Dec 13 02:00:48.870829 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Dec 12 23:50:37 -00 2024 Dec 13 02:00:48.870852 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:00:48.870861 kernel: BIOS-provided physical RAM map: Dec 13 02:00:48.870867 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Dec 13 02:00:48.870872 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Dec 13 02:00:48.870878 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Dec 13 02:00:48.870884 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdbfff] usable Dec 13 02:00:48.870890 kernel: BIOS-e820: [mem 0x000000009cfdc000-0x000000009cffffff] reserved Dec 13 02:00:48.870897 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Dec 13 02:00:48.870902 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Dec 13 02:00:48.870909 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Dec 13 02:00:48.870914 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Dec 13 02:00:48.870920 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved Dec 13 02:00:48.870925 kernel: NX (Execute Disable) protection: active Dec 13 02:00:48.870934 kernel: SMBIOS 2.8 present. Dec 13 02:00:48.870940 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Dec 13 02:00:48.870946 kernel: Hypervisor detected: KVM Dec 13 02:00:48.870952 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 02:00:48.870957 kernel: kvm-clock: cpu 0, msr 1d19b001, primary cpu clock Dec 13 02:00:48.870963 kernel: kvm-clock: using sched offset of 2519904171 cycles Dec 13 02:00:48.870970 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 02:00:48.870976 kernel: tsc: Detected 2794.748 MHz processor Dec 13 02:00:48.870982 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 02:00:48.870990 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 02:00:48.870996 kernel: last_pfn = 0x9cfdc max_arch_pfn = 0x400000000 Dec 13 02:00:48.871002 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 02:00:48.871009 kernel: Using GB pages for direct mapping Dec 13 02:00:48.871015 kernel: ACPI: Early table checksum verification disabled Dec 13 02:00:48.871021 kernel: ACPI: RSDP 0x00000000000F59D0 000014 (v00 BOCHS ) Dec 13 02:00:48.871027 kernel: ACPI: RSDT 0x000000009CFE2408 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 02:00:48.871034 kernel: ACPI: FACP 0x000000009CFE21E8 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 02:00:48.871040 kernel: ACPI: DSDT 0x000000009CFE0040 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 02:00:48.871057 kernel: ACPI: FACS 0x000000009CFE0000 000040 Dec 13 02:00:48.871063 kernel: ACPI: APIC 0x000000009CFE22DC 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 02:00:48.871069 kernel: ACPI: HPET 0x000000009CFE236C 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 02:00:48.871075 kernel: ACPI: MCFG 0x000000009CFE23A4 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 02:00:48.871081 kernel: ACPI: WAET 0x000000009CFE23E0 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 02:00:48.871087 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe21e8-0x9cfe22db] Dec 13 02:00:48.871094 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe21e7] Dec 13 02:00:48.871100 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] Dec 13 02:00:48.871110 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe22dc-0x9cfe236b] Dec 13 02:00:48.871116 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe236c-0x9cfe23a3] Dec 13 02:00:48.871123 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cfe23a4-0x9cfe23df] Dec 13 02:00:48.871129 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe23e0-0x9cfe2407] Dec 13 02:00:48.871136 kernel: No NUMA configuration found Dec 13 02:00:48.871142 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdbfff] Dec 13 02:00:48.871150 kernel: NODE_DATA(0) allocated [mem 0x9cfd6000-0x9cfdbfff] Dec 13 02:00:48.871156 kernel: Zone ranges: Dec 13 02:00:48.871163 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 02:00:48.871169 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdbfff] Dec 13 02:00:48.871176 kernel: Normal empty Dec 13 02:00:48.871182 kernel: Movable zone start for each node Dec 13 02:00:48.871189 kernel: Early memory node ranges Dec 13 02:00:48.871195 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Dec 13 02:00:48.871202 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdbfff] Dec 13 02:00:48.871209 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdbfff] Dec 13 02:00:48.871216 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 02:00:48.871222 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Dec 13 02:00:48.871229 kernel: On node 0, zone DMA32: 12324 pages in