837]: AVC avc: denied { perfmon } for pid=3837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit[3837]: AVC avc: denied { perfmon } for pid=3837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit[3837]: AVC avc: denied { bpf } for pid=3837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit[3837]: AVC avc: denied { bpf } for pid=3837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit: BPF prog-id=179 op=LOAD Dec 16 13:19:46.833000 audit[3837]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002118c8 items=0 ppid=3830 pid=3837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:46.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338333732663130313332323634626138653634346666333363346637 Dec 16 13:19:46.833000 audit: BPF prog-id=179 op=UNLOAD Dec 16 13:19:46.833000 audit: BPF prog-id=178 op=UNLOAD Dec 16 13:19:46.833000 audit[3837]: AVC avc: denied { bpf } for pid=3837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit[3837]: AVC avc: denied { bpf } for pid=3837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit[3837]: AVC avc: denied { bpf } for pid=3837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit[3837]: AVC avc: denied { perfmon } for pid=3837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit[3837]: AVC avc: denied { perfmon } for pid=3837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit[3837]: AVC avc: denied { perfmon } for pid=3837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit[3837]: AVC avc: denied { perfmon } for pid=3837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit[3837]: AVC avc: denied { perfmon } for pid=3837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit[3837]: AVC avc: denied { bpf } for pid=3837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit[3837]: AVC avc: denied { bpf } for pid=3837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit: BPF prog-id=180 op=LOAD Dec 16 13:19:46.833000 audit[3837]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000211cd8 items=0 ppid=3830 pid=3837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:46.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338333732663130313332323634626138653634346666333363346637 Dec 16 13:19:46.833000 audit[3801]: AVC avc: denied { bpf } for pid=3801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.833000 audit: BPF prog-id=181 op=LOAD Dec 16 13:19:46.833000 audit[3801]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000095918 items=0 ppid=3787 pid=3801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:46.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835633935373430383165353265613435646534613139326436333138 Dec 16 13:19:46.853089 sshd[3740]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.166 user=root Dec 16 13:19:46.852000 audit[3740]: USER_AUTH pid=3740 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.166 addr=218.92.0.166 terminal=ssh res=failed' Dec 16 13:19:46.864000 audit[3902]: NETFILTER_CFG table=filter:104 family=2 entries=16 op=nft_register_rule pid=3902 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:46.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.876000 audit: BPF prog-id=182 op=LOAD Dec 16 13:19:46.877000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.877000 audit[3890]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3878 pid=3890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:46.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638653665393961376632323165353765303635636230656632393737 Dec 16 13:19:46.877000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.877000 audit[3890]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3878 pid=3890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:46.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638653665393961376632323165353765303635636230656632393737 Dec 16 13:19:46.881000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.881000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.881000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.881000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.881000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.881000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.881000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.881000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.881000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.881000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.881000 audit: BPF prog-id=183 op=LOAD Dec 16 13:19:46.881000 audit[3890]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a0470 items=0 ppid=3878 pid=3890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:46.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638653665393961376632323165353765303635636230656632393737 Dec 16 13:19:46.881000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.881000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.881000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.881000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.881000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.881000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.881000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.881000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.881000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.881000 audit: BPF prog-id=184 op=LOAD Dec 16 13:19:46.881000 audit[3890]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a04b8 items=0 ppid=3878 pid=3890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:46.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638653665393961376632323165353765303635636230656632393737 Dec 16 13:19:46.881000 audit: BPF prog-id=184 op=UNLOAD Dec 16 13:19:46.881000 audit: BPF prog-id=183 op=UNLOAD Dec 16 13:19:46.883000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.883000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.883000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.883000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.883000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.883000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.883000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.883000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.883000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.883000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:46.883000 audit: BPF prog-id=185 op=LOAD Dec 16 13:19:46.883000 audit[3890]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a08c8 items=0 ppid=3878 pid=3890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:46.883000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638653665393961376632323165353765303635636230656632393737 Dec 16 13:19:46.864000 audit[3902]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffcc3c677e0 a2=0 a3=7ffcc3c677cc items=0 ppid=2042 pid=3902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:46.864000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:46.884000 audit[3902]: NETFILTER_CFG table=nat:105 family=2 entries=14 op=nft_register_rule pid=3902 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:46.884000 audit[3902]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffcc3c677e0 a2=0 a3=0 items=0 ppid=2042 pid=3902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:46.884000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:46.951775 env[1193]: time="2024-12-16T13:19:46.951715955Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ccvcz,Uid:cb5cda6c-0e08-4930-b912-35225d86fb7c,Namespace:calico-system,Attempt:1,} returns sandbox id \"38372f10132264ba8e644ff33c4f7483f5f4246f392419ecd0153e69c0f25852\"" Dec 16 13:19:46.972000 audit[3924]: NETFILTER_CFG table=filter:106 family=2 entries=74 op=nft_register_chain pid=3924 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 16 13:19:46.972000 audit[3924]: SYSCALL arch=c000003e syscall=46 success=yes exit=39188 a0=3 a1=7ffcbcb34d90 a2=0 a3=7ffcbcb34d7c items=0 ppid=3202 pid=3924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:46.972000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 16 13:19:46.990690 env[1193]: time="2024-12-16T13:19:46.990627376Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-fmtjs,Uid:e13621c2-02f4-41d6-80b5-938bac2450b8,Namespace:kube-system,Attempt:1,} returns sandbox id \"f8e6e99a7f221e57e065cb0ef2977e18cffc7aad3152a586b0dea47f605c579a\"" Dec 16 13:19:46.992592 kubelet[1921]: E1216 13:19:46.991869 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:19:46.998172 env[1193]: time="2024-12-16T13:19:46.997787881Z" level=info msg="CreateContainer within sandbox \"f8e6e99a7f221e57e065cb0ef2977e18cffc7aad3152a586b0dea47f605c579a\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 16 13:19:47.099906 env[1193]: time="2024-12-16T13:19:47.099842123Z" level=info msg="CreateContainer within sandbox \"f8e6e99a7f221e57e065cb0ef2977e18cffc7aad3152a586b0dea47f605c579a\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"8f49d9a7f2b7734c9b4c4bfb26f9be8fcb418d556a881d7ac513bad31261acbc\"" Dec 16 13:19:47.104735 env[1193]: time="2024-12-16T13:19:47.104205105Z" level=info msg="StartContainer for \"8f49d9a7f2b7734c9b4c4bfb26f9be8fcb418d556a881d7ac513bad31261acbc\"" Dec 16 13:19:47.139721 env[1193]: time="2024-12-16T13:19:47.137311299Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-758bd67986-7dfsz,Uid:7351e6b4-48f5-49f2-9546-d89197754a12,Namespace:calico-system,Attempt:1,} returns sandbox id \"85c9574081e52ea45de4a192d631844608b5e36ab4566576bbd19a012981660a\"" Dec 16 13:19:47.149616 kubelet[1921]: E1216 13:19:47.149113 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:19:47.201179 systemd[1]: Started cri-containerd-8f49d9a7f2b7734c9b4c4bfb26f9be8fcb418d556a881d7ac513bad31261acbc.scope. Dec 16 13:19:47.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.239000 audit: BPF prog-id=186 op=LOAD Dec 16 13:19:47.240000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.240000 audit[3943]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3878 pid=3943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:47.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866343964396137663262373733346339623463346266623236663962 Dec 16 13:19:47.240000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.240000 audit[3943]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3878 pid=3943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:47.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866343964396137663262373733346339623463346266623236663962 Dec 16 13:19:47.240000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.240000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.240000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.240000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.240000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.240000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.240000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.240000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.240000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.240000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.240000 audit: BPF prog-id=187 op=LOAD Dec 16 13:19:47.240000 audit[3943]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000313310 items=0 ppid=3878 pid=3943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:47.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866343964396137663262373733346339623463346266623236663962 Dec 16 13:19:47.240000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.240000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.240000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.240000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.240000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.240000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.240000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.240000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.240000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.240000 audit: BPF prog-id=188 op=LOAD Dec 16 13:19:47.240000 audit[3943]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000313358 items=0 ppid=3878 pid=3943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:47.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866343964396137663262373733346339623463346266623236663962 Dec 16 13:19:47.240000 audit: BPF prog-id=188 op=UNLOAD Dec 16 13:19:47.240000 audit: BPF prog-id=187 op=UNLOAD Dec 16 13:19:47.241000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.241000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.241000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.241000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.241000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.241000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.241000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.241000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.241000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.241000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:47.241000 audit: BPF prog-id=189 op=LOAD Dec 16 13:19:47.241000 audit[3943]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000313768 items=0 ppid=3878 pid=3943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:47.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866343964396137663262373733346339623463346266623236663962 Dec 16 13:19:47.277153 env[1193]: time="2024-12-16T13:19:47.277045896Z" level=info msg="StartContainer for \"8f49d9a7f2b7734c9b4c4bfb26f9be8fcb418d556a881d7ac513bad31261acbc\" returns successfully" Dec 16 13:19:47.289000 audit[3965]: NETFILTER_CFG table=filter:107 family=2 entries=13 op=nft_register_rule pid=3965 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:47.289000 audit[3965]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe83d175a0 a2=0 a3=7ffe83d1758c items=0 ppid=2042 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:47.289000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:47.312000 audit[3965]: NETFILTER_CFG table=nat:108 family=2 entries=35 op=nft_register_chain pid=3965 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:47.312000 audit[3965]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe83d175a0 a2=0 a3=7ffe83d1758c items=0 ppid=2042 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:47.312000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:47.758457 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2395794324.mount: Deactivated successfully. Dec 16 13:19:48.107703 env[1193]: time="2024-12-16T13:19:48.107530399Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:48.109634 env[1193]: time="2024-12-16T13:19:48.109559892Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:48.111686 env[1193]: time="2024-12-16T13:19:48.111633432Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:48.113762 env[1193]: time="2024-12-16T13:19:48.113689645Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:48.115394 env[1193]: time="2024-12-16T13:19:48.115338938Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 16 13:19:48.118699 env[1193]: time="2024-12-16T13:19:48.118655005Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 16 13:19:48.128817 env[1193]: time="2024-12-16T13:19:48.127748936Z" level=info msg="CreateContainer within sandbox \"f8346740bd605f9bade63fa377caf2c687c702ccfda62fa1f5c45b23ca60eec6\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 16 13:19:48.153008 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2890086773.mount: Deactivated successfully. Dec 16 13:19:48.160554 kubelet[1921]: E1216 13:19:48.159010 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:19:48.163572 env[1193]: time="2024-12-16T13:19:48.163446453Z" level=info msg="CreateContainer within sandbox \"f8346740bd605f9bade63fa377caf2c687c702ccfda62fa1f5c45b23ca60eec6\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"9f3aa0df1fa19a06d34f51bebaa76e4dd84f486760b8d7eb4c19aa6c7501350f\"" Dec 16 13:19:48.175298 env[1193]: time="2024-12-16T13:19:48.175239303Z" level=info msg="StartContainer for \"9f3aa0df1fa19a06d34f51bebaa76e4dd84f486760b8d7eb4c19aa6c7501350f\"" Dec 16 13:19:48.181755 kubelet[1921]: E1216 13:19:48.181617 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:19:48.201247 systemd-networkd[1003]: calid089a4fb365: Gained IPv6LL Dec 16 13:19:48.229604 kubelet[1921]: I1216 13:19:48.229513 1921 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-fmtjs" podStartSLOduration=48.229480829 podStartE2EDuration="48.229480829s" podCreationTimestamp="2024-12-16 13:19:00 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-16 13:19:48.21162635 +0000 UTC m=+53.005103269" watchObservedRunningTime="2024-12-16 13:19:48.229480829 +0000 UTC m=+53.022957750" Dec 16 13:19:48.249432 systemd[1]: Started cri-containerd-9f3aa0df1fa19a06d34f51bebaa76e4dd84f486760b8d7eb4c19aa6c7501350f.scope. Dec 16 13:19:48.263304 systemd-networkd[1003]: cali658f54677c6: Gained IPv6LL Dec 16 13:19:48.300000 audit[3991]: NETFILTER_CFG table=filter:109 family=2 entries=10 op=nft_register_rule pid=3991 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:48.300000 audit[3991]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe5382ce90 a2=0 a3=7ffe5382ce7c items=0 ppid=2042 pid=3991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:48.300000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:48.307000 audit[3991]: NETFILTER_CFG table=nat:110 family=2 entries=44 op=nft_register_rule pid=3991 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:48.307000 audit[3991]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe5382ce90 a2=0 a3=7ffe5382ce7c items=0 ppid=2042 pid=3991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:48.307000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:48.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.323000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.323000 audit: BPF prog-id=190 op=LOAD Dec 16 13:19:48.325000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.325000 audit[3981]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3156 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:48.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966336161306466316661313961303664333466353162656261613736 Dec 16 13:19:48.325000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.325000 audit[3981]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3156 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:48.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966336161306466316661313961303664333466353162656261613736 Dec 16 13:19:48.325000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.325000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.325000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.325000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.325000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.325000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.325000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.325000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.325000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.325000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.325000 audit: BPF prog-id=191 op=LOAD Dec 16 13:19:48.325000 audit[3981]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000229bd0 items=0 ppid=3156 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:48.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966336161306466316661313961303664333466353162656261613736 Dec 16 13:19:48.325000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.325000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.325000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.325000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.325000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.325000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.325000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.325000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.325000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.325000 audit: BPF prog-id=192 op=LOAD Dec 16 13:19:48.325000 audit[3981]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000229c18 items=0 ppid=3156 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:48.