unavailable ranges Dec 13 02:00:48.871235 kernel: ACPI: PM-Timer IO Port: 0x608 Dec 13 02:00:48.871242 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 02:00:48.871248 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 02:00:48.871255 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 02:00:48.871261 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 02:00:48.871268 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 02:00:48.871275 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 02:00:48.871282 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 02:00:48.871288 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 02:00:48.871295 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Dec 13 02:00:48.871301 kernel: TSC deadline timer available Dec 13 02:00:48.871308 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Dec 13 02:00:48.871314 kernel: kvm-guest: KVM setup pv remote TLB flush Dec 13 02:00:48.871321 kernel: kvm-guest: setup PV sched yield Dec 13 02:00:48.871327 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Dec 13 02:00:48.871335 kernel: Booting paravirtualized kernel on KVM Dec 13 02:00:48.871341 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 02:00:48.871348 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Dec 13 02:00:48.871354 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 Dec 13 02:00:48.871361 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 Dec 13 02:00:48.871367 kernel: pcpu-alloc: [0] 0 1 2 3 Dec 13 02:00:48.871374 kernel: kvm-guest: setup async PF for cpu 0 Dec 13 02:00:48.871380 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c0c0 Dec 13 02:00:48.871387 kernel: kvm-guest: PV spinlocks enabled Dec 13 02:00:48.871394 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 02:00:48.871401 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632732 Dec 13 02:00:48.871407 kernel: Policy zone: DMA32 Dec 13 02:00:48.871415 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:00:48.871422 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 02:00:48.871428 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 02:00:48.871435 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 02:00:48.871441 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 02:00:48.871450 kernel: Memory: 2436696K/2571752K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47476K init, 4108K bss, 134796K reserved, 0K cma-reserved) Dec 13 02:00:48.871456 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Dec 13 02:00:48.871463 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 02:00:48.871469 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 02:00:48.871476 kernel: rcu: Hierarchical RCU implementation. Dec 13 02:00:48.871483 kernel: rcu: RCU event tracing is enabled. Dec 13 02:00:48.871489 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Dec 13 02:00:48.871496 kernel: Rude variant of Tasks RCU enabled. Dec 13 02:00:48.871502 kernel: Tracing variant of Tasks RCU enabled. Dec 13 02:00:48.871510 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 02:00:48.871517 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Dec 13 02:00:48.871530 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Dec 13 02:00:48.871537 kernel: random: crng init done Dec 13 02:00:48.871543 kernel: Console: colour VGA+ 80x25 Dec 13 02:00:48.871549 kernel: printk: console [ttyS0] enabled Dec 13 02:00:48.871556 kernel: ACPI: Core revision 20210730 Dec 13 02:00:48.871562 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Dec 13 02:00:48.871569 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 02:00:48.871577 kernel: x2apic enabled Dec 13 02:00:48.871583 kernel: Switched APIC routing to physical x2apic. Dec 13 02:00:48.871590 kernel: kvm-guest: setup PV IPIs Dec 13 02:00:48.871596 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Dec 13 02:00:48.871603 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Dec 13 02:00:48.871609 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) Dec 13 02:00:48.871616 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Dec 13 02:00:48.871623 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Dec 13 02:00:48.871630 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Dec 13 02:00:48.871642 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 02:00:48.871648 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 02:00:48.871655 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 02:00:48.871663 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 02:00:48.871670 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Dec 13 02:00:48.871677 kernel: RETBleed: Mitigation: untrained return thunk Dec 13 02:00:48.871684 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 02:00:48.871691 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 02:00:48.871698 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 02:00:48.871706 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 02:00:48.871713 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 02:00:48.871720 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 02:00:48.871727 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Dec 13 02:00:48.871733 kernel: Freeing SMP alternatives memory: 32K Dec 13 02:00:48.871740 kernel: pid_max: default: 32768 minimum: 301 Dec 13 02:00:48.871747 kernel: LSM: Security Framework initializing Dec 13 02:00:48.871754 kernel: SELinux: Initializing. Dec 13 02:00:48.871762 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 02:00:48.871769 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 02:00:48.871776 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Dec 13 02:00:48.871783 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Dec 13 02:00:48.871789 kernel: ... version: 0 Dec 13 02:00:48.871796 kernel: ... bit width: 48 Dec 13 02:00:48.871803 kernel: ... generic registers: 6 Dec 13 02:00:48.871810 kernel: ... value mask: 0000ffffffffffff Dec 13 02:00:48.871817 kernel: ... max period: 00007fffffffffff Dec 13 02:00:48.871825 kernel: ... fixed-purpose events: 0 Dec 13 02:00:48.871832 kernel: ... event mask: 000000000000003f Dec 13 02:00:48.871839 kernel: signal: max sigframe size: 1776 Dec 13 02:00:48.871845 kernel: rcu: Hierarchical SRCU implementation. Dec 13 02:00:48.871852 kernel: smp: Bringing up secondary CPUs ... Dec 13 02:00:48.871859 kernel: x86: Booting SMP configuration: Dec 13 02:00:48.871866 kernel: .... node #0, CPUs: #1 Dec 13 02:00:48.871873 kernel: kvm-clock: cpu 1, msr 1d19b041, secondary cpu clock Dec 13 02:00:48.871880 kernel: kvm-guest: setup async PF for cpu 1 Dec 13 02:00:48.871888 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c0c0 Dec 13 02:00:48.871895 kernel: #2 Dec 13 02:00:48.871902 kernel: kvm-clock: cpu 2, msr 1d19b081, secondary cpu clock Dec 13 02:00:48.871909 kernel: kvm-guest: setup async PF for cpu 2 Dec 13 02:00:48.871916 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c0c0 Dec 13 02:00:48.871923 kernel: #3 Dec 13 02:00:48.871929 kernel: kvm-clock: cpu 3, msr 1d19b0c1, secondary cpu clock Dec 13 02:00:48.871936 kernel: kvm-guest: setup async PF for cpu 3 Dec 13 02:00:48.871943 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c0c0 Dec 13 02:00:48.871951 kernel: smp: Brought up 1 node, 4 CPUs Dec 13 02:00:48.871958 kernel: smpboot: Max logical packages: 1 Dec 13 02:00:48.871965 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) Dec 13 02:00:48.871972 kernel: devtmpfs: initialized Dec 13 02:00:48.871978 kernel: x86/mm: Memory block size: 128MB Dec 13 02:00:48.871985 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 02:00:48.871992 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Dec 13 02:00:48.871999 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 02:00:48.872006 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 02:00:48.872014 kernel: audit: initializing netlink subsys (disabled) Dec 13 02:00:48.872022 kernel: audit: type=2000 audit(1734055248.085:1): state=initialized audit_enabled=0 res=1 Dec 13 02:00:48.872028 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 02:00:48.872035 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 02:00:48.872042 kernel: cpuidle: using governor menu Dec 13 02:00:48.872058 kernel: ACPI: bus type PCI registered Dec 13 02:00:48.872065 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 02:00:48.872072 kernel: dca service started, version 1.12.1 Dec 13 02:00:48.872079 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Dec 13 02:00:48.872087 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Dec 13 02:00:48.872094 kernel: PCI: Using configuration type 1 for base access Dec 13 02:00:48.872101 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 02:00:48.872108 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 02:00:48.872115 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 02:00:48.872122 kernel: ACPI: Added _OSI(Module Device) Dec 13 02:00:48.872129 kernel: ACPI: Added _OSI(Processor Device) Dec 13 02:00:48.872136 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 02:00:48.872143 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 02:00:48.872151 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 02:00:48.872158 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 02:00:48.872165 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 02:00:48.872173 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 