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966336161306466316661313961303664333466353162656261613736 Dec 16 13:19:48.325000 audit: BPF prog-id=192 op=UNLOAD Dec 16 13:19:48.325000 audit: BPF prog-id=191 op=UNLOAD Dec 16 13:19:48.325000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.325000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.325000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.325000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.325000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.325000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.325000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.325000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.325000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.325000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.325000 audit: BPF prog-id=193 op=LOAD Dec 16 13:19:48.325000 audit[3981]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000274028 items=0 ppid=3156 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:48.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966336161306466316661313961303664333466353162656261613736 Dec 16 13:19:48.391662 env[1193]: time="2024-12-16T13:19:48.387576817Z" level=info msg="StartContainer for \"9f3aa0df1fa19a06d34f51bebaa76e4dd84f486760b8d7eb4c19aa6c7501350f\" returns successfully" Dec 16 13:19:48.511675 env[1193]: time="2024-12-16T13:19:48.511606126Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:48.512883 env[1193]: time="2024-12-16T13:19:48.512831402Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:48.514575 env[1193]: time="2024-12-16T13:19:48.514526099Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:48.516314 env[1193]: time="2024-12-16T13:19:48.516265086Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:48.517392 env[1193]: time="2024-12-16T13:19:48.517326631Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 16 13:19:48.520602 env[1193]: time="2024-12-16T13:19:48.520551149Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 16 13:19:48.524315 env[1193]: time="2024-12-16T13:19:48.524263436Z" level=info msg="CreateContainer within sandbox \"ba7a602aa90c20636af790b1a18e0ffd4ae9480a755ab2dec5e69d7baec0971f\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 16 13:19:48.542835 env[1193]: time="2024-12-16T13:19:48.542752807Z" level=info msg="CreateContainer within sandbox \"ba7a602aa90c20636af790b1a18e0ffd4ae9480a755ab2dec5e69d7baec0971f\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"8c1a900d124dca5f32830877448431176681a797d98c339ffe373e6abc31bc58\"" Dec 16 13:19:48.543929 env[1193]: time="2024-12-16T13:19:48.543870825Z" level=info msg="StartContainer for \"8c1a900d124dca5f32830877448431176681a797d98c339ffe373e6abc31bc58\"" Dec 16 13:19:48.594999 systemd[1]: Started cri-containerd-8c1a900d124dca5f32830877448431176681a797d98c339ffe373e6abc31bc58.scope. Dec 16 13:19:48.645816 systemd-networkd[1003]: cali05140dd29f5: Gained IPv6LL Dec 16 13:19:48.694928 kernel: kauditd_printk_skb: 501 callbacks suppressed Dec 16 13:19:48.695176 kernel: audit: type=1400 audit(1734355188.689:1299): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.699112 kernel: audit: type=1400 audit(1734355188.689:1300): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.703424 kernel: audit: type=1400 audit(1734355188.689:1301): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.709372 kernel: audit: type=1400 audit(1734355188.690:1302): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.718710 kernel: audit: type=1400 audit(1734355188.690:1303): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.718909 kernel: audit: type=1400 audit(1734355188.690:1304): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.725216 kernel: audit: type=1400 audit(1734355188.690:1305): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.733102 kernel: audit: type=1400 audit(1734355188.690:1306): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.737244 kernel: audit: type=1400 audit(1734355188.690:1307): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.745248 kernel: audit: type=1400 audit(1734355188.693:1308): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.693000 audit: BPF prog-id=194 op=LOAD Dec 16 13:19:48.695000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.695000 audit[4022]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3554 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:48.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863316139303064313234646361356633323833303837373434383433 Dec 16 13:19:48.695000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.695000 audit[4022]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3554 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:48.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863316139303064313234646361356633323833303837373434383433 Dec 16 13:19:48.695000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.695000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.695000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.695000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.695000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.695000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.695000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.695000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.695000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.695000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.695000 audit: BPF prog-id=195 op=LOAD Dec 16 13:19:48.695000 audit[4022]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000391650 items=0 ppid=3554 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:48.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863316139303064313234646361356633323833303837373434383433 Dec 16 13:19:48.697000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.697000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.697000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.697000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.697000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.697000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.697000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.697000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.697000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.697000 audit: BPF prog-id=196 op=LOAD Dec 16 13:19:48.697000 audit[4022]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000391698 items=0 ppid=3554 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:48.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863316139303064313234646361356633323833303837373434383433 Dec 16 13:19:48.698000 audit: BPF prog-id=196 op=UNLOAD Dec 16 13:19:48.698000 audit: BPF prog-id=195 op=UNLOAD Dec 16 13:19:48.698000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.698000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.698000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.698000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.698000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.698000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.698000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.698000 audit[4022]: AVC avc: denied { perfmon } for pid=4022 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.698000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.698000 audit[4022]: AVC avc: denied { bpf } for pid=4022 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:48.698000 audit: BPF prog-id=197 op=LOAD Dec 16 13:19:48.698000 audit[4022]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000391aa8 items=0 ppid=3554 pid=4022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:48.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863316139303064313234646361356633323833303837373434383433 Dec 16 13:19:48.759326 systemd[1]: run-containerd-runc-k8s.io-9f3aa0df1fa19a06d34f51bebaa76e4dd84f486760b8d7eb4c19aa6c7501350f-runc.GG8bpW.mount: Deactivated successfully. Dec 16 13:19:48.862407 env[1193]: time="2024-12-16T13:19:48.862330162Z" level=info msg="StartContainer for \"8c1a900d124dca5f32830877448431176681a797d98c339ffe373e6abc31bc58\" returns successfully" Dec 16 13:19:49.192508 kubelet[1921]: E1216 13:19:49.192466 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:19:49.194249 sshd[3740]: Failed password for root from 218.92.0.166 port 56136 ssh2 Dec 16 13:19:49.195358 kubelet[1921]: E1216 13:19:49.195318 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:19:49.213827 kubelet[1921]: I1216 13:19:49.213703 1921 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-78458c5f95-8rqzt" podStartSLOduration=28.301545533 podStartE2EDuration="34.213679953s" podCreationTimestamp="2024-12-16 13:19:15 +0000 UTC" firstStartedPulling="2024-12-16 13:19:42.205347262 +0000 UTC m=+46.998824159" lastFinishedPulling="2024-12-16 13:19:48.117481584 +0000 UTC m=+52.910958579" observedRunningTime="2024-12-16 13:19:49.209615573 +0000 UTC m=+54.003092492" watchObservedRunningTime="2024-12-16 13:19:49.213679953 +0000 UTC m=+54.007156870" Dec 16 13:19:49.276000 audit[4058]: NETFILTER_CFG table=filter:111 family=2 entries=10 op=nft_register_rule pid=4058 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:49.276000 audit[4058]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc68758a30 a2=0 a3=7ffc68758a1c items=0 ppid=2042 pid=4058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:49.276000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:49.309000 audit[4058]: NETFILTER_CFG table=nat:112 family=2 entries=56 op=nft_register_chain pid=4058 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:49.309000 audit[4058]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffc68758a30 a2=0 a3=7ffc68758a1c items=0 ppid=2042 pid=4058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:49.309000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:50.165712 systemd[1]: Started sshd@10-164.92.94.164:22-139.178.89.65:48008.service. Dec 16 13:19:50.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-164.92.94.164:22-139.178.89.65:48008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:50.196635 kubelet[1921]: E1216 13:19:50.196566 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:19:50.230000 audit[4061]: USER_ACCT pid=4061 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:50.232232 sshd[4061]: Accepted publickey for core from 139.178.89.65 port 48008 ssh2: RSA SHA256:Q+lFULKB/jVvshRdfdjHJzJxBGhdic6R851DS3iyBTE Dec 16 13:19:50.232000 audit[4061]: CRED_ACQ pid=4061 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:50.232000 audit[4061]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd60ba0fc0 a2=3 a3=0 items=0 ppid=1 pid=4061 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:50.232000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 16 13:19:50.235021 sshd[4061]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 16 13:19:50.249491 systemd-logind[1181]: New session 10 of user core. Dec 16 13:19:50.249935 systemd[1]: Started session-10.scope. Dec 16 13:19:50.265000 audit[4061]: USER_START pid=4061 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:50.269000 audit[4063]: CRED_ACQ pid=4063 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:50.416000 audit[4073]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4073 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:50.416000 audit[4073]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffef9006080 a2=0 a3=7ffef900606c items=0 ppid=2042 pid=4073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:50.416000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:50.439000 audit[3993]: AVC avc: denied { watch } for pid=3993 comm="apiserver" path="/calico-apiserver-certs/..2024_12_16_13_19_29.1679168857/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c360,c491 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c360,c491 tclass=file permissive=0 Dec 16 13:19:50.439000 audit[3993]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c04400 a2=fc6 a3=0 items=0 ppid=3156 pid=3993 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c360,c491 key=(null) Dec 16 13:19:50.439000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 16 13:19:50.433000 audit[4073]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4073 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:50.433000 audit[4073]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffef9006080 a2=0 a3=7ffef900606c items=0 ppid=2042 pid=4073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:50.433000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:50.676000 audit[1807]: AVC avc: denied { watch } for pid=1807 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:19:50.676000 audit[1807]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00177bcb0 a2=fc6 a3=0 items=0 ppid=1634 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 key=(null) Dec 16 13:19:50.676000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 16 13:19:50.683000 audit[1807]: AVC avc: denied { watch } for pid=1807 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526361 scontext=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:19:50.683000 audit[1807]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0017533c0 a2=fc6 a3=0 items=0 ppid=1634 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 key=(null) Dec 16 13:19:50.683000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 16 13:19:50.893796 kubelet[1921]: I1216 13:19:50.892774 1921 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-78458c5f95-xn82q" podStartSLOduration=32.440026503 podStartE2EDuration="35.892743116s" podCreationTimestamp="2024-12-16 13:19:15 +0000 UTC" firstStartedPulling="2024-12-16 13:19:45.066485468 +0000 UTC m=+49.859962374" lastFinishedPulling="2024-12-16 13:19:48.519202085 +0000 UTC m=+53.312678987" observedRunningTime="2024-12-16 13:19:49.245761384 +0000 UTC m=+54.039238333" watchObservedRunningTime="2024-12-16 13:19:50.892743116 +0000 UTC m=+55.686220036" Dec 16 13:19:50.983112 sshd[4061]: pam_unix(sshd:session): session closed for user core Dec 16 13:19:50.996000 audit[4061]: USER_END pid=4061 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:50.996000 audit[4061]: CRED_DISP pid=4061 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:50.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-164.92.94.164:22-139.178.89.65:48010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:51.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-164.92.94.164:22-139.178.89.65:48008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:50.998319 systemd[1]: Started sshd@11-164.92.94.164:22-139.178.89.65:48010.service. Dec 16 13:19:50.999729 systemd[1]: sshd@10-164.92.94.164:22-139.178.89.65:48008.service: Deactivated successfully. Dec 16 13:19:51.002845 systemd[1]: session-10.scope: Deactivated successfully. Dec 16 13:19:51.013367 systemd-logind[1181]: Session 10 logged out. Waiting for processes to exit. Dec 16 13:19:51.017629 systemd-logind[1181]: Removed session 10. Dec 16 13:19:51.108000 audit[3740]: USER_AUTH pid=3740 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.166 addr=218.92.0.166 terminal=ssh res=failed' Dec 16 13:19:51.109000 audit[4076]: USER_ACCT pid=4076 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:51.110635 sshd[4076]: Accepted publickey for core from 139.178.89.65 port 48010 ssh2: RSA SHA256:Q+lFULKB/jVvshRdfdjHJzJxBGhdic6R851DS3iyBTE Dec 16 13:19:51.115000 audit[4076]: CRED_ACQ pid=4076 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:51.115000 audit[4076]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5b0d7410 a2=3 a3=0 items=0 ppid=1 pid=4076 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:51.115000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 16 13:19:51.117164 sshd[4076]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 16 13:19:51.130740 systemd[1]: Started session-11.scope. Dec 16 13:19:51.131610 systemd-logind[1181]: New session 11 of user core. Dec 16 13:19:51.141000 audit[4076]: USER_START pid=4076 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:51.144000 audit[4079]: CRED_ACQ pid=4079 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:51.288000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:19:51.288000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00e751380 a2=fc6 a3=0 items=0 ppid=1621 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 key=(null) Dec 16 13:19:51.288000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39322E39342E313634002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 16 13:19:51.291000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526361 scontext=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:19:51.292000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:19:51.292000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00e927bc0 a2=fc6 a3=0 items=0 ppid=1621 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 key=(null) Dec 16 13:19:51.292000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39322E39342E313634002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 16 13:19:51.292000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526369 scontext=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:19:51.292000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00e927bf0 a2=fc6 a3=0 items=0 ppid=1621 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 key=(null) Dec 16 13:19:51.292000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39322E39342E313634002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 16 13:19:51.291000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00f874800 a2=fc6 a3=0 items=0 ppid=1621 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 key=(null) Dec 16 13:19:51.291000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39322E39342E313634002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 16 13:19:51.293000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526361 scontext=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:19:51.293000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00f874820 a2=fc6 a3=0 items=0 ppid=1621 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 key=(null) Dec 16 13:19:51.293000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39322E39342E313634002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 16 13:19:51.294000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:19:51.294000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00e751440 a2=fc6 a3=0 items=0 ppid=1621 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 key=(null) Dec 16 13:19:51.294000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39322E39342E313634002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 16 13:19:51.305000 audit[4080]: NETFILTER_CFG table=filter:115 family=2 entries=9 op=nft_register_rule pid=4080 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:51.305000 audit[4080]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe3c196e20 a2=0 a3=7ffe3c196e0c items=0 ppid=2042 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:51.305000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:51.312210 env[1193]: time="2024-12-16T13:19:51.310980638Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:51.314821 env[1193]: time="2024-12-16T13:19:51.314157807Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:51.318526 env[1193]: time="2024-12-16T13:19:51.318464022Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:51.322060 env[1193]: time="2024-12-16T13:19:51.321933769Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 16 13:19:51.322788 env[1193]: time="2024-12-16T13:19:51.322525526Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:51.332240 env[1193]: time="2024-12-16T13:19:51.331595930Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 16 13:19:51.334653 env[1193]: time="2024-12-16T13:19:51.334586486Z" level=info msg="CreateContainer within sandbox \"38372f10132264ba8e644ff33c4f7483f5f4246f392419ecd0153e69c0f25852\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 16 13:19:51.358000 audit[4080]: NETFILTER_CFG table=nat:116 family=2 entries=27 op=nft_register_chain pid=4080 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:51.358000 audit[4080]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe3c196e20 a2=0 a3=7ffe3c196e0c items=0 ppid=2042 pid=4080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:51.358000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:51.389320 env[1193]: time="2024-12-16T13:19:51.389237430Z" level=info msg="CreateContainer within sandbox \"38372f10132264ba8e644ff33c4f7483f5f4246f392419ecd0153e69c0f25852\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"72504933bb13ab9d7aacf4f5675304777ae9a9a12f83897b640a0d1368892ef3\"" Dec 16 13:19:51.396693 env[1193]: time="2024-12-16T13:19:51.396623633Z" level=info msg="StartContainer for \"72504933bb13ab9d7aacf4f5675304777ae9a9a12f83897b640a0d1368892ef3\"" Dec 16 13:19:51.523103 systemd[1]: Started cri-containerd-72504933bb13ab9d7aacf4f5675304777ae9a9a12f83897b640a0d1368892ef3.scope. Dec 16 13:19:51.551181 systemd[1]: run-containerd-runc-k8s.io-72504933bb13ab9d7aacf4f5675304777ae9a9a12f83897b640a0d1368892ef3-runc.qA9fZl.mount: Deactivated successfully. Dec 16 13:19:51.601000 audit[4091]: AVC avc: denied { perfmon } for pid=4091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:51.601000 audit[4091]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f93fcd10c78 items=0 ppid=3830 pid=4091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:51.