02:00:48.872180 kernel: ACPI: Interpreter enabled Dec 13 02:00:48.872187 kernel: ACPI: PM: (supports S0 S3 S5) Dec 13 02:00:48.872193 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 02:00:48.872200 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 02:00:48.872207 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Dec 13 02:00:48.872214 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 02:00:48.872334 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 02:00:48.872409 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] Dec 13 02:00:48.872480 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] Dec 13 02:00:48.872489 kernel: PCI host bridge to bus 0000:00 Dec 13 02:00:48.872578 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 02:00:48.874144 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 02:00:48.874214 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 02:00:48.874274 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] Dec 13 02:00:48.874334 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 13 02:00:48.874394 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x8ffffffff window] Dec 13 02:00:48.874455 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 02:00:48.874547 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Dec 13 02:00:48.874647 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 Dec 13 02:00:48.878609 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] Dec 13 02:00:48.878741 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] Dec 13 02:00:48.878837 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] Dec 13 02:00:48.878934 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 02:00:48.879089 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 02:00:48.879193 kernel: pci 0000:00:02.0: reg 0x10: [io 0xc0c0-0xc0df] Dec 13 02:00:48.879301 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] Dec 13 02:00:48.879397 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] Dec 13 02:00:48.879505 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 Dec 13 02:00:48.879615 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc000-0xc07f] Dec 13 02:00:48.879714 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] Dec 13 02:00:48.879813 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] Dec 13 02:00:48.879924 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Dec 13 02:00:48.880030 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc0e0-0xc0ff] Dec 13 02:00:48.880149 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] Dec 13 02:00:48.880247 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] Dec 13 02:00:48.880346 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] Dec 13 02:00:48.880454 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Dec 13 02:00:48.880573 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Dec 13 02:00:48.880678 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Dec 13 02:00:48.880778 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc100-0xc11f] Dec 13 02:00:48.880870 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfebd4000-0xfebd4fff] Dec 13 02:00:48.880975 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Dec 13 02:00:48.881085 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Dec 13 02:00:48.881099 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 02:00:48.881109 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 02:00:48.881119 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 02:00:48.881131 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 02:00:48.881141 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Dec 13 02:00:48.881150 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Dec 13 02:00:48.881160 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Dec 13 02:00:48.881169 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Dec 13 02:00:48.881179 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Dec 13 02:00:48.881188 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Dec 13 02:00:48.881197 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Dec 13 02:00:48.881207 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Dec 13 02:00:48.881219 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Dec 13 02:00:48.881229 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Dec 13 02:00:48.881238 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Dec 13 02:00:48.881248 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Dec 13 02:00:48.881285 kernel: iommu: Default domain type: Translated Dec 13 02:00:48.881304 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 02:00:48.881407 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Dec 13 02:00:48.881504 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 02:00:48.881721 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Dec 13 02:00:48.881772 kernel: vgaarb: loaded Dec 13 02:00:48.881781 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 02:00:48.881789 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 02:00:48.881796 kernel: PTP clock support registered Dec 13 02:00:48.881804 kernel: PCI: Using ACPI for IRQ routing Dec 13 02:00:48.881813 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 02:00:48.881822 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Dec 13 02:00:48.881831 kernel: e820: reserve RAM buffer [mem 0x9cfdc000-0x9fffffff] Dec 13 02:00:48.881840 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Dec 13 02:00:48.881852 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Dec 13 02:00:48.881862 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 02:00:48.881871 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 02:00:48.881882 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 02:00:48.881891 kernel: pnp: PnP ACPI init Dec 13 02:00:48.881992 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved Dec 13 02:00:48.882004 kernel: pnp: PnP ACPI: found 6 devices Dec 13 02:00:48.882012 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 02:00:48.882022 kernel: NET: Registered PF_INET protocol family Dec 13 02:00:48.882029 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 02:00:48.882037 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Dec 13 02:00:48.882058 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 02:00:48.882067 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 02:00:48.882075 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Dec 13 02:00:48.882083 kernel: TCP: Hash tables configured (established 32768 bind 32768) Dec 13 02:00:48.882090 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 02:00:48.882098 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 02:00:48.882108 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 02:00:48.882117 kernel: NET: Registered PF_XDP protocol family Dec 13 02:00:48.882206 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 02:00:48.882271 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 02:00:48.882332 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 02:00:48.882394 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] Dec 13 02:00:48.882455 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Dec 13 02:00:48.882516 kernel: pci_bus 0000:00: resource 9 [mem 0x100000000-0x8ffffffff window] Dec 13 02:00:48.882541 kernel: PCI: CLS 0 bytes, default 64 Dec 13 02:00:48.882548 kernel: Initialise system trusted keyrings Dec 13 02:00:48.882556 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Dec 13 02:00:48.882563 kernel: Key type asymmetric registered Dec 13 02:00:48.882570 kernel: Asymmetric key parser 'x509' registered Dec 13 02:00:48.882578 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 02:00:48.882585 kernel: io scheduler mq-deadline registered Dec 13 02:00:48.882592 kernel: io scheduler kyber registered Dec 13 02:00:48.882600 kernel: io scheduler bfq registered Dec 13 02:00:48.882609 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 02:00:48.882617 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Dec 13 02:00:48.882625 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Dec 13 02:00:48.882632 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Dec 13 02:00:48.882640 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 02:00:48.882647 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 02:00:48.882656 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 02:00:48.882663 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 02:00:48.882670 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 02:00:48.882748 kernel: rtc_cmos 00:04: RTC can wake from S4 Dec 13 02:00:48.882759 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 02:00:48.882824 kernel: rtc_cmos 00:04: registered as rtc0 Dec 13 02:00:48.882899 kernel: rtc_cmos 00:04: setting system clock to 2024-12-13T02:00:48 UTC (1734055248) Dec 13 02:00:48.882985 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Dec 13 02:00:48.882999 kernel: NET: Registered PF_INET6 protocol family Dec 13 02:00:48.883009 kernel: Segment Routing with IPv6 Dec 13 02:00:48.883018 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 02:00:48.883031 kernel: NET: Registered PF_PACKET protocol family Dec 13 02:00:48.883040 kernel: Key type dns_resolver registered Dec 13 02:00:48.883061 kernel: IPI shorthand broadcast: enabled Dec 13 02:00:48.883068 kernel: sched_clock: Marking