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732353034393333626231336162396437616163663466353637353330 Dec 16 13:19:51.601000 audit[4091]: AVC avc: denied { bpf } for pid=4091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:51.601000 audit[4091]: AVC avc: denied { bpf } for pid=4091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:51.601000 audit[4091]: AVC avc: denied { bpf } for pid=4091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:51.601000 audit[4091]: AVC avc: denied { perfmon } for pid=4091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:51.601000 audit[4091]: AVC avc: denied { perfmon } for pid=4091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:51.601000 audit[4091]: AVC avc: denied { perfmon } for pid=4091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:51.601000 audit[4091]: AVC avc: denied { perfmon } for pid=4091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:51.601000 audit[4091]: AVC avc: denied { perfmon } for pid=4091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:51.601000 audit[4091]: AVC avc: denied { bpf } for pid=4091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:51.601000 audit[4091]: AVC avc: denied { bpf } for pid=4091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:51.601000 audit: BPF prog-id=198 op=LOAD Dec 16 13:19:51.601000 audit[4091]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000347b88 items=0 ppid=3830 pid=4091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:51.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732353034393333626231336162396437616163663466353637353330 Dec 16 13:19:51.601000 audit[4091]: AVC avc: denied { bpf } for pid=4091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:51.601000 audit[4091]: AVC avc: denied { bpf } for pid=4091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:51.601000 audit[4091]: AVC avc: denied { perfmon } for pid=4091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:51.601000 audit[4091]: AVC avc: denied { perfmon } for pid=4091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:51.601000 audit[4091]: AVC avc: denied { perfmon } for pid=4091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:51.601000 audit[4091]: AVC avc: denied { perfmon } for pid=4091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:51.601000 audit[4091]: AVC avc: denied { perfmon } for pid=4091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:51.601000 audit[4091]: AVC avc: denied { bpf } for pid=4091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:51.601000 audit[4091]: AVC avc: denied { bpf } for pid=4091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:51.601000 audit: BPF prog-id=199 op=LOAD Dec 16 13:19:51.601000 audit[4091]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000347bd8 items=0 ppid=3830 pid=4091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:51.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732353034393333626231336162396437616163663466353637353330 Dec 16 13:19:51.601000 audit: BPF prog-id=199 op=UNLOAD Dec 16 13:19:51.601000 audit: BPF prog-id=198 op=UNLOAD Dec 16 13:19:51.601000 audit[4091]: AVC avc: denied { bpf } for pid=4091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:51.601000 audit[4091]: AVC avc: denied { bpf } for pid=4091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:51.601000 audit[4091]: AVC avc: denied { bpf } for pid=4091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:51.601000 audit[4091]: AVC avc: denied { perfmon } for pid=4091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:51.601000 audit[4091]: AVC avc: denied { perfmon } for pid=4091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:51.601000 audit[4091]: AVC avc: denied { perfmon } for pid=4091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:51.601000 audit[4091]: AVC avc: denied { perfmon } for pid=4091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:51.601000 audit[4091]: AVC avc: denied { perfmon } for pid=4091 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:51.601000 audit[4091]: AVC avc: denied { bpf } for pid=4091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:51.601000 audit[4091]: AVC avc: denied { bpf } for pid=4091 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:51.601000 audit: BPF prog-id=200 op=LOAD Dec 16 13:19:51.601000 audit[4091]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000347c68 items=0 ppid=3830 pid=4091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:51.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732353034393333626231336162396437616163663466353637353330 Dec 16 13:19:51.675000 audit[4034]: AVC avc: denied { watch } for pid=4034 comm="apiserver" path="/calico-apiserver-certs/..2024_12_16_13_19_29.1949706262/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c18,c545 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c18,c545 tclass=file permissive=0 Dec 16 13:19:51.675000 audit[4034]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001275860 a2=fc6 a3=0 items=0 ppid=3554 pid=4034 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c18,c545 key=(null) Dec 16 13:19:51.675000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 16 13:19:51.791797 sshd[4076]: pam_unix(sshd:session): session closed for user core Dec 16 13:19:51.802000 audit[4076]: USER_END pid=4076 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:51.802000 audit[4076]: CRED_DISP pid=4076 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:51.810878 systemd[1]: Started sshd@12-164.92.94.164:22-139.178.89.65:48014.service. Dec 16 13:19:51.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-164.92.94.164:22-139.178.89.65:48014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:51.815552 systemd[1]: sshd@11-164.92.94.164:22-139.178.89.65:48010.service: Deactivated successfully. Dec 16 13:19:51.814000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-164.92.94.164:22-139.178.89.65:48010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:51.817250 systemd[1]: session-11.scope: Deactivated successfully. Dec 16 13:19:51.820320 systemd-logind[1181]: Session 11 logged out. Waiting for processes to exit. Dec 16 13:19:51.824248 systemd-logind[1181]: Removed session 11. Dec 16 13:19:51.877000 audit[4120]: NETFILTER_CFG table=filter:117 family=2 entries=8 op=nft_register_rule pid=4120 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:51.877000 audit[4120]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff55928d80 a2=0 a3=7fff55928d6c items=0 ppid=2042 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:51.877000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:51.885000 audit[4120]: NETFILTER_CFG table=nat:118 family=2 entries=34 op=nft_register_chain pid=4120 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:19:51.885000 audit[4120]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fff55928d80 a2=0 a3=7fff55928d6c items=0 ppid=2042 pid=4120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:51.885000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:19:51.889669 sshd[4116]: Accepted publickey for core from 139.178.89.65 port 48014 ssh2: RSA SHA256:Q+lFULKB/jVvshRdfdjHJzJxBGhdic6R851DS3iyBTE Dec 16 13:19:51.888000 audit[4116]: USER_ACCT pid=4116 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:51.891000 audit[4116]: CRED_ACQ pid=4116 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:51.891000 audit[4116]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec123eb80 a2=3 a3=0 items=0 ppid=1 pid=4116 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:51.891000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 16 13:19:51.894130 sshd[4116]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 16 13:19:51.904554 systemd-logind[1181]: New session 12 of user core. Dec 16 13:19:51.905371 systemd[1]: Started session-12.scope. Dec 16 13:19:51.914000 audit[4116]: USER_START pid=4116 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:51.917000 audit[4121]: CRED_ACQ pid=4121 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:51.977893 env[1193]: time="2024-12-16T13:19:51.977815620Z" level=info msg="StartContainer for \"72504933bb13ab9d7aacf4f5675304777ae9a9a12f83897b640a0d1368892ef3\" returns successfully" Dec 16 13:19:52.112243 sshd[4116]: pam_unix(sshd:session): session closed for user core Dec 16 13:19:52.113000 audit[4116]: USER_END pid=4116 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:52.113000 audit[4116]: CRED_DISP pid=4116 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:52.117192 systemd-logind[1181]: Session 12 logged out. Waiting for processes to exit. Dec 16 13:19:52.117554 systemd[1]: sshd@12-164.92.94.164:22-139.178.89.65:48014.service: Deactivated successfully. Dec 16 13:19:52.118428 systemd[1]: session-12.scope: Deactivated successfully. Dec 16 13:19:52.116000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-164.92.94.164:22-139.178.89.65:48014 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:52.119367 systemd-logind[1181]: Removed session 12. Dec 16 13:19:53.139520 sshd[3740]: Failed password for root from 218.92.0.166 port 56136 ssh2 Dec 16 13:19:53.315000 audit[3740]: USER_AUTH pid=3740 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.166 addr=218.92.0.166 terminal=ssh res=failed' Dec 16 13:19:55.073537 env[1193]: time="2024-12-16T13:19:55.073459135Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:55.075357 env[1193]: time="2024-12-16T13:19:55.075286391Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:55.078253 env[1193]: time="2024-12-16T13:19:55.078199406Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:55.080101 env[1193]: time="2024-12-16T13:19:55.079878893Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:55.080274 env[1193]: time="2024-12-16T13:19:55.080201094Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 16 13:19:55.088126 env[1193]: time="2024-12-16T13:19:55.086774430Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 16 13:19:55.122932 env[1193]: time="2024-12-16T13:19:55.122801716Z" level=info msg="CreateContainer within sandbox \"85c9574081e52ea45de4a192d631844608b5e36ab4566576bbd19a012981660a\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 16 13:19:55.145251 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount691386086.mount: Deactivated successfully. Dec 16 13:19:55.152361 env[1193]: time="2024-12-16T13:19:55.152284199Z" level=info msg="CreateContainer within sandbox \"85c9574081e52ea45de4a192d631844608b5e36ab4566576bbd19a012981660a\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"b5e0294917255b5b80b05021749b00302fbb09f57429ac67d070a8fc95064983\"" Dec 16 13:19:55.154498 env[1193]: time="2024-12-16T13:19:55.154447409Z" level=info msg="StartContainer for \"b5e0294917255b5b80b05021749b00302fbb09f57429ac67d070a8fc95064983\"" Dec 16 13:19:55.197242 systemd[1]: Started cri-containerd-b5e0294917255b5b80b05021749b00302fbb09f57429ac67d070a8fc95064983.scope. Dec 16 13:19:55.255118 kernel: kauditd_printk_skb: 179 callbacks suppressed Dec 16 13:19:55.255689 kernel: audit: type=1400 audit(1734355195.248:1370): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.255780 kernel: audit: type=1400 audit(1734355195.248:1371): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.259021 kernel: audit: type=1400 audit(1734355195.248:1372): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.263148 kernel: audit: type=1400 audit(1734355195.248:1373): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.268596 kernel: audit: type=1400 audit(1734355195.248:1374): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.268811 kernel: audit: type=1400 audit(1734355195.248:1375): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.268861 kernel: audit: type=1400 audit(1734355195.248:1376): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.277028 kernel: audit: type=1400 audit(1734355195.248:1377): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.277260 kernel: audit: type=1400 audit(1734355195.248:1378): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.277323 kernel: audit: type=1400 audit(1734355195.251:1379): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.251000 audit: BPF prog-id=201 op=LOAD Dec 16 13:19:55.255000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.255000 audit[4146]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3787 pid=4146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:55.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235653032393439313732353562356238306230353032313734396230 Dec 16 13:19:55.255000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.255000 audit[4146]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3787 pid=4146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:55.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235653032393439313732353562356238306230353032313734396230 Dec 16 13:19:55.255000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.255000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.255000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.255000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.255000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.255000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.255000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.255000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.255000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.255000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.255000 audit: BPF prog-id=202 op=LOAD Dec 16 13:19:55.255000 audit[4146]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000257d00 items=0 ppid=3787 pid=4146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:55.255000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235653032393439313732353562356238306230353032313734396230 Dec 16 13:19:55.257000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.257000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.257000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.257000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.257000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.257000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.257000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.257000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.257000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.257000 audit: BPF prog-id=203 op=LOAD Dec 16 13:19:55.257000 audit[4146]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000257d48 items=0 ppid=3787 pid=4146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:55.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235653032393439313732353562356238306230353032313734396230 Dec 16 13:19:55.258000 audit: BPF prog-id=203 op=UNLOAD Dec 16 13:19:55.258000 audit: BPF prog-id=202 op=UNLOAD Dec 16 13:19:55.258000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.258000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.258000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.258000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.258000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.258000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.258000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.258000 audit[4146]: AVC avc: denied { perfmon } for pid=4146 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.258000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.258000 audit[4146]: AVC avc: denied { bpf } for pid=4146 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:55.258000 audit: BPF prog-id=204 op=LOAD Dec 16 13:19:55.258000 audit[4146]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c0158 items=0 ppid=3787 pid=4146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:55.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235653032393439313732353562356238306230353032313734396230 Dec 16 13:19:55.352286 env[1193]: time="2024-12-16T13:19:55.352094975Z" level=info msg="StartContainer for \"b5e0294917255b5b80b05021749b00302fbb09f57429ac67d070a8fc95064983\" returns successfully" Dec 16 13:19:55.444998 env[1193]: time="2024-12-16T13:19:55.444266459Z" level=info msg="StopPodSandbox for \"c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1\"" Dec 16 13:19:55.783748 env[1193]: 2024-12-16 13:19:55.690 [WARNING][4186] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--6--0e268b98cf-k8s-calico--kube--controllers--758bd67986--7dfsz-eth0", GenerateName:"calico-kube-controllers-758bd67986-", Namespace:"calico-system", SelfLink:"", UID:"7351e6b4-48f5-49f2-9546-d89197754a12", ResourceVersion:"927", Generation:0, CreationTimestamp:time.Date(2024, time.December, 16, 13, 19, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"758bd67986", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-6-0e268b98cf", ContainerID:"85c9574081e52ea45de4a192d631844608b5e36ab4566576bbd19a012981660a", Pod:"calico-kube-controllers-758bd67986-7dfsz", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.3.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid089a4fb365", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 16 13:19:55.783748 env[1193]: 2024-12-16 13:19:55.691 [INFO][4186] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" Dec 16 13:19:55.783748 env[1193]: 2024-12-16 13:19:55.691 [INFO][4186] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" iface="eth0" netns="" Dec 16 13:19:55.783748 env[1193]: 2024-12-16 13:19:55.691 [INFO][4186] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" Dec 16 13:19:55.783748 env[1193]: 2024-12-16 13:19:55.691 [INFO][4186] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" Dec 16 13:19:55.783748 env[1193]: 2024-12-16 13:19:55.760 [INFO][4193] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" HandleID="k8s-pod-network.c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" Workload="ci--3510.3.6--6--0e268b98cf-k8s-calico--kube--controllers--758bd67986--7dfsz-eth0" Dec 16 13:19:55.783748 env[1193]: 2024-12-16 13:19:55.761 [INFO][4193] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 16 13:19:55.783748 env[1193]: 2024-12-16 13:19:55.761 [INFO][4193] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 16 13:19:55.783748 env[1193]: 2024-12-16 13:19:55.773 [WARNING][4193] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" HandleID="k8s-pod-network.c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" Workload="ci--3510.3.6--6--0e268b98cf-k8s-calico--kube--controllers--758bd67986--7dfsz-eth0" Dec 16 13:19:55.783748 env[1193]: 2024-12-16 13:19:55.773 [INFO][4193] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" HandleID="k8s-pod-network.c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" Workload="ci--3510.3.6--6--0e268b98cf-k8s-calico--kube--controllers--758bd67986--7dfsz-eth0" Dec 16 13:19:55.783748 env[1193]: 2024-12-16 13:19:55.778 [INFO][4193] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 16 13:19:55.783748 env[1193]: 2024-12-16 13:19:55.781 [INFO][4186] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" Dec 16 13:19:55.783748 env[1193]: time="2024-12-16T13:19:55.783549235Z" level=info msg="TearDown network for sandbox \"c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1\" successfully" Dec 16 13:19:55.783748 env[1193]: time="2024-12-16T13:19:55.783586334Z" level=info msg="StopPodSandbox for \"c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1\" returns successfully" Dec 16 13:19:55.789771 env[1193]: time="2024-12-16T13:19:55.789699773Z" level=info msg="RemovePodSandbox for \"c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1\"" Dec 16 13:19:55.790124 env[1193]: time="2024-12-16T13:19:55.789761740Z" level=info msg="Forcibly stopping sandbox \"c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1\"" Dec 16 13:19:55.954325 sshd[3740]: Failed password for root from 218.92.0.166 port 56136 ssh2 Dec 16 13:19:56.000628 env[1193]: 2024-12-16 13:19:55.880 [WARNING][4211] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--6--0e268b98cf-k8s-calico--kube--controllers--758bd67986--7dfsz-eth0", GenerateName:"calico-kube-controllers-758bd67986-", Namespace:"calico-system", SelfLink:"", UID:"7351e6b4-48f5-49f2-9546-d89197754a12", ResourceVersion:"927", Generation:0, CreationTimestamp:time.Date(2024, time.December, 16, 13, 19, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"758bd67986", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-6-0e268b98cf", ContainerID:"85c9574081e52ea45de4a192d631844608b5e36ab4566576bbd19a012981660a", Pod:"calico-kube-controllers-758bd67986-7dfsz", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.3.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid089a4fb365", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 16 13:19:56.000628 env[1193]: 2024-12-16 13:19:55.881 [INFO][4211] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" Dec 16 13:19:56.000628 env[1193]: 2024-12-16 13:19:55.881 [INFO][4211] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" iface="eth0" netns="" Dec 16 13:19:56.000628 env[1193]: 2024-12-16 13:19:55.881 [INFO][4211] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" Dec 16 13:19:56.000628 env[1193]: 2024-12-16 13:19:55.881 [INFO][4211] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" Dec 16 13:19:56.000628 env[1193]: 2024-12-16 13:19:55.975 [INFO][4217] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" HandleID="k8s-pod-network.c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" Workload="ci--3510.3.6--6--0e268b98cf-k8s-calico--kube--controllers--758bd67986--7dfsz-eth0" Dec 16 13:19:56.000628 env[1193]: 2024-12-16 13:19:55.975 [INFO][4217] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 16 13:19:56.000628 env[1193]: 2024-12-16 13:19:55.976 [INFO][4217] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 16 13:19:56.000628 env[1193]: 2024-12-16 13:19:55.988 [WARNING][4217] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" HandleID="k8s-pod-network.c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" Workload="ci--3510.3.6--6--0e268b98cf-k8s-calico--kube--controllers--758bd67986--7dfsz-eth0" Dec 16 13:19:56.000628 env[1193]: 2024-12-16 13:19:55.988 [INFO][4217] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" HandleID="k8s-pod-network.c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" Workload="ci--3510.3.6--6--0e268b98cf-k8s-calico--kube--controllers--758bd67986--7dfsz-eth0" Dec 16 13:19:56.000628 env[1193]: 2024-12-16 13:19:55.992 [INFO][4217] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 16 13:19:56.000628 env[1193]: 2024-12-16 13:19:55.995 [INFO][4211] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1" Dec 16 13:19:56.001413 env[1193]: time="2024-12-16T13:19:56.000728976Z" level=info msg="TearDown network for sandbox \"c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1\" successfully" Dec 16 13:19:56.007952 env[1193]: time="2024-12-16T13:19:56.007825070Z" level=info msg="RemovePodSandbox \"c42ecdc6bf1568bf489003c95eb8318316ef2691ed7520ccd403e269cdb25cb1\" returns successfully" Dec 16 13:19:56.008973 env[1193]: time="2024-12-16T13:19:56.008930599Z" level=info msg="StopPodSandbox for \"c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7\"" Dec 16 13:19:56.172111 env[1193]: 2024-12-16 13:19:56.082 [WARNING][4237] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--6--0e268b98cf-k8s-csi--node--driver--ccvcz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cb5cda6c-0e08-4930-b912-35225d86fb7c", ResourceVersion:"933", Generation:0, CreationTimestamp:time.Date(2024, time.December, 16, 13, 19, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-6-0e268b98cf", ContainerID:"38372f10132264ba8e644ff33c4f7483f5f4246f392419ecd0153e69c0f25852", Pod:"csi-node-driver-ccvcz", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.3.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali658f54677c6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 16 13:19:56.172111 env[1193]: 2024-12-16 13:19:56.083 [INFO][4237] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" Dec 16 13:19:56.172111 env[1193]: 2024-12-16 13:19:56.083 [INFO][4237] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" iface="eth0" netns="" Dec 16 13:19:56.172111 env[1193]: 2024-12-16 13:19:56.083 [INFO][4237] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" Dec 16 13:19:56.172111 env[1193]: 2024-12-16 13:19:56.083 [INFO][4237] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" Dec 16 13:19:56.172111 env[1193]: 2024-12-16 13:19:56.148 [INFO][4243] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" HandleID="k8s-pod-network.c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" Workload="ci--3510.3.6--6--0e268b98cf-k8s-csi--node--driver--ccvcz-eth0" Dec 16 13:19:56.172111 env[1193]: 2024-12-16 13:19:56.148 [INFO][4243] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 16 13:19:56.172111 env[1193]: 2024-12-16 13:19:56.148 [INFO][4243] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 16 13:19:56.172111 env[1193]: 2024-12-16 13:19:56.162 [WARNING][4243] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" HandleID="k8s-pod-network.c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" Workload="ci--3510.3.6--6--0e268b98cf-k8s-csi--node--driver--ccvcz-eth0" Dec 16 13:19:56.172111 env[1193]: 2024-12-16 13:19:56.162 [INFO][4243] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" HandleID="k8s-pod-network.c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" Workload="ci--3510.3.6--6--0e268b98cf-k8s-csi--node--driver--ccvcz-eth0" Dec 16 13:19:56.172111 env[1193]: 2024-12-16 13:19:56.165 [INFO][4243] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 16 13:19:56.172111 env[1193]: 2024-12-16 13:19:56.168 [INFO][4237] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" Dec 16 13:19:56.173208 env[1193]: time="2024-12-16T13:19:56.173165267Z" level=info msg="TearDown network for sandbox \"c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7\" successfully" Dec 16 13:19:56.173353 env[1193]: time="2024-12-16T13:19:56.173331206Z" level=info msg="StopPodSandbox for \"c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7\" returns successfully" Dec 16 13:19:56.174223 env[1193]: time="2024-12-16T13:19:56.174169673Z" level=info msg="RemovePodSandbox for \"c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7\"" Dec 16 13:19:56.174369 env[1193]: time="2024-12-16T13:19:56.174230665Z" level=info msg="Forcibly stopping sandbox \"c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7\"" Dec 16 13:19:56.323166 systemd[1]: run-containerd-runc-k8s.io-b5e0294917255b5b80b05021749b00302fbb09f57429ac67d070a8fc95064983-runc.fawGFM.mount: Deactivated successfully. Dec 16 13:19:56.376093 env[1193]: 2024-12-16 13:19:56.265 [WARNING][4262] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--6--0e268b98cf-k8s-csi--node--driver--ccvcz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"cb5cda6c-0e08-4930-b912-35225d86fb7c", ResourceVersion:"933", Generation:0, CreationTimestamp:time.Date(2024, time.December, 16, 13, 19, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-6-0e268b98cf", ContainerID:"38372f10132264ba8e644ff33c4f7483f5f4246f392419ecd0153e69c0f25852", Pod:"csi-node-driver-ccvcz", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.3.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali658f54677c6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 16 13:19:56.376093 env[1193]: 2024-12-16 13:19:56.268 [INFO][4262] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" Dec 16 13:19:56.376093 env[1193]: 2024-12-16 13:19:56.268 [INFO][4262] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" iface="eth0" netns="" Dec 16 13:19:56.376093 env[1193]: 2024-12-16 13:19:56.268 [INFO][4262] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" Dec 16 13:19:56.376093 env[1193]: 2024-12-16 13:19:56.268 [INFO][4262] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" Dec 16 13:19:56.376093 env[1193]: 2024-12-16 13:19:56.347 [INFO][4269] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" HandleID="k8s-pod-network.c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" Workload="ci--3510.3.6--6--0e268b98cf-k8s-csi--node--driver--ccvcz-eth0" Dec 16 13:19:56.376093 env[1193]: 2024-12-16 13:19:56.348 [INFO][4269] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 16 13:19:56.376093 env[1193]: 2024-12-16 13:19:56.348 [INFO][4269] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 16 13:19:56.376093 env[1193]: 2024-12-16 13:19:56.363 [WARNING][4269] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" HandleID="k8s-pod-network.c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" Workload="ci--3510.3.6--6--0e268b98cf-k8s-csi--node--driver--ccvcz-eth0" Dec 16 13:19:56.376093 env[1193]: 2024-12-16 13:19:56.363 [INFO][4269] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" HandleID="k8s-pod-network.c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" Workload="ci--3510.3.6--6--0e268b98cf-k8s-csi--node--driver--ccvcz-eth0" Dec 16 13:19:56.376093 env[1193]: 2024-12-16 13:19:56.367 [INFO][4269] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 16 13:19:56.376093 env[1193]: 2024-12-16 13:19:56.369 [INFO][4262] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7" Dec 16 13:19:56.376093 env[1193]: time="2024-12-16T13:19:56.373915977Z" level=info msg="TearDown network for sandbox \"c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7\" successfully" Dec 16 13:19:56.378049 env[1193]: time="2024-12-16T13:19:56.377945179Z" level=info msg="RemovePodSandbox \"c721857017b8c548a1ffdf9c1f74043d2f20fc872393637141ab82c3460c83b7\" returns successfully" Dec 16 13:19:56.378784 env[1193]: time="2024-12-16T13:19:56.378739642Z" level=info msg="StopPodSandbox for \"3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155\"" Dec 16 13:19:56.478835 kubelet[1921]: I1216 13:19:56.478495 1921 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-758bd67986-7dfsz" podStartSLOduration=33.541489328 podStartE2EDuration="41.478448164s" podCreationTimestamp="2024-12-16 13:19:15 +0000 UTC" firstStartedPulling="2024-12-16 13:19:47.145800194 +0000 UTC m=+51.939277093" lastFinishedPulling="2024-12-16 13:19:55.082759027 +0000 UTC m=+59.876235929" observedRunningTime="2024-12-16 13:19:56.279155037 +0000 UTC m=+61.072631956" watchObservedRunningTime="2024-12-16 13:19:56.478448164 +0000 UTC m=+61.271925086" Dec 16 13:19:56.587249 env[1193]: 2024-12-16 13:19:56.487 [WARNING][4302] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--fmtjs-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"e13621c2-02f4-41d6-80b5-938bac2450b8", ResourceVersion:"962", Generation:0, CreationTimestamp:time.Date(2024, time.December, 16, 13, 19, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-6-0e268b98cf", ContainerID:"f8e6e99a7f221e57e065cb0ef2977e18cffc7aad3152a586b0dea47f605c579a", Pod:"coredns-6f6b679f8f-fmtjs", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.3.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali05140dd29f5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 16 13:19:56.587249 env[1193]: 2024-12-16 13:19:56.487 [INFO][4302] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" Dec 16 13:19:56.587249 env[1193]: 2024-12-16 13:19:56.487 [INFO][4302] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" iface="eth0" netns="" Dec 16 13:19:56.587249 env[1193]: 2024-12-16 13:19:56.487 [INFO][4302] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" Dec 16 13:19:56.587249 env[1193]: 2024-12-16 13:19:56.487 [INFO][4302] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" Dec 16 13:19:56.587249 env[1193]: 2024-12-16 13:19:56.547 [INFO][4312] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" HandleID="k8s-pod-network.3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" Workload="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--fmtjs-eth0" Dec 16 13:19:56.587249 env[1193]: 2024-12-16 13:19:56.548 [INFO][4312] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 16 13:19:56.587249 env[1193]: 2024-12-16 13:19:56.548 [INFO][4312] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 16 13:19:56.587249 env[1193]: 2024-12-16 13:19:56.579 [WARNING][4312] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" HandleID="k8s-pod-network.3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" Workload="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--fmtjs-eth0" Dec 16 13:19:56.587249 env[1193]: 2024-12-16 13:19:56.579 [INFO][4312] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" HandleID="k8s-pod-network.3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" Workload="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--fmtjs-eth0" Dec 16 13:19:56.587249 env[1193]: 2024-12-16 13:19:56.582 [INFO][4312] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 16 13:19:56.587249 env[1193]: 2024-12-16 13:19:56.584 [INFO][4302] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" Dec 16 13:19:56.589333 env[1193]: time="2024-12-16T13:19:56.587298890Z" level=info msg="TearDown network for sandbox \"3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155\" successfully" Dec 16 13:19:56.589333 env[1193]: time="2024-12-16T13:19:56.587343022Z" level=info msg="StopPodSandbox for \"3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155\" returns successfully" Dec 16 13:19:56.589333 env[1193]: time="2024-12-16T13:19:56.588515597Z" level=info msg="RemovePodSandbox for \"3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155\"" Dec 16 13:19:56.589333 env[1193]: time="2024-12-16T13:19:56.588567987Z" level=info msg="Forcibly stopping sandbox \"3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155\"" Dec 16 13:19:56.816302 env[1193]: 2024-12-16 13:19:56.699 [WARNING][4330] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--fmtjs-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"e13621c2-02f4-41d6-80b5-938bac2450b8", ResourceVersion:"962", Generation:0, CreationTimestamp:time.Date(2024, time.December, 16, 13, 19, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-6-0e268b98cf", ContainerID:"f8e6e99a7f221e57e065cb0ef2977e18cffc7aad3152a586b0dea47f605c579a", Pod:"coredns-6f6b679f8f-fmtjs", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.3.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali05140dd29f5", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 16 13:19:56.816302 env[1193]: 2024-12-16 13:19:56.699 [INFO][4330] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" Dec 16 13:19:56.816302 env[1193]: 2024-12-16 13:19:56.700 [INFO][4330] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" iface="eth0" netns="" Dec 16 13:19:56.816302 env[1193]: 2024-12-16 13:19:56.700 [INFO][4330] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" Dec 16 13:19:56.816302 env[1193]: 2024-12-16 13:19:56.700 [INFO][4330] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" Dec 16 13:19:56.816302 env[1193]: 2024-12-16 13:19:56.788 [INFO][4336] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" HandleID="k8s-pod-network.3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" Workload="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--fmtjs-eth0" Dec 16 13:19:56.816302 env[1193]: 2024-12-16 13:19:56.788 [INFO][4336] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 16 13:19:56.816302 env[1193]: 2024-12-16 13:19:56.788 [INFO][4336] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 16 13:19:56.816302 env[1193]: 2024-12-16 13:19:56.806 [WARNING][4336] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" HandleID="k8s-pod-network.3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" Workload="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--fmtjs-eth0" Dec 16 13:19:56.816302 env[1193]: 2024-12-16 13:19:56.806 [INFO][4336] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" HandleID="k8s-pod-network.3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" Workload="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--fmtjs-eth0" Dec 16 13:19:56.816302 env[1193]: 2024-12-16 13:19:56.810 [INFO][4336] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 16 13:19:56.816302 env[1193]: 2024-12-16 13:19:56.813 [INFO][4330] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155" Dec 16 13:19:56.816302 env[1193]: time="2024-12-16T13:19:56.815570521Z" level=info msg="TearDown network for sandbox \"3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155\" successfully" Dec 16 13:19:56.819943 env[1193]: time="2024-12-16T13:19:56.819863277Z" level=info msg="RemovePodSandbox \"3fd5789b60a408d01592df9181c7986a940945522e15c655c3595a3932390155\" returns successfully" Dec 16 13:19:56.820845 env[1193]: time="2024-12-16T13:19:56.820795721Z" level=info msg="StopPodSandbox for \"9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041\"" Dec 16 13:19:56.979786 env[1193]: 2024-12-16 13:19:56.913 [WARNING][4358] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--8rqzt-eth0", GenerateName:"calico-apiserver-78458c5f95-", Namespace:"calico-apiserver", SelfLink:"", UID:"b2f42d08-5884-4b97-8d28-7b9e8434133d", ResourceVersion:"996", Generation:0, CreationTimestamp:time.Date(2024, time.December, 16, 13, 19, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"78458c5f95", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-6-0e268b98cf", ContainerID:"f8346740bd605f9bade63fa377caf2c687c702ccfda62fa1f5c45b23ca60eec6", Pod:"calico-apiserver-78458c5f95-8rqzt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.3.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2d4673266bd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 16 13:19:56.979786 env[1193]: 2024-12-16 13:19:56.914 [INFO][4358] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" Dec 16 13:19:56.979786 env[1193]: 2024-12-16 13:19:56.914 [INFO][4358] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" iface="eth0" netns="" Dec 16 13:19:56.979786 env[1193]: 2024-12-16 13:19:56.914 [INFO][4358] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" Dec 16 13:19:56.979786 env[1193]: 2024-12-16 13:19:56.914 [INFO][4358] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" Dec 16 13:19:56.979786 env[1193]: 2024-12-16 13:19:56.959 [INFO][4365] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" HandleID="k8s-pod-network.9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" Workload="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--8rqzt-eth0" Dec 16 13:19:56.979786 env[1193]: 2024-12-16 13:19:56.959 [INFO][4365] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 16 13:19:56.979786 env[1193]: 2024-12-16 13:19:56.959 [INFO][4365] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 16 13:19:56.979786 env[1193]: 2024-12-16 13:19:56.969 [WARNING][4365] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" HandleID="k8s-pod-network.9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" Workload="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--8rqzt-eth0" Dec 16 13:19:56.979786 env[1193]: 2024-12-16 13:19:56.969 [INFO][4365] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" HandleID="k8s-pod-network.9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" Workload="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--8rqzt-eth0" Dec 16 13:19:56.979786 env[1193]: 2024-12-16 13:19:56.972 [INFO][4365] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 16 13:19:56.979786 env[1193]: 2024-12-16 13:19:56.976 [INFO][4358] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" Dec 16 13:19:56.979786 env[1193]: time="2024-12-16T13:19:56.979737547Z" level=info msg="TearDown network for sandbox \"9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041\" successfully" Dec 16 13:19:56.979786 env[1193]: time="2024-12-16T13:19:56.979783160Z" level=info msg="StopPodSandbox for \"9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041\" returns successfully" Dec 16 13:19:56.981546 env[1193]: time="2024-12-16T13:19:56.981491550Z" level=info msg="RemovePodSandbox for \"9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041\"" Dec 16 13:19:56.981727 env[1193]: time="2024-12-16T13:19:56.981546636Z" level=info msg="Forcibly stopping sandbox \"9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041\"" Dec 16 13:19:57.