stable (421254945, 107608331)->(580654154, -51790878) Dec 13 02:00:48.883075 kernel: registered taskstats version 1 Dec 13 02:00:48.883082 kernel: Loading compiled-in X.509 certificates Dec 13 02:00:48.883090 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: d9defb0205602bee9bb670636cbe5c74194fdb5e' Dec 13 02:00:48.883098 kernel: Key type .fscrypt registered Dec 13 02:00:48.883105 kernel: Key type fscrypt-provisioning registered Dec 13 02:00:48.883115 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 02:00:48.883122 kernel: ima: Allocated hash algorithm: sha1 Dec 13 02:00:48.883129 kernel: ima: No architecture policies found Dec 13 02:00:48.883137 kernel: clk: Disabling unused clocks Dec 13 02:00:48.883144 kernel: Freeing unused kernel image (initmem) memory: 47476K Dec 13 02:00:48.883152 kernel: Write protecting the kernel read-only data: 28672k Dec 13 02:00:48.883160 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 02:00:48.883167 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 02:00:48.883175 kernel: Run /init as init process Dec 13 02:00:48.883184 kernel: with arguments: Dec 13 02:00:48.883191 kernel: /init Dec 13 02:00:48.883198 kernel: with environment: Dec 13 02:00:48.883205 kernel: HOME=/ Dec 13 02:00:48.883213 kernel: TERM=linux Dec 13 02:00:48.883220 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 02:00:48.883231 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 02:00:48.883241 systemd[1]: Detected virtualization kvm. Dec 13 02:00:48.883251 systemd[1]: Detected architecture x86-64. Dec 13 02:00:48.883259 systemd[1]: Running in initrd. Dec 13 02:00:48.883266 systemd[1]: No hostname configured, using default hostname. Dec 13 02:00:48.883274 systemd[1]: Hostname set to . Dec 13 02:00:48.883282 systemd[1]: Initializing machine ID from VM UUID. Dec 13 02:00:48.883290 systemd[1]: Queued start job for default target initrd.target. Dec 13 02:00:48.883298 systemd[1]: Started systemd-ask-password-console.path. Dec 13 02:00:48.883306 systemd[1]: Reached target cryptsetup.target. Dec 13 02:00:48.883315 systemd[1]: Reached target paths.target. Dec 13 02:00:48.883331 systemd[1]: Reached target slices.target. Dec 13 02:00:48.883341 systemd[1]: Reached target swap.target. Dec 13 02:00:48.883349 systemd[1]: Reached target timers.target. Dec 13 02:00:48.883357 systemd[1]: Listening on iscsid.socket. Dec 13 02:00:48.883367 systemd[1]: Listening on iscsiuio.socket. Dec 13 02:00:48.883375 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 02:00:48.883383 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 02:00:48.883391 systemd[1]: Listening on systemd-journald.socket. Dec 13 02:00:48.883398 systemd[1]: Listening on systemd-networkd.socket. Dec 13 02:00:48.883406 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 02:00:48.883415 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 02:00:48.883423 systemd[1]: Reached target sockets.target. Dec 13 02:00:48.883431 systemd[1]: Starting kmod-static-nodes.service... Dec 13 02:00:48.883441 systemd[1]: Finished network-cleanup.service. Dec 13 02:00:48.883449 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 02:00:48.883457 systemd[1]: Starting systemd-journald.service... Dec 13 02:00:48.883465 systemd[1]: Starting systemd-modules-load.service... Dec 13 02:00:48.883473 systemd[1]: Starting systemd-resolved.service... Dec 13 02:00:48.883481 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 02:00:48.883489 systemd[1]: Finished kmod-static-nodes.service. Dec 13 02:00:48.883497 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 02:00:48.883506 kernel: audit: type=1130 audit(1734055248.869:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:48.883516 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 02:00:48.883535 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 02:00:48.883549 systemd-journald[198]: Journal started Dec 13 02:00:48.883603 systemd-journald[198]: Runtime Journal (/run/log/journal/62d2a16fe57b47ef84bf26d77b2e04f1) is 6.0M, max 48.5M, 42.5M free. Dec 13 02:00:48.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:48.878313 systemd-modules-load[199]: Inserted module 'overlay' Dec 13 02:00:48.921500 kernel: audit: type=1130 audit(1734055248.913:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:48.921550 systemd[1]: Started systemd-journald.service. Dec 13 02:00:48.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:48.909790 systemd-resolved[200]: Positive Trust Anchors: Dec 13 02:00:48.