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-164.92.94.164:22-139.178.89.65:48018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:57.122182 systemd[1]: Started sshd@13-164.92.94.164:22-139.178.89.65:48018.service. Dec 16 13:19:57.154456 env[1193]: time="2024-12-16T13:19:57.153500069Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:57.162832 env[1193]: time="2024-12-16T13:19:57.162759395Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:57.169512 env[1193]: time="2024-12-16T13:19:57.166302704Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:57.178540 env[1193]: time="2024-12-16T13:19:57.178305257Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 16 13:19:57.184759 env[1193]: time="2024-12-16T13:19:57.182140682Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 16 13:19:57.189526 env[1193]: time="2024-12-16T13:19:57.189465880Z" level=info msg="CreateContainer within sandbox \"38372f10132264ba8e644ff33c4f7483f5f4246f392419ecd0153e69c0f25852\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 16 13:19:57.193000 audit[4396]: USER_ACCT pid=4396 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:57.194514 sshd[4396]: Accepted publickey for core from 139.178.89.65 port 48018 ssh2: RSA SHA256:Q+lFULKB/jVvshRdfdjHJzJxBGhdic6R851DS3iyBTE Dec 16 13:19:57.195000 audit[4396]: CRED_ACQ pid=4396 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:57.195000 audit[4396]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc881ddde0 a2=3 a3=0 items=0 ppid=1 pid=4396 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:57.195000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 16 13:19:57.198382 sshd[4396]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 16 13:19:57.207629 systemd-logind[1181]: New session 13 of user core. Dec 16 13:19:57.208531 systemd[1]: Started session-13.scope. Dec 16 13:19:57.219000 audit[4396]: USER_START pid=4396 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:57.222000 audit[4402]: CRED_ACQ pid=4402 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:57.245904 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3970188767.mount: Deactivated successfully. Dec 16 13:19:57.274229 env[1193]: time="2024-12-16T13:19:57.273979548Z" level=info msg="CreateContainer within sandbox \"38372f10132264ba8e644ff33c4f7483f5f4246f392419ecd0153e69c0f25852\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"f64cd2ea5829b917813b70abea5b7e81e73dc6f935fcc6a2667edd24362fb401\"" Dec 16 13:19:57.278536 env[1193]: time="2024-12-16T13:19:57.278223418Z" level=info msg="StartContainer for \"f64cd2ea5829b917813b70abea5b7e81e73dc6f935fcc6a2667edd24362fb401\"" Dec 16 13:19:57.328685 env[1193]: 2024-12-16 13:19:57.112 [WARNING][4386] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--8rqzt-eth0", GenerateName:"calico-apiserver-78458c5f95-", Namespace:"calico-apiserver", SelfLink:"", UID:"b2f42d08-5884-4b97-8d28-7b9e8434133d", ResourceVersion:"996", Generation:0, CreationTimestamp:time.Date(2024, time.December, 16, 13, 19, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"78458c5f95", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-6-0e268b98cf", ContainerID:"f8346740bd605f9bade63fa377caf2c687c702ccfda62fa1f5c45b23ca60eec6", Pod:"calico-apiserver-78458c5f95-8rqzt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.3.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2d4673266bd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 16 13:19:57.328685 env[1193]: 2024-12-16 13:19:57.113 [INFO][4386] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" Dec 16 13:19:57.328685 env[1193]: 2024-12-16 13:19:57.115 [INFO][4386] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" iface="eth0" netns="" Dec 16 13:19:57.328685 env[1193]: 2024-12-16 13:19:57.115 [INFO][4386] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" Dec 16 13:19:57.328685 env[1193]: 2024-12-16 13:19:57.115 [INFO][4386] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" Dec 16 13:19:57.328685 env[1193]: 2024-12-16 13:19:57.273 [INFO][4395] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" HandleID="k8s-pod-network.9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" Workload="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--8rqzt-eth0" Dec 16 13:19:57.328685 env[1193]: 2024-12-16 13:19:57.278 [INFO][4395] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 16 13:19:57.328685 env[1193]: 2024-12-16 13:19:57.279 [INFO][4395] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 16 13:19:57.328685 env[1193]: 2024-12-16 13:19:57.303 [WARNING][4395] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" HandleID="k8s-pod-network.9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" Workload="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--8rqzt-eth0" Dec 16 13:19:57.328685 env[1193]: 2024-12-16 13:19:57.303 [INFO][4395] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" HandleID="k8s-pod-network.9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" Workload="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--8rqzt-eth0" Dec 16 13:19:57.328685 env[1193]: 2024-12-16 13:19:57.306 [INFO][4395] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 16 13:19:57.328685 env[1193]: 2024-12-16 13:19:57.317 [INFO][4386] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041" Dec 16 13:19:57.328685 env[1193]: time="2024-12-16T13:19:57.328295135Z" level=info msg="TearDown network for sandbox \"9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041\" successfully" Dec 16 13:19:57.340623 env[1193]: time="2024-12-16T13:19:57.340536986Z" level=info msg="RemovePodSandbox \"9a1314e637daaaa8815af0d0dbfcbfef99e5a670d8d31dad30e5d252b7b03041\" returns successfully" Dec 16 13:19:57.342763 env[1193]: time="2024-12-16T13:19:57.342703269Z" level=info msg="StopPodSandbox for \"d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32\"" Dec 16 13:19:57.387130 systemd[1]: Started cri-containerd-f64cd2ea5829b917813b70abea5b7e81e73dc6f935fcc6a2667edd24362fb401.scope. Dec 16 13:19:57.403988 systemd[1]: run-containerd-runc-k8s.io-f64cd2ea5829b917813b70abea5b7e81e73dc6f935fcc6a2667edd24362fb401-runc.ye9ROS.mount: Deactivated successfully. Dec 16 13:19:57.473000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:57.473000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f2fae51e378 items=0 ppid=3830 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:57.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636346364326561353832396239313738313362373061626561356237 Dec 16 13:19:57.474000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:57.474000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:57.474000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:57.474000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:57.474000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:57.474000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:57.474000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:57.474000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:57.474000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:57.474000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:57.474000 audit: BPF prog-id=205 op=LOAD Dec 16 13:19:57.474000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0002efc58 items=0 ppid=3830 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:57.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636346364326561353832396239313738313362373061626561356237 Dec 16 13:19:57.475000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:57.475000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:57.475000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:57.475000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:57.475000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:57.475000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:57.475000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:57.475000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:57.475000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:57.475000 audit: BPF prog-id=206 op=LOAD Dec 16 13:19:57.475000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0002efca8 items=0 ppid=3830 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:57.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636346364326561353832396239313738313362373061626561356237 Dec 16 13:19:57.475000 audit: BPF prog-id=206 op=UNLOAD Dec 16 13:19:57.476000 audit: BPF prog-id=205 op=UNLOAD Dec 16 13:19:57.476000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:57.476000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:57.476000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:57.476000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:57.476000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:57.476000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:57.476000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:57.476000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:57.476000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:57.476000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 16 13:19:57.476000 audit: BPF prog-id=207 op=LOAD Dec 16 13:19:57.476000 audit[4414]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0002efd38 items=0 ppid=3830 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:19:57.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636346364326561353832396239313738313362373061626561356237 Dec 16 13:19:57.569828 env[1193]: time="2024-12-16T13:19:57.569764750Z" level=info msg="StartContainer for \"f64cd2ea5829b917813b70abea5b7e81e73dc6f935fcc6a2667edd24362fb401\" returns successfully" Dec 16 13:19:57.577037 sshd[3740]: Received disconnect from 218.92.0.166 port 56136:11: [preauth] Dec 16 13:19:57.577037 sshd[3740]: Disconnected from authenticating user root 218.92.0.166 port 56136 [preauth] Dec 16 13:19:57.576236 sshd[3740]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.166 user=root Dec 16 13:19:57.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-164.92.94.164:22-218.92.0.166:56136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:57.578508 systemd[1]: sshd@9-164.92.94.164:22-218.92.0.166:56136.service: Deactivated successfully. Dec 16 13:19:57.673245 env[1193]: 2024-12-16 13:19:57.591 [WARNING][4438] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--bz7zq-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"40f13eb9-6107-4fcd-b21f-7f9d38717259", ResourceVersion:"946", Generation:0, CreationTimestamp:time.Date(2024, time.December, 16, 13, 19, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-6-0e268b98cf", ContainerID:"7120397a0d4747a9d923e6fdb3cc16de94cd7babeebb1955d9770ea55da101c6", Pod:"coredns-6f6b679f8f-bz7zq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.3.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali77193f13e71", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 16 13:19:57.673245 env[1193]: 2024-12-16 13:19:57.591 [INFO][4438] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" Dec 16 13:19:57.673245 env[1193]: 2024-12-16 13:19:57.591 [INFO][4438] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" iface="eth0" netns="" Dec 16 13:19:57.673245 env[1193]: 2024-12-16 13:19:57.591 [INFO][4438] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" Dec 16 13:19:57.673245 env[1193]: 2024-12-16 13:19:57.591 [INFO][4438] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" Dec 16 13:19:57.673245 env[1193]: 2024-12-16 13:19:57.641 [INFO][4468] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" HandleID="k8s-pod-network.d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" Workload="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--bz7zq-eth0" Dec 16 13:19:57.673245 env[1193]: 2024-12-16 13:19:57.641 [INFO][4468] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 16 13:19:57.673245 env[1193]: 2024-12-16 13:19:57.641 [INFO][4468] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 16 13:19:57.673245 env[1193]: 2024-12-16 13:19:57.658 [WARNING][4468] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" HandleID="k8s-pod-network.d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" Workload="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--bz7zq-eth0" Dec 16 13:19:57.673245 env[1193]: 2024-12-16 13:19:57.658 [INFO][4468] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" HandleID="k8s-pod-network.d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" Workload="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--bz7zq-eth0" Dec 16 13:19:57.673245 env[1193]: 2024-12-16 13:19:57.668 [INFO][4468] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 16 13:19:57.673245 env[1193]: 2024-12-16 13:19:57.670 [INFO][4438] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" Dec 16 13:19:57.674244 env[1193]: time="2024-12-16T13:19:57.674041836Z" level=info msg="TearDown network for sandbox \"d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32\" successfully" Dec 16 13:19:57.674244 env[1193]: time="2024-12-16T13:19:57.674095671Z" level=info msg="StopPodSandbox for \"d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32\" returns successfully" Dec 16 13:19:57.675813 env[1193]: time="2024-12-16T13:19:57.675775908Z" level=info msg="RemovePodSandbox for \"d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32\"" Dec 16 13:19:57.676164 env[1193]: time="2024-12-16T13:19:57.676072411Z" level=info msg="Forcibly stopping sandbox \"d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32\"" Dec 16 13:19:57.881260 env[1193]: 2024-12-16 13:19:57.783 [WARNING][4488] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--bz7zq-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"40f13eb9-6107-4fcd-b21f-7f9d38717259", ResourceVersion:"946", Generation:0, CreationTimestamp:time.Date(2024, time.December, 16, 13, 19, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-6-0e268b98cf", ContainerID:"7120397a0d4747a9d923e6fdb3cc16de94cd7babeebb1955d9770ea55da101c6", Pod:"coredns-6f6b679f8f-bz7zq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.3.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali77193f13e71", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 16 13:19:57.881260 env[1193]: 2024-12-16 13:19:57.785 [INFO][4488] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" Dec 16 13:19:57.881260 env[1193]: 2024-12-16 13:19:57.785 [INFO][4488] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" iface="eth0" netns="" Dec 16 13:19:57.881260 env[1193]: 2024-12-16 13:19:57.785 [INFO][4488] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" Dec 16 13:19:57.881260 env[1193]: 2024-12-16 13:19:57.785 [INFO][4488] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" Dec 16 13:19:57.881260 env[1193]: 2024-12-16 13:19:57.837 [INFO][4494] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" HandleID="k8s-pod-network.d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" Workload="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--bz7zq-eth0" Dec 16 13:19:57.881260 env[1193]: 2024-12-16 13:19:57.848 [INFO][4494] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 16 13:19:57.881260 env[1193]: 2024-12-16 13:19:57.848 [INFO][4494] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 16 13:19:57.881260 env[1193]: 2024-12-16 13:19:57.867 [WARNING][4494] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" HandleID="k8s-pod-network.d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" Workload="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--bz7zq-eth0" Dec 16 13:19:57.881260 env[1193]: 2024-12-16 13:19:57.867 [INFO][4494] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" HandleID="k8s-pod-network.d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" Workload="ci--3510.3.6--6--0e268b98cf-k8s-coredns--6f6b679f8f--bz7zq-eth0" Dec 16 13:19:57.881260 env[1193]: 2024-12-16 13:19:57.873 [INFO][4494] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 16 13:19:57.881260 env[1193]: 2024-12-16 13:19:57.878 [INFO][4488] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32" Dec 16 13:19:57.882115 env[1193]: time="2024-12-16T13:19:57.882027378Z" level=info msg="TearDown network for sandbox \"d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32\" successfully" Dec 16 13:19:57.890817 env[1193]: time="2024-12-16T13:19:57.890765366Z" level=info msg="RemovePodSandbox \"d5d3b657df35509cace0f06254cad6560bc5de7db56121790c8f59dce4888a32\" returns successfully" Dec 16 13:19:57.891563 env[1193]: time="2024-12-16T13:19:57.891530381Z" level=info msg="StopPodSandbox for \"79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764\"" Dec 16 13:19:57.923235 kubelet[1921]: I1216 13:19:57.923099 1921 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 16 13:19:57.971413 kubelet[1921]: I1216 13:19:57.967943 1921 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 16 13:19:58.093000 audit[1807]: AVC avc: denied { watch } for pid=1807 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526361 scontext=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:19:58.093000 audit[1807]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0016fd960 a2=fc6 a3=0 items=0 ppid=1634 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 key=(null) Dec 16 13:19:58.093000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 16 13:19:58.093000 audit[1807]: AVC avc: denied { watch } for pid=1807 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526361 scontext=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:19:58.093000 audit[1807]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0016fd9a0 a2=fc6 a3=0 items=0 ppid=1634 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 key=(null) Dec 16 13:19:58.093000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 16 13:19:58.095000 audit[1807]: AVC avc: denied { watch } for pid=1807 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526361 scontext=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:19:58.095000 audit[1807]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0016fd9c0 a2=fc6 a3=0 items=0 ppid=1634 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 key=(null) Dec 16 13:19:58.095000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 16 13:19:58.098000 audit[1807]: AVC avc: denied { watch } for pid=1807 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526361 scontext=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:19:58.098000 audit[1807]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0016fdd60 a2=fc6 a3=0 items=0 ppid=1634 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 key=(null) Dec 16 13:19:58.098000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 16 13:19:58.114335 env[1193]: 2024-12-16 13:19:58.038 [WARNING][4513] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--xn82q-eth0", GenerateName:"calico-apiserver-78458c5f95-", Namespace:"calico-apiserver", SelfLink:"", UID:"61d905b8-c93e-4490-90af-dacf4743676a", ResourceVersion:"1010", Generation:0, CreationTimestamp:time.Date(2024, time.December, 16, 13, 19, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"78458c5f95", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-6-0e268b98cf", ContainerID:"ba7a602aa90c20636af790b1a18e0ffd4ae9480a755ab2dec5e69d7baec0971f", Pod:"calico-apiserver-78458c5f95-xn82q", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.3.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0c4ebdccb47", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 16 13:19:58.114335 env[1193]: 2024-12-16 13:19:58.039 [INFO][4513] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" Dec 16 13:19:58.114335 env[1193]: 2024-12-16 13:19:58.039 [INFO][4513] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" iface="eth0" netns="" Dec 16 13:19:58.114335 env[1193]: 2024-12-16 13:19:58.039 [INFO][4513] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" Dec 16 13:19:58.114335 env[1193]: 2024-12-16 13:19:58.039 [INFO][4513] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" Dec 16 13:19:58.114335 env[1193]: 2024-12-16 13:19:58.097 [INFO][4519] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" HandleID="k8s-pod-network.79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" Workload="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--xn82q-eth0" Dec 16 13:19:58.114335 env[1193]: 2024-12-16 13:19:58.098 [INFO][4519] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 16 13:19:58.114335 env[1193]: 2024-12-16 13:19:58.098 [INFO][4519] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 16 13:19:58.114335 env[1193]: 2024-12-16 13:19:58.107 [WARNING][4519] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" HandleID="k8s-pod-network.79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" Workload="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--xn82q-eth0" Dec 16 13:19:58.114335 env[1193]: 2024-12-16 13:19:58.107 [INFO][4519] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" HandleID="k8s-pod-network.79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" Workload="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--xn82q-eth0" Dec 16 13:19:58.114335 env[1193]: 2024-12-16 13:19:58.109 [INFO][4519] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 16 13:19:58.114335 env[1193]: 2024-12-16 13:19:58.112 [INFO][4513] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" Dec 16 13:19:58.115297 env[1193]: time="2024-12-16T13:19:58.114373527Z" level=info msg="TearDown network for sandbox \"79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764\" successfully" Dec 16 13:19:58.115297 env[1193]: time="2024-12-16T13:19:58.114407429Z" level=info msg="StopPodSandbox for \"79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764\" returns successfully" Dec 16 13:19:58.115297 env[1193]: time="2024-12-16T13:19:58.114921607Z" level=info msg="RemovePodSandbox for \"79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764\"" Dec 16 13:19:58.115297 env[1193]: time="2024-12-16T13:19:58.114961341Z" level=info msg="Forcibly stopping sandbox \"79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764\"" Dec 16 13:19:58.174025 sshd[4396]: pam_unix(sshd:session): session closed for user core Dec 16 13:19:58.174000 audit[4396]: USER_END pid=4396 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:58.174000 audit[4396]: CRED_DISP pid=4396 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:19:58.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-164.92.94.164:22-139.178.89.65:48018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:19:58.188920 systemd[1]: sshd@13-164.92.94.164:22-139.178.89.65:48018.service: Deactivated successfully. Dec 16 13:19:58.190077 systemd[1]: session-13.scope: Deactivated successfully. Dec 16 13:19:58.192311 systemd-logind[1181]: Session 13 logged out. Waiting for processes to exit. Dec 16 13:19:58.194013 systemd-logind[1181]: Removed session 13. Dec 16 13:19:58.239240 env[1193]: 2024-12-16 13:19:58.190 [WARNING][4537] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--xn82q-eth0", GenerateName:"calico-apiserver-78458c5f95-", Namespace:"calico-apiserver", SelfLink:"", UID:"61d905b8-c93e-4490-90af-dacf4743676a", ResourceVersion:"1010", Generation:0, CreationTimestamp:time.Date(2024, time.December, 16, 13, 19, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"78458c5f95", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-6-0e268b98cf", ContainerID:"ba7a602aa90c20636af790b1a18e0ffd4ae9480a755ab2dec5e69d7baec0971f", Pod:"calico-apiserver-78458c5f95-xn82q", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.3.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali0c4ebdccb47", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 16 13:19:58.239240 env[1193]: 2024-12-16 13:19:58.190 [INFO][4537] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" Dec 16 13:19:58.239240 env[1193]: 2024-12-16 13:19:58.190 [INFO][4537] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" iface="eth0" netns="" Dec 16 13:19:58.239240 env[1193]: 2024-12-16 13:19:58.190 [INFO][4537] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" Dec 16 13:19:58.239240 env[1193]: 2024-12-16 13:19:58.190 [INFO][4537] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" Dec 16 13:19:58.239240 env[1193]: 2024-12-16 13:19:58.222 [INFO][4544] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" HandleID="k8s-pod-network.79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" Workload="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--xn82q-eth0" Dec 16 13:19:58.239240 env[1193]: 2024-12-16 13:19:58.222 [INFO][4544] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 16 13:19:58.239240 env[1193]: 2024-12-16 13:19:58.223 [INFO][4544] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 16 13:19:58.239240 env[1193]: 2024-12-16 13:19:58.231 [WARNING][4544] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" HandleID="k8s-pod-network.79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" Workload="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--xn82q-eth0" Dec 16 13:19:58.239240 env[1193]: 2024-12-16 13:19:58.231 [INFO][4544] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" HandleID="k8s-pod-network.79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" Workload="ci--3510.3.6--6--0e268b98cf-k8s-calico--apiserver--78458c5f95--xn82q-eth0" Dec 16 13:19:58.239240 env[1193]: 2024-12-16 13:19:58.234 [INFO][4544] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 16 13:19:58.239240 env[1193]: 2024-12-16 13:19:58.236 [INFO][4537] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764" Dec 16 13:19:58.241353 env[1193]: time="2024-12-16T13:19:58.240211578Z" level=info msg="TearDown network for sandbox \"79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764\" successfully" Dec 16 13:19:58.244462 env[1193]: time="2024-12-16T13:19:58.244393314Z" level=info msg="RemovePodSandbox \"79c4c1dc4c557cc909093cd278dc60c2bfa49b90079e192832e7d39a04279764\" returns successfully" Dec 16 13:19:59.429905 systemd[1]: run-containerd-runc-k8s.io-b5e0294917255b5b80b05021749b00302fbb09f57429ac67d070a8fc95064983-runc.G1Fd59.mount: Deactivated successfully. Dec 16 13:20:01.434813 kubelet[1921]: E1216 13:20:01.434761 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:20:03.179566 systemd[1]: Started sshd@14-164.92.94.164:22-139.178.89.65:40354.service. Dec 16 13:20:03.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-164.92.94.164:22-139.178.89.65:40354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:03.181523 kernel: kauditd_printk_skb: 114 callbacks suppressed Dec 16 13:20:03.182015 kernel: audit: type=1130 audit(1734355203.178:1408): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-164.92.94.164:22-139.178.89.65:40354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:03.242000 audit[4577]: USER_ACCT pid=4577 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:03.244263 sshd[4577]: Accepted publickey for core from 139.178.89.65 port 40354 ssh2: RSA SHA256:Q+lFULKB/jVvshRdfdjHJzJxBGhdic6R851DS3iyBTE Dec 16 13:20:03.249144 kernel: audit: type=1101 audit(1734355203.242:1409): pid=4577 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:03.249000 audit[4577]: CRED_ACQ pid=4577 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:03.252256 sshd[4577]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 16 13:20:03.256547 kernel: audit: type=1103 audit(1734355203.249:1410): pid=4577 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:03.256814 kernel: audit: type=1006 audit(1734355203.249:1411): pid=4577 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Dec 16 13:20:03.249000 audit[4577]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe599b82b0 a2=3 a3=0 items=0 ppid=1 pid=4577 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:03.249000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 16 13:20:03.262955 kernel: audit: type=1300 audit(1734355203.249:1411): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe599b82b0 a2=3 a3=0 items=0 ppid=1 pid=4577 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:03.263125 kernel: audit: type=1327 audit(1734355203.249:1411): proctitle=737368643A20636F7265205B707269765D Dec 16 13:20:03.267492 systemd-logind[1181]: New session 14 of user core. Dec 16 13:20:03.267939 systemd[1]: Started session-14.scope. Dec 16 13:20:03.274000 audit[4577]: USER_START pid=4577 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:03.280230 kernel: audit: type=1105 audit(1734355203.274:1412): pid=4577 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:03.280374 kernel: audit: type=1103 audit(1734355203.274:1413): pid=4579 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:03.274000 audit[4579]: CRED_ACQ pid=4579 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:03.453409 sshd[4577]: pam_unix(sshd:session): session closed for user core Dec 16 13:20:03.454000 audit[4577]: USER_END pid=4577 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:03.460088 kernel: audit: type=1106 audit(1734355203.454:1414): pid=4577 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:03.459000 audit[4577]: CRED_DISP pid=4577 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:03.464170 kernel: audit: type=1104 audit(1734355203.459:1415): pid=4577 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:03.465457 systemd[1]: sshd@14-164.92.94.164:22-139.178.89.65:40354.service: Deactivated successfully. Dec 16 13:20:03.464000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-164.92.94.164:22-139.178.89.65:40354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:03.466421 systemd[1]: session-14.scope: Deactivated successfully. Dec 16 13:20:03.467277 systemd-logind[1181]: Session 14 logged out. Waiting for processes to exit. Dec 16 13:20:03.468429 systemd-logind[1181]: Removed session 14. Dec 16 13:20:07.433840 kubelet[1921]: E1216 13:20:07.433788 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:20:08.465908 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 16 13:20:08.466154 kernel: audit: type=1130 audit(1734355208.463:1417): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-164.92.94.164:22-139.178.89.65:35154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:08.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-164.92.94.164:22-139.178.89.65:35154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:08.464342 systemd[1]: Started sshd@15-164.92.94.164:22-139.178.89.65:35154.service. Dec 16 13:20:08.537000 audit[4599]: USER_ACCT pid=4599 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:08.538718 sshd[4599]: Accepted publickey for core from 139.178.89.65 port 35154 ssh2: RSA SHA256:Q+lFULKB/jVvshRdfdjHJzJxBGhdic6R851DS3iyBTE Dec 16 13:20:08.543096 kernel: audit: type=1101 audit(1734355208.537:1418): pid=4599 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:08.542000 audit[4599]: CRED_ACQ pid=4599 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:08.545118 sshd[4599]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 16 13:20:08.549831 kernel: audit: type=1103 audit(1734355208.542:1419): pid=4599 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:08.550194 kernel: audit: type=1006 audit(1734355208.542:1420): pid=4599 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 16 13:20:08.542000 audit[4599]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9c7864e0 a2=3 a3=0 items=0 ppid=1 pid=4599 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:08.542000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 16 13:20:08.557108 kernel: audit: type=1300 audit(1734355208.542:1420): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9c7864e0 a2=3 a3=0 items=0 ppid=1 pid=4599 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:08.558251 kernel: audit: type=1327 audit(1734355208.542:1420): proctitle=737368643A20636F7265205B707269765D Dec 16 13:20:08.559043 systemd[1]: Started session-15.scope. Dec 16 13:20:08.559753 systemd-logind[1181]: New session 15 of user core. Dec 16 13:20:08.565000 audit[4599]: USER_START pid=4599 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:08.567000 audit[4601]: CRED_ACQ pid=4601 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:08.574725 kernel: audit: type=1105 audit(1734355208.565:1421): pid=4599 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:08.575847 kernel: audit: type=1103 audit(1734355208.567:1422): pid=4601 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:08.773679 sshd[4599]: pam_unix(sshd:session): session closed for user core Dec 16 13:20:08.774000 audit[4599]: USER_END pid=4599 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:08.780110 kernel: audit: type=1106 audit(1734355208.774:1423): pid=4599 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:08.774000 audit[4599]: CRED_DISP pid=4599 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:08.781872 systemd-logind[1181]: Session 15 logged out. Waiting for processes to exit. Dec 16 13:20:08.786111 kernel: audit: type=1104 audit(1734355208.774:1424): pid=4599 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:08.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-164.92.94.164:22-139.178.89.65:35154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:08.784193 systemd[1]: sshd@15-164.92.94.164:22-139.178.89.65:35154.service: Deactivated successfully. Dec 16 13:20:08.785580 systemd[1]: session-15.scope: Deactivated successfully. Dec 16 13:20:08.787903 systemd-logind[1181]: Removed session 15. Dec 16 13:20:09.797058 systemd[1]: run-containerd-runc-k8s.io-80d7aaa1846544168d8dc4ad3c496f6a874d369a39dbade2b4b4570d925058e5-runc.5nHsGY.mount: Deactivated successfully. Dec 16 13:20:09.961285 kubelet[1921]: E1216 13:20:09.961237 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:20:09.983202 kubelet[1921]: I1216 13:20:09.983114 1921 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-ccvcz" podStartSLOduration=44.7552043 podStartE2EDuration="54.983050979s" podCreationTimestamp="2024-12-16 13:19:15 +0000 UTC" firstStartedPulling="2024-12-16 13:19:46.956247094 +0000 UTC m=+51.749723993" lastFinishedPulling="2024-12-16 13:19:57.184093757 +0000 UTC m=+61.977570672" observedRunningTime="2024-12-16 13:19:58.291822613 +0000 UTC m=+63.085299528" watchObservedRunningTime="2024-12-16 13:20:09.983050979 +0000 UTC m=+74.776527920" Dec 16 13:20:13.784206 systemd[1]: Started sshd@16-164.92.94.164:22-139.178.89.65:35160.service. Dec 16 13:20:13.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-164.92.94.164:22-139.178.89.65:35160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:13.787850 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 16 13:20:13.787969 kernel: audit: type=1130 audit(1734355213.783:1426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-164.92.94.164:22-139.178.89.65:35160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:13.854000 audit[4631]: USER_ACCT pid=4631 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:13.860974 sshd[4631]: Accepted publickey for core from 139.178.89.65 port 35160 ssh2: RSA SHA256:Q+lFULKB/jVvshRdfdjHJzJxBGhdic6R851DS3iyBTE Dec 16 13:20:13.861553 kernel: audit: type=1101 audit(1734355213.854:1427): pid=4631 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:13.862000 audit[4631]: CRED_ACQ pid=4631 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:13.865463 sshd[4631]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 16 13:20:13.869126 kernel: audit: type=1103 audit(1734355213.862:1428): pid=4631 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:13.872097 kernel: audit: type=1006 audit(1734355213.862:1429): pid=4631 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 16 13:20:13.877282 kernel: audit: type=1300 audit(1734355213.862:1429): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6c447dd0 a2=3 a3=0 items=0 ppid=1 pid=4631 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:13.862000 audit[4631]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6c447dd0 a2=3 a3=0 items=0 ppid=1 pid=4631 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:13.876158 systemd[1]: Started session-16.scope. Dec 16 13:20:13.877322 systemd-logind[1181]: New session 16 of user core. Dec 16 13:20:13.862000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 16 13:20:13.881130 kernel: audit: type=1327 audit(1734355213.862:1429): proctitle=737368643A20636F7265205B707269765D Dec 16 13:20:13.886000 audit[4631]: USER_START pid=4631 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:13.893277 kernel: audit: type=1105 audit(1734355213.886:1430): pid=4631 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:13.889000 audit[4633]: CRED_ACQ pid=4633 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:13.898233 kernel: audit: type=1103 audit(1734355213.889:1431): pid=4633 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:14.157549 sshd[4631]: pam_unix(sshd:session): session closed for user core Dec 16 13:20:14.158000 audit[4631]: USER_END pid=4631 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:14.165213 kernel: audit: type=1106 audit(1734355214.158:1432): pid=4631 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:14.163378 systemd[1]: sshd@16-164.92.94.164:22-139.178.89.65:35160.service: Deactivated successfully. Dec 16 13:20:14.164712 systemd[1]: session-16.scope: Deactivated successfully. Dec 16 13:20:14.159000 audit[4631]: CRED_DISP pid=4631 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:14.170119 kernel: audit: type=1104 audit(1734355214.159:1433): pid=4631 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:14.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-164.92.94.164:22-139.178.89.65:35160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:14.170889 systemd-logind[1181]: Session 16 logged out. Waiting for processes to exit. Dec 16 13:20:14.173769 systemd-logind[1181]: Removed session 16. Dec 16 13:20:16.433048 kubelet[1921]: E1216 13:20:16.432990 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:20:19.166173 systemd[1]: Started sshd@17-164.92.94.164:22-139.178.89.65:44968.service. Dec 16 13:20:19.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-164.92.94.164:22-139.178.89.65:44968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:19.168933 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 16 13:20:19.169122 kernel: audit: type=1130 audit(1734355219.166:1435): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-164.92.94.164:22-139.178.89.65:44968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:19.231000 audit[4645]: USER_ACCT pid=4645 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:19.233731 sshd[4645]: Accepted publickey for core from 139.178.89.65 port 44968 ssh2: RSA SHA256:Q+lFULKB/jVvshRdfdjHJzJxBGhdic6R851DS3iyBTE Dec 16 13:20:19.236000 audit[4645]: CRED_ACQ pid=4645 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:19.239021 sshd[4645]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 16 13:20:19.242350 kernel: audit: type=1101 audit(1734355219.231:1436): pid=4645 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:19.242530 kernel: audit: type=1103 audit(1734355219.236:1437): pid=4645 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:19.246528 kernel: audit: type=1006 audit(1734355219.237:1438): pid=4645 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Dec 16 13:20:19.246791 kernel: audit: type=1300 audit(1734355219.237:1438): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc310a8d60 a2=3 a3=0 items=0 ppid=1 pid=4645 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:19.237000 audit[4645]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc310a8d60 a2=3 a3=0 items=0 ppid=1 pid=4645 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:19.237000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 16 13:20:19.253214 kernel: audit: type=1327 audit(1734355219.237:1438): proctitle=737368643A20636F7265205B707269765D Dec 16 13:20:19.256179 systemd[1]: Started session-17.scope. Dec 16 13:20:19.256874 systemd-logind[1181]: New session 17 of user core. Dec 16 13:20:19.263000 audit[4645]: USER_START pid=4645 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:19.271080 kernel: audit: type=1105 audit(1734355219.263:1439): pid=4645 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:19.271245 kernel: audit: type=1103 audit(1734355219.269:1440): pid=4647 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:19.269000 audit[4647]: CRED_ACQ pid=4647 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:19.530424 sshd[4645]: pam_unix(sshd:session): session closed for user core Dec 16 13:20:19.536000 audit[4645]: USER_END pid=4645 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:19.536000 audit[4645]: CRED_DISP pid=4645 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:19.546833 kernel: audit: type=1106 audit(1734355219.536:1441): pid=4645 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:19.547135 kernel: audit: type=1104 audit(1734355219.536:1442): pid=4645 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:19.555609 systemd[1]: Started sshd@18-164.92.94.164:22-139.178.89.65:44980.service. Dec 16 13:20:19.556737 systemd[1]: sshd@17-164.92.94.164:22-139.178.89.65:44968.service: Deactivated successfully. Dec 16 13:20:19.559302 systemd[1]: session-17.scope: Deactivated successfully. Dec 16 13:20:19.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-164.92.94.164:22-139.178.89.65:44980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:19.