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:48.909800 systemd-resolved[200]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 02:00:48.909837 systemd-resolved[200]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 02:00:48.931344 kernel: audit: type=1130 audit(1734055248.922:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:48.916507 systemd-resolved[200]: Defaulting to hostname 'linux'. Dec 13 02:00:48.926694 systemd[1]: Started systemd-resolved.service. Dec 13 02:00:48.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:48.942071 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 02:00:48.950131 kernel: audit: type=1130 audit(1734055248.941:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:48.950161 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 02:00:48.950175 kernel: audit: type=1130 audit(1734055248.950:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:48.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:48.950356 systemd[1]: Reached target nss-lookup.target. Dec 13 02:00:48.956900 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 02:00:48.959394 kernel: Bridge firewalling registered Dec 13 02:00:48.958573 systemd-modules-load[199]: Inserted module 'br_netfilter' Dec 13 02:00:48.984855 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 02:00:48.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:48.989368 systemd[1]: Starting dracut-cmdline.service... Dec 13 02:00:48.995608 kernel: audit: type=1130 audit(1734055248.986:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:49.008104 kernel: SCSI subsystem initialized Dec 13 02:00:49.023848 dracut-cmdline[216]: dracut-dracut-053 Dec 13 02:00:49.026267 dracut-cmdline[216]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 02:00:49.041178 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 02:00:49.041250 kernel: device-mapper: uevent: version 1.0.3 Dec 13 02:00:49.046267 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 02:00:49.054673 systemd-modules-load[199]: Inserted module 'dm_multipath' Dec 13 02:00:49.055545 systemd[1]: Finished systemd-modules-load.service. Dec 13 02:00:49.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:49.059067 systemd[1]: Starting systemd-sysctl.service... Dec 13 02:00:49.063270 kernel: audit: type=1130 audit(1734055249.057:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:49.069558 systemd[1]: Finished systemd-sysctl.service. Dec 13 02:00:49.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:49.075213 kernel: audit: type=1130 audit(1734055249.071:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:49.109089 kernel: Loading iSCSI transport class v2.0-870. Dec 13 02:00:49.128123 kernel: iscsi: registered transport (tcp) Dec 13 02:00:49.155223 kernel: iscsi: registered transport (qla4xxx) Dec 13 02:00:49.155311 kernel: QLogic iSCSI HBA Driver Dec 13 02:00:49.181980 systemd[1]: Finished dracut-cmdline.service. Dec 13 02:00:49.188329 kernel: audit: type=1130 audit(1734055249.183:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:49.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:49.184264 systemd[1]: Starting dracut-pre-udev.service... Dec 13 02:00:49.234131 kernel: raid6: avx2x4 gen() 19072 MB/s Dec 13 02:00:49.251219 kernel: raid6: avx2x4 xor() 5423 MB/s Dec 13 02:00:49.268101 kernel: raid6: avx2x2 gen() 19256 MB/s Dec 13 02:00:49.285091 kernel: raid6: avx2x2 xor() 16754 MB/s Dec 13 02:00:49.302078 kernel: raid6: avx2x1 gen() 26154 MB/s Dec 13 02:00:49.319074 kernel: raid6: avx2x1 xor() 15218 MB/s Dec 13 02:00:49.336078 kernel: raid6: sse2x4 gen() 14670 MB/s Dec 13 02:00:49.353081 kernel: raid6: sse2x4 xor() 6791 MB/s Dec 13 02:00:49.370076 kernel: raid6: sse2x2 gen() 16176 MB/s Dec 13 02:00:49.387102 kernel: raid6: sse2x2 xor() 9760 MB/s Dec 13 02:00:49.404096 kernel: raid6: sse2x1 gen() 11733 MB/s Dec 13 02:00:49.421484 kernel: raid6: sse2x1 xor() 7753 MB/s Dec 13 02:00:49.421531 kernel: raid6: using algorithm avx2x1 gen() 26154 MB/s Dec 13 02:00:49.421545 kernel: raid6: .... xor() 15218 MB/s, rmw enabled Dec 13 02:00:49.422210 kernel: raid6: using avx2x2 recovery algorithm Dec 13 02:00:49.441072 kernel: xor: automatically using best checksumming function avx Dec 13 02:00:49.533092 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 02:00:49.542030 systemd[1]: Finished dracut-pre-udev.service. Dec 13 02:00:49.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:49.543000 audit: BPF prog-id=7 op=LOAD Dec 13 02:00:49.543000 audit: BPF prog-id=8 op=LOAD Dec 13 02:00:49.544197 systemd[1]: Starting systemd-udevd.service... Dec 13 02:00:49.557121 systemd-udevd[401]: Using default interface naming scheme 'v252'. Dec 13 02:00:49.561906 systemd[1]: Started systemd-udevd.service. Dec 13 02:00:49.