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-164.92.94.164:22-139.178.89.65:44968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:19.564561 systemd-logind[1181]: Session 17 logged out. Waiting for processes to exit. Dec 16 13:20:19.566973 systemd-logind[1181]: Removed session 17. Dec 16 13:20:19.615000 audit[4656]: USER_ACCT pid=4656 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:19.617181 sshd[4656]: Accepted publickey for core from 139.178.89.65 port 44980 ssh2: RSA SHA256:Q+lFULKB/jVvshRdfdjHJzJxBGhdic6R851DS3iyBTE Dec 16 13:20:19.617000 audit[4656]: CRED_ACQ pid=4656 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:19.617000 audit[4656]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7075d920 a2=3 a3=0 items=0 ppid=1 pid=4656 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:19.617000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 16 13:20:19.622421 sshd[4656]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 16 13:20:19.627681 systemd-logind[1181]: New session 18 of user core. Dec 16 13:20:19.628921 systemd[1]: Started session-18.scope. Dec 16 13:20:19.634000 audit[4656]: USER_START pid=4656 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:19.637000 audit[4659]: CRED_ACQ pid=4659 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:20.176654 sshd[4656]: pam_unix(sshd:session): session closed for user core Dec 16 13:20:20.180000 audit[4656]: USER_END pid=4656 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:20.180000 audit[4656]: CRED_DISP pid=4656 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:20.185956 systemd[1]: Started sshd@19-164.92.94.164:22-139.178.89.65:44984.service. Dec 16 13:20:20.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-164.92.94.164:22-139.178.89.65:44984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:20.191196 systemd[1]: sshd@18-164.92.94.164:22-139.178.89.65:44980.service: Deactivated successfully. Dec 16 13:20:20.191000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-164.92.94.164:22-139.178.89.65:44980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:20.195009 systemd[1]: session-18.scope: Deactivated successfully. Dec 16 13:20:20.199784 systemd-logind[1181]: Session 18 logged out. Waiting for processes to exit. Dec 16 13:20:20.203995 systemd-logind[1181]: Removed session 18. Dec 16 13:20:20.256000 audit[4665]: USER_ACCT pid=4665 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:20.257857 sshd[4665]: Accepted publickey for core from 139.178.89.65 port 44984 ssh2: RSA SHA256:Q+lFULKB/jVvshRdfdjHJzJxBGhdic6R851DS3iyBTE Dec 16 13:20:20.258000 audit[4665]: CRED_ACQ pid=4665 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:20.258000 audit[4665]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec43897a0 a2=3 a3=0 items=0 ppid=1 pid=4665 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:20.258000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 16 13:20:20.260400 sshd[4665]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 16 13:20:20.270474 systemd-logind[1181]: New session 19 of user core. Dec 16 13:20:20.271603 systemd[1]: Started session-19.scope. Dec 16 13:20:20.281000 audit[4665]: USER_START pid=4665 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:20.284000 audit[4668]: CRED_ACQ pid=4668 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:23.319664 sshd[4665]: pam_unix(sshd:session): session closed for user core Dec 16 13:20:23.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-164.92.94.164:22-139.178.89.65:44990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:23.325326 systemd[1]: Started sshd@20-164.92.94.164:22-139.178.89.65:44990.service. Dec 16 13:20:23.327000 audit[4665]: USER_END pid=4665 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:23.327000 audit[4665]: CRED_DISP pid=4665 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:23.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-164.92.94.164:22-139.178.89.65:44984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:23.331926 systemd[1]: sshd@19-164.92.94.164:22-139.178.89.65:44984.service: Deactivated successfully. Dec 16 13:20:23.333992 systemd[1]: session-19.scope: Deactivated successfully. Dec 16 13:20:23.338635 systemd-logind[1181]: Session 19 logged out. Waiting for processes to exit. Dec 16 13:20:23.342460 systemd-logind[1181]: Removed session 19. Dec 16 13:20:23.375000 audit[4684]: NETFILTER_CFG table=filter:119 family=2 entries=20 op=nft_register_rule pid=4684 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:20:23.375000 audit[4684]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc96d482c0 a2=0 a3=7ffc96d482ac items=0 ppid=2042 pid=4684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:23.375000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:20:23.382000 audit[4684]: NETFILTER_CFG table=nat:120 family=2 entries=22 op=nft_register_rule pid=4684 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:20:23.382000 audit[4684]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc96d482c0 a2=0 a3=0 items=0 ppid=2042 pid=4684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:23.382000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:20:23.413000 audit[4681]: USER_ACCT pid=4681 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:23.421826 sshd[4681]: Accepted publickey for core from 139.178.89.65 port 44990 ssh2: RSA SHA256:Q+lFULKB/jVvshRdfdjHJzJxBGhdic6R851DS3iyBTE Dec 16 13:20:23.422000 audit[4681]: CRED_ACQ pid=4681 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:23.424000 audit[4681]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdd6e2d820 a2=3 a3=0 items=0 ppid=1 pid=4681 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:23.424000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 16 13:20:23.426855 sshd[4681]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 16 13:20:23.448084 systemd-logind[1181]: New session 20 of user core. Dec 16 13:20:23.448377 systemd[1]: Started session-20.scope. Dec 16 13:20:23.459000 audit[4681]: USER_START pid=4681 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:23.461000 audit[4687]: CRED_ACQ pid=4687 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:23.470000 audit[4686]: NETFILTER_CFG table=filter:121 family=2 entries=32 op=nft_register_rule pid=4686 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:20:23.470000 audit[4686]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff8c75e520 a2=0 a3=7fff8c75e50c items=0 ppid=2042 pid=4686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:23.470000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:20:23.482000 audit[4686]: NETFILTER_CFG table=nat:122 family=2 entries=22 op=nft_register_rule pid=4686 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:20:23.482000 audit[4686]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff8c75e520 a2=0 a3=0 items=0 ppid=2042 pid=4686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:23.482000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:20:24.404161 kernel: kauditd_printk_skb: 43 callbacks suppressed Dec 16 13:20:24.405163 kernel: audit: type=1106 audit(1734355224.396:1472): pid=4681 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:24.396000 audit[4681]: USER_END pid=4681 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:24.395827 sshd[4681]: pam_unix(sshd:session): session closed for user core Dec 16 13:20:24.396000 audit[4681]: CRED_DISP pid=4681 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:24.417099 kernel: audit: type=1104 audit(1734355224.396:1473): pid=4681 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:24.415369 systemd[1]: Started sshd@21-164.92.94.164:22-139.178.89.65:45004.service. Dec 16 13:20:24.416746 systemd[1]: sshd@20-164.92.94.164:22-139.178.89.65:44990.service: Deactivated successfully. Dec 16 13:20:24.420344 systemd[1]: session-20.scope: Deactivated successfully. Dec 16 13:20:24.427147 kernel: audit: type=1130 audit(1734355224.414:1474): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-164.92.94.164:22-139.178.89.65:45004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:24.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-164.92.94.164:22-139.178.89.65:45004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:24.421861 systemd-logind[1181]: Session 20 logged out. Waiting for processes to exit. Dec 16 13:20:24.430108 systemd-logind[1181]: Removed session 20. Dec 16 13:20:24.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-164.92.94.164:22-139.178.89.65:44990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:24.436173 kernel: audit: type=1131 audit(1734355224.417:1475): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-164.92.94.164:22-139.178.89.65:44990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:24.493000 audit[4700]: USER_ACCT pid=4700 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:24.494775 sshd[4700]: Accepted publickey for core from 139.178.89.65 port 45004 ssh2: RSA SHA256:Q+lFULKB/jVvshRdfdjHJzJxBGhdic6R851DS3iyBTE Dec 16 13:20:24.498251 kernel: audit: type=1101 audit(1734355224.493:1476): pid=4700 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:24.502000 audit[4700]: CRED_ACQ pid=4700 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:24.503731 sshd[4700]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 16 13:20:24.511044 kernel: audit: type=1103 audit(1734355224.502:1477): pid=4700 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:24.515630 kernel: audit: type=1006 audit(1734355224.502:1478): pid=4700 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Dec 16 13:20:24.515730 kernel: audit: type=1300 audit(1734355224.502:1478): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf5f37c50 a2=3 a3=0 items=0 ppid=1 pid=4700 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:24.502000 audit[4700]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf5f37c50 a2=3 a3=0 items=0 ppid=1 pid=4700 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:24.502000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 16 13:20:24.519886 kernel: audit: type=1327 audit(1734355224.502:1478): proctitle=737368643A20636F7265205B707269765D Dec 16 13:20:24.525052 systemd-logind[1181]: New session 21 of user core. Dec 16 13:20:24.527625 systemd[1]: Started session-21.scope. Dec 16 13:20:24.535000 audit[4700]: USER_START pid=4700 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:24.542224 kernel: audit: type=1105 audit(1734355224.535:1479): pid=4700 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:24.541000 audit[4703]: CRED_ACQ pid=4703 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:24.706673 sshd[4700]: pam_unix(sshd:session): session closed for user core Dec 16 13:20:24.709000 audit[4700]: USER_END pid=4700 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:24.710000 audit[4700]: CRED_DISP pid=4700 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:24.714129 systemd-logind[1181]: Session 21 logged out. Waiting for processes to exit. Dec 16 13:20:24.715181 systemd[1]: sshd@21-164.92.94.164:22-139.178.89.65:45004.service: Deactivated successfully. Dec 16 13:20:24.716607 systemd[1]: session-21.scope: Deactivated successfully. Dec 16 13:20:24.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-164.92.94.164:22-139.178.89.65:45004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:24.718236 systemd-logind[1181]: Removed session 21. Dec 16 13:20:29.716253 systemd[1]: Started sshd@22-164.92.94.164:22-139.178.89.65:53926.service. Dec 16 13:20:29.718125 kernel: kauditd_printk_skb: 4 callbacks suppressed Dec 16 13:20:29.718199 kernel: audit: type=1130 audit(1734355229.715:1484): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-164.92.94.164:22-139.178.89.65:53926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:29.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-164.92.94.164:22-139.178.89.65:53926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:29.784000 audit[4735]: USER_ACCT pid=4735 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:29.786308 sshd[4735]: Accepted publickey for core from 139.178.89.65 port 53926 ssh2: RSA SHA256:Q+lFULKB/jVvshRdfdjHJzJxBGhdic6R851DS3iyBTE Dec 16 13:20:29.798119 kernel: audit: type=1101 audit(1734355229.784:1485): pid=4735 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:29.797000 audit[4735]: CRED_ACQ pid=4735 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:29.799984 sshd[4735]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 16 13:20:29.805357 kernel: audit: type=1103 audit(1734355229.797:1486): pid=4735 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:29.806150 kernel: audit: type=1006 audit(1734355229.797:1487): pid=4735 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Dec 16 13:20:29.806252 kernel: audit: type=1300 audit(1734355229.797:1487): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe675b41e0 a2=3 a3=0 items=0 ppid=1 pid=4735 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:29.797000 audit[4735]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe675b41e0 a2=3 a3=0 items=0 ppid=1 pid=4735 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:29.797000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 16 13:20:29.812163 kernel: audit: type=1327 audit(1734355229.797:1487): proctitle=737368643A20636F7265205B707269765D Dec 16 13:20:29.819224 systemd-logind[1181]: New session 22 of user core. Dec 16 13:20:29.820221 systemd[1]: Started session-22.scope. Dec 16 13:20:29.828000 audit[4735]: USER_START pid=4735 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:29.836293 kernel: audit: type=1105 audit(1734355229.828:1488): pid=4735 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:29.836485 kernel: audit: type=1103 audit(1734355229.834:1489): pid=4737 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:29.834000 audit[4737]: CRED_ACQ pid=4737 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:30.036690 sshd[4735]: pam_unix(sshd:session): session closed for user core Dec 16 13:20:30.038000 audit[4735]: USER_END pid=4735 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:30.046947 systemd[1]: sshd@22-164.92.94.164:22-139.178.89.65:53926.service: Deactivated successfully. Dec 16 13:20:30.047222 kernel: audit: type=1106 audit(1734355230.038:1490): pid=4735 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:30.039000 audit[4735]: CRED_DISP pid=4735 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:30.048742 systemd[1]: session-22.scope: Deactivated successfully. Dec 16 13:20:30.053136 kernel: audit: type=1104 audit(1734355230.039:1491): pid=4735 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:30.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-164.92.94.164:22-139.178.89.65:53926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:30.053679 systemd-logind[1181]: Session 22 logged out. Waiting for processes to exit. Dec 16 13:20:30.054888 systemd-logind[1181]: Removed session 22. Dec 16 13:20:30.418000 audit[4747]: NETFILTER_CFG table=filter:123 family=2 entries=20 op=nft_register_rule pid=4747 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:20:30.418000 audit[4747]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd12270a90 a2=0 a3=7ffd12270a7c items=0 ppid=2042 pid=4747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:30.418000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:20:30.423000 audit[4747]: NETFILTER_CFG table=nat:124 family=2 entries=106 op=nft_register_chain pid=4747 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 16 13:20:30.423000 audit[4747]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffd12270a90 a2=0 a3=7ffd12270a7c items=0 ppid=2042 pid=4747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:30.423000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 16 13:20:35.054375 systemd[1]: Started sshd@23-164.92.94.164:22-139.178.89.65:53928.service. Dec 16 13:20:35.062265 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 16 13:20:35.062648 kernel: audit: type=1130 audit(1734355235.056:1495): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-164.92.94.164:22-139.178.89.65:53928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:35.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-164.92.94.164:22-139.178.89.65:53928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:35.138975 sshd[4752]: Accepted publickey for core from 139.178.89.65 port 53928 ssh2: RSA SHA256:Q+lFULKB/jVvshRdfdjHJzJxBGhdic6R851DS3iyBTE Dec 16 13:20:35.137000 audit[4752]: USER_ACCT pid=4752 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:35.146132 kernel: audit: type=1101 audit(1734355235.137:1496): pid=4752 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:35.145000 audit[4752]: CRED_ACQ pid=4752 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:35.152116 kernel: audit: type=1103 audit(1734355235.145:1497): pid=4752 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:35.152222 sshd[4752]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 16 13:20:35.155096 kernel: audit: type=1006 audit(1734355235.145:1498): pid=4752 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Dec 16 13:20:35.145000 audit[4752]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff275d450 a2=3 a3=0 items=0 ppid=1 pid=4752 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:35.162115 kernel: audit: type=1300 audit(1734355235.145:1498): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff275d450 a2=3 a3=0 items=0 ppid=1 pid=4752 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:35.145000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 16 13:20:35.165305 kernel: audit: type=1327 audit(1734355235.145:1498): proctitle=737368643A20636F7265205B707269765D Dec 16 13:20:35.170182 systemd-logind[1181]: New session 23 of user core. Dec 16 13:20:35.171982 systemd[1]: Started session-23.scope. Dec 16 13:20:35.179000 audit[4752]: USER_START pid=4752 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:35.182000 audit[4754]: CRED_ACQ pid=4754 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:35.190143 kernel: audit: type=1105 audit(1734355235.179:1499): pid=4752 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:35.190511 kernel: audit: type=1103 audit(1734355235.182:1500): pid=4754 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:35.716219 sshd[4752]: pam_unix(sshd:session): session closed for user core Dec 16 13:20:35.717000 audit[4752]: USER_END pid=4752 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:35.726086 kernel: audit: type=1106 audit(1734355235.717:1501): pid=4752 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:35.726192 kernel: audit: type=1104 audit(1734355235.720:1502): pid=4752 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:35.720000 audit[4752]: CRED_DISP pid=4752 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:35.723734 systemd[1]: sshd@23-164.92.94.164:22-139.178.89.65:53928.service: Deactivated successfully. Dec 16 13:20:35.725549 systemd[1]: session-23.scope: Deactivated successfully. Dec 16 13:20:35.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-164.92.94.164:22-139.178.89.65:53928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:35.728339 systemd-logind[1181]: Session 23 logged out. Waiting for processes to exit. Dec 16 13:20:35.730349 systemd-logind[1181]: Removed session 23. Dec 16 13:20:38.447579 kubelet[1921]: E1216 13:20:38.445825 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:20:39.801227 systemd[1]: run-containerd-runc-k8s.io-80d7aaa1846544168d8dc4ad3c496f6a874d369a39dbade2b4b4570d925058e5-runc.7gobqt.mount: Deactivated successfully. Dec 16 13:20:40.724129 systemd[1]: Started sshd@24-164.92.94.164:22-139.178.89.65:46182.service. Dec 16 13:20:40.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-164.92.94.164:22-139.178.89.65:46182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:40.730407 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 16 13:20:40.730954 kernel: audit: type=1130 audit(1734355240.723:1504): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-164.92.94.164:22-139.178.89.65:46182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:40.782000 audit[4785]: USER_ACCT pid=4785 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:40.784151 sshd[4785]: Accepted publickey for core from 139.178.89.65 port 46182 ssh2: RSA SHA256:Q+lFULKB/jVvshRdfdjHJzJxBGhdic6R851DS3iyBTE Dec 16 13:20:40.787000 audit[4785]: CRED_ACQ pid=4785 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:40.789406 sshd[4785]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 16 13:20:40.792454 kernel: audit: type=1101 audit(1734355240.782:1505): pid=4785 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:40.792601 kernel: audit: type=1103 audit(1734355240.787:1506): pid=4785 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:40.795348 kernel: audit: type=1006 audit(1734355240.787:1507): pid=4785 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 16 13:20:40.797127 kernel: audit: type=1300 audit(1734355240.787:1507): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc14377a40 a2=3 a3=0 items=0 ppid=1 pid=4785 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:40.787000 audit[4785]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc14377a40 a2=3 a3=0 items=0 ppid=1 pid=4785 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:40.787000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 16 13:20:40.802106 kernel: audit: type=1327 audit(1734355240.787:1507): proctitle=737368643A20636F7265205B707269765D Dec 16 13:20:40.805876 systemd-logind[1181]: New session 24 of user core. Dec 16 13:20:40.806481 systemd[1]: Started session-24.scope. Dec 16 13:20:40.814000 audit[4785]: USER_START pid=4785 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:40.824659 kernel: audit: type=1105 audit(1734355240.814:1508): pid=4785 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:40.824777 kernel: audit: type=1103 audit(1734355240.814:1509): pid=4787 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:40.814000 audit[4787]: CRED_ACQ pid=4787 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:40.984491 sshd[4785]: pam_unix(sshd:session): session closed for user core Dec 16 13:20:40.985000 audit[4785]: USER_END pid=4785 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:40.987000 audit[4785]: CRED_DISP pid=4785 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:40.994528 kernel: audit: type=1106 audit(1734355240.985:1510): pid=4785 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:40.995188 kernel: audit: type=1104 audit(1734355240.987:1511): pid=4785 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:40.991000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-164.92.94.164:22-139.178.89.65:46182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:40.992327 systemd[1]: sshd@24-164.92.94.164:22-139.178.89.65:46182.service: Deactivated successfully. Dec 16 13:20:40.993512 systemd[1]: session-24.scope: Deactivated successfully. Dec 16 13:20:40.996288 systemd-logind[1181]: Session 24 logged out. Waiting for processes to exit. Dec 16 13:20:40.998020 systemd-logind[1181]: Removed session 24. Dec 16 13:20:45.436177 kubelet[1921]: E1216 13:20:45.436136 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:20:45.996095 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 16 13:20:45.996229 kernel: audit: type=1130 audit(1734355245.992:1513): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-164.92.94.164:22-139.178.89.65:46186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:45.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-164.92.94.164:22-139.178.89.65:46186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:45.993051 systemd[1]: Started sshd@25-164.92.94.164:22-139.178.89.65:46186.service. Dec 16 13:20:46.043000 audit[4797]: USER_ACCT pid=4797 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:46.044904 sshd[4797]: Accepted publickey for core from 139.178.89.65 port 46186 ssh2: RSA SHA256:Q+lFULKB/jVvshRdfdjHJzJxBGhdic6R851DS3iyBTE Dec 16 13:20:46.048095 kernel: audit: type=1101 audit(1734355246.043:1514): pid=4797 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:46.047000 audit[4797]: CRED_ACQ pid=4797 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:46.048939 sshd[4797]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 16 13:20:46.053329 kernel: audit: type=1103 audit(1734355246.047:1515): pid=4797 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:46.053481 kernel: audit: type=1006 audit(1734355246.047:1516): pid=4797 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 16 13:20:46.047000 audit[4797]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe10460340 a2=3 a3=0 items=0 ppid=1 pid=4797 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:46.056838 kernel: audit: type=1300 audit(1734355246.047:1516): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe10460340 a2=3 a3=0 items=0 ppid=1 pid=4797 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:46.056962 kernel: audit: type=1327 audit(1734355246.047:1516): proctitle=737368643A20636F7265205B707269765D Dec 16 13:20:46.047000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 16 13:20:46.060864 systemd[1]: Started session-25.scope. Dec 16 13:20:46.062375 systemd-logind[1181]: New session 25 of user core. Dec 16 13:20:46.067000 audit[4797]: USER_START pid=4797 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:46.069000 audit[4799]: CRED_ACQ pid=4799 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:46.074156 kernel: audit: type=1105 audit(1734355246.067:1517): pid=4797 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:46.074375 kernel: audit: type=1103 audit(1734355246.069:1518): pid=4799 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:46.270235 sshd[4797]: pam_unix(sshd:session): session closed for user core Dec 16 13:20:46.271000 audit[4797]: USER_END pid=4797 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:46.271000 audit[4797]: CRED_DISP pid=4797 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:46.279003 systemd[1]: sshd@25-164.92.94.164:22-139.178.89.65:46186.service: Deactivated successfully. Dec 16 13:20:46.280022 systemd[1]: session-25.scope: Deactivated successfully. Dec 16 13:20:46.281303 kernel: audit: type=1106 audit(1734355246.271:1519): pid=4797 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:46.281408 kernel: audit: type=1104 audit(1734355246.271:1520): pid=4797 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:46.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-164.92.94.164:22-139.178.89.65:46186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:46.282591 systemd-logind[1181]: Session 25 logged out. Waiting for processes to exit. Dec 16 13:20:46.284254 systemd-logind[1181]: Removed session 25. Dec 16 13:20:50.445000 audit[3993]: AVC avc: denied { watch } for pid=3993 comm="apiserver" path="/calico-apiserver-certs/..2024_12_16_13_19_29.1679168857/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c360,c491 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c360,c491 tclass=file permissive=0 Dec 16 13:20:50.445000 audit[3993]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0023b12c0 a2=fc6 a3=0 items=0 ppid=3156 pid=3993 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c360,c491 key=(null) Dec 16 13:20:50.445000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 16 13:20:50.690000 audit[1807]: AVC avc: denied { watch } for pid=1807 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:20:50.690000 audit[1807]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00292fc50 a2=fc6 a3=0 items=0 ppid=1634 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 key=(null) Dec 16 13:20:50.690000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 16 13:20:50.703000 audit[1807]: AVC avc: denied { watch } for pid=1807 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526361 scontext=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:20:50.703000 audit[1807]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001752c40 a2=fc6 a3=0 items=0 ppid=1634 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 key=(null) Dec 16 13:20:50.703000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 16 13:20:51.279706 systemd[1]: Started sshd@26-164.92.94.164:22-139.178.89.65:36072.service. Dec 16 13:20:51.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-164.92.94.164:22-139.178.89.65:36072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:51.281571 kernel: kauditd_printk_skb: 10 callbacks suppressed Dec 16 13:20:51.281670 kernel: audit: type=1130 audit(1734355251.279:1525): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-164.92.94.164:22-139.178.89.65:36072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:51.295000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:20:51.298000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526369 scontext=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:20:51.302707 kernel: audit: type=1400 audit(1734355251.295:1526): avc: denied { watch } for pid=1780 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:20:51.302842 kernel: audit: type=1400 audit(1734355251.298:1527): avc: denied { watch } for pid=1780 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526369 scontext=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:20:51.298000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c00f515620 a2=fc6 a3=0 items=0 ppid=1621 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 key=(null) Dec 16 13:20:51.306784 kernel: audit: type=1300 audit(1734355251.298:1527): arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c00f515620 a2=fc6 a3=0 items=0 ppid=1621 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 key=(null) Dec 16 13:20:51.298000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39322E39342E313634002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 16 13:20:51.295000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c01124c690 a2=fc6 a3=0 items=0 ppid=1621 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 key=(null) Dec 16 13:20:51.319673 kernel: audit: type=1327 audit(1734355251.298:1527): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39322E39342E313634002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 16 13:20:51.319796 kernel: audit: type=1300 audit(1734355251.295:1526): arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c01124c690 a2=fc6 a3=0 items=0 ppid=1621 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 key=(null) Dec 16 13:20:51.295000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39322E39342E313634002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 16 13:20:51.305000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:20:51.327682 kernel: audit: type=1327 audit(1734355251.295:1526): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39322E39342E313634002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 16 13:20:51.327831 kernel: audit: type=1400 audit(1734355251.305:1528): avc: denied { watch } for pid=1780 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526363 scontext=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:20:51.305000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c00f515650 a2=fc6 a3=0 items=0 ppid=1621 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 key=(null) Dec 16 13:20:51.331289 kernel: audit: type=1300 audit(1734355251.305:1528): arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c00f515650 a2=fc6 a3=0 items=0 ppid=1621 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 key=(null) Dec 16 13:20:51.305000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39322E39342E313634002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 16 13:20:51.334883 kernel: audit: type=1327 audit(1734355251.305:1528): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39322E39342E313634002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 16 13:20:51.306000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526367 scontext=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:20:51.306000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c01124c6c0 a2=fc6 a3=0 items=0 ppid=1621 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 key=(null) Dec 16 13:20:51.306000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39322E39342E313634002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 16 13:20:51.318000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526361 scontext=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:20:51.318000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c00e9f5260 a2=fc6 a3=0 items=0 ppid=1621 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 key=(null) Dec 16 13:20:51.318000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39322E39342E313634002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 16 13:20:51.319000 audit[1780]: AVC avc: denied { watch } for pid=1780 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526361 scontext=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:20:51.319000 audit[1780]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c00e9f5280 a2=fc6 a3=0 items=0 ppid=1621 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c944,c1001 key=(null) Dec 16 13:20:51.319000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39322E39342E313634002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 16 13:20:51.344000 audit[4809]: USER_ACCT pid=4809 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:51.345592 sshd[4809]: Accepted publickey for core from 139.178.89.65 port 36072 ssh2: RSA SHA256:Q+lFULKB/jVvshRdfdjHJzJxBGhdic6R851DS3iyBTE Dec 16 13:20:51.345000 audit[4809]: CRED_ACQ pid=4809 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:51.346000 audit[4809]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe12939680 a2=3 a3=0 items=0 ppid=1 pid=4809 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:51.346000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 16 13:20:51.347607 sshd[4809]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 16 13:20:51.352854 systemd-logind[1181]: New session 26 of user core. Dec 16 13:20:51.353680 systemd[1]: Started session-26.scope. Dec 16 13:20:51.358000 audit[4809]: USER_START pid=4809 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:51.361000 audit[4811]: CRED_ACQ pid=4811 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:51.527820 sshd[4809]: pam_unix(sshd:session): session closed for user core Dec 16 13:20:51.528000 audit[4809]: USER_END pid=4809 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:51.528000 audit[4809]: CRED_DISP pid=4809 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:51.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-164.92.94.164:22-139.178.89.65:36072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:51.531260 systemd[1]: sshd@26-164.92.94.164:22-139.178.89.65:36072.service: Deactivated successfully. Dec 16 13:20:51.532156 systemd[1]: session-26.scope: Deactivated successfully. Dec 16 13:20:51.532856 systemd-logind[1181]: Session 26 logged out. Waiting for processes to exit. Dec 16 13:20:51.534932 systemd-logind[1181]: Removed session 26. Dec 16 13:20:51.676000 audit[4034]: AVC avc: denied { watch } for pid=4034 comm="apiserver" path="/calico-apiserver-certs/..2024_12_16_13_19_29.1949706262/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c18,c545 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c18,c545 tclass=file permissive=0 Dec 16 13:20:51.676000 audit[4034]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c148a0 a2=fc6 a3=0 items=0 ppid=3554 pid=4034 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c18,c545 key=(null) Dec 16 13:20:51.676000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 16 13:20:52.432166 kubelet[1921]: E1216 13:20:52.432130 1921 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.3 67.207.67.2 67.207.67.3" Dec 16 13:20:52.671576 systemd[1]: run-containerd-runc-k8s.io-b5e0294917255b5b80b05021749b00302fbb09f57429ac67d070a8fc95064983-runc.jtmlRK.mount: Deactivated successfully. Dec 16 13:20:56.537972 kernel: kauditd_printk_skb: 22 callbacks suppressed Dec 16 13:20:56.538189 kernel: audit: type=1130 audit(1734355256.534:1541): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-164.92.94.164:22-139.178.89.65:36086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:56.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-164.92.94.164:22-139.178.89.65:36086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:56.535520 systemd[1]: Started sshd@27-164.92.94.164:22-139.178.89.65:36086.service. Dec 16 13:20:56.595000 audit[4843]: USER_ACCT pid=4843 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:56.599269 sshd[4843]: Accepted publickey for core from 139.178.89.65 port 36086 ssh2: RSA SHA256:Q+lFULKB/jVvshRdfdjHJzJxBGhdic6R851DS3iyBTE Dec 16 13:20:56.600170 kernel: audit: type=1101 audit(1734355256.595:1542): pid=4843 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:56.601000 audit[4843]: CRED_ACQ pid=4843 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:56.603539 sshd[4843]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 16 13:20:56.608611 kernel: audit: type=1103 audit(1734355256.601:1543): pid=4843 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:56.609001 kernel: audit: type=1006 audit(1734355256.601:1544): pid=4843 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Dec 16 13:20:56.601000 audit[4843]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc237364b0 a2=3 a3=0 items=0 ppid=1 pid=4843 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:56.614919 kernel: audit: type=1300 audit(1734355256.601:1544): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc237364b0 a2=3 a3=0 items=0 ppid=1 pid=4843 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 16 13:20:56.615129 kernel: audit: type=1327 audit(1734355256.601:1544): proctitle=737368643A20636F7265205B707269765D Dec 16 13:20:56.601000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 16 13:20:56.614261 systemd[1]: Started session-27.scope. Dec 16 13:20:56.616631 systemd-logind[1181]: New session 27 of user core. Dec 16 13:20:56.623000 audit[4843]: USER_START pid=4843 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:56.628179 kernel: audit: type=1105 audit(1734355256.623:1545): pid=4843 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:56.626000 audit[4845]: CRED_ACQ pid=4845 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:56.631218 kernel: audit: type=1103 audit(1734355256.626:1546): pid=4845 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:56.843819 sshd[4843]: pam_unix(sshd:session): session closed for user core Dec 16 13:20:56.845000 audit[4843]: USER_END pid=4843 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:56.852124 kernel: audit: type=1106 audit(1734355256.845:1547): pid=4843 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:56.851000 audit[4843]: CRED_DISP pid=4843 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:56.858517 kernel: audit: type=1104 audit(1734355256.851:1548): pid=4843 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 16 13:20:56.859201 systemd[1]: sshd@27-164.92.94.164:22-139.178.89.65:36086.service: Deactivated successfully. Dec 16 13:20:56.860305 systemd[1]: session-27.scope: Deactivated successfully. Dec 16 13:20:56.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-164.92.94.164:22-139.178.89.65:36086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 16 13:20:56.861594 systemd-logind[1181]: Session 27 logged out. Waiting for processes to exit. Dec 16 13:20:56.862954 systemd-logind[1181]: Removed session 27. Dec 16 13:20:58.096000 audit[1807]: AVC avc: denied { watch } for pid=1807 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526361 scontext=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:20:58.096000 audit[1807]: AVC avc: denied { watch } for pid=1807 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526361 scontext=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:20:58.096000 audit[1807]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0002f11e0 a2=fc6 a3=0 items=0 ppid=1634 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 key=(null) Dec 16 13:20:58.096000 audit[1807]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001699200 a2=fc6 a3=0 items=0 ppid=1634 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 key=(null) Dec 16 13:20:58.096000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 16 13:20:58.096000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 16 13:20:58.097000 audit[1807]: AVC avc: denied { watch } for pid=1807 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526361 scontext=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:20:58.097000 audit[1807]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0002f1220 a2=fc6 a3=0 items=0 ppid=1634 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 key=(null) Dec 16 13:20:58.097000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 16 13:20:58.100000 audit[1807]: AVC avc: denied { watch } for pid=1807 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526361 scontext=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 16 13:20:58.100000 audit[1807]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0016996e0 a2=fc6 a3=0 items=0 ppid=1634 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c64,c852 key=(null) Dec 16 13:20:58.100000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269