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:49.562873 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 02:00:49.574122 dracut-pre-trigger[402]: rd.md=0: removing MD RAID activation Dec 13 02:00:49.606183 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 02:00:49.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:49.607588 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 02:00:49.652872 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 02:00:49.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:49.690336 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Dec 13 02:00:49.712011 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 02:00:49.712032 kernel: GPT:9289727 != 19775487 Dec 13 02:00:49.712045 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 02:00:49.712076 kernel: GPT:9289727 != 19775487 Dec 13 02:00:49.712088 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 02:00:49.712100 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 02:00:49.712117 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 02:00:49.728073 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 02:00:49.728135 kernel: AES CTR mode by8 optimization enabled Dec 13 02:00:49.728149 kernel: libata version 3.00 loaded. Dec 13 02:00:49.740081 kernel: ahci 0000:00:1f.2: version 3.0 Dec 13 02:00:49.756976 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Dec 13 02:00:49.757000 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Dec 13 02:00:49.757148 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Dec 13 02:00:49.757246 kernel: scsi host0: ahci Dec 13 02:00:49.757343 kernel: scsi host1: ahci Dec 13 02:00:49.757429 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (459) Dec 13 02:00:49.757439 kernel: scsi host2: ahci Dec 13 02:00:49.757572 kernel: scsi host3: ahci Dec 13 02:00:49.757679 kernel: scsi host4: ahci Dec 13 02:00:49.757785 kernel: scsi host5: ahci Dec 13 02:00:49.757874 kernel: ata1: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4100 irq 34 Dec 13 02:00:49.757885 kernel: ata2: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4180 irq 34 Dec 13 02:00:49.757894 kernel: ata3: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4200 irq 34 Dec 13 02:00:49.757903 kernel: ata4: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4280 irq 34 Dec 13 02:00:49.757911 kernel: ata5: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4300 irq 34 Dec 13 02:00:49.757920 kernel: ata6: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4380 irq 34 Dec 13 02:00:49.754681 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 02:00:49.778135 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 02:00:49.788771 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 02:00:49.793256 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 02:00:49.797827 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 02:00:49.799825 systemd[1]: Starting disk-uuid.service... Dec 13 02:00:49.809780 disk-uuid[530]: Primary Header is updated. Dec 13 02:00:49.809780 disk-uuid[530]: Secondary Entries is updated. Dec 13 02:00:49.809780 disk-uuid[530]: Secondary Header is updated. Dec 13 02:00:49.814060 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 02:00:49.817075 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 02:00:49.820064 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 02:00:50.064079 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) Dec 13 02:00:50.065094 kernel: ata4: SATA link down (SStatus 0 SControl 300) Dec 13 02:00:50.067109 kernel: ata1: SATA link down (SStatus 0 SControl 300) Dec 13 02:00:50.067180 kernel: ata2: SATA link down (SStatus 0 SControl 300) Dec 13 02:00:50.067190 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Dec 13 02:00:50.068506 kernel: ata3.00: applying bridge limits Dec 13 02:00:50.069227 kernel: ata3.00: configured for UDMA/100 Dec 13 02:00:50.070065 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Dec 13 02:00:50.075067 kernel: ata6: SATA link down (SStatus 0 SControl 300) Dec 13 02:00:50.075088 kernel: ata5: SATA link down (SStatus 0 SControl 300) Dec 13 02:00:50.109074 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Dec 13 02:00:50.125547 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 02:00:50.125564 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Dec 13 02:00:50.820883 disk-uuid[531]: The operation has completed successfully. Dec 13 02:00:50.822018 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 02:00:50.840608 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 02:00:50.840704 systemd[1]: Finished disk-uuid.service. Dec 13 02:00:50.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:50.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:50.858969 systemd[1]: Starting verity-setup.service... Dec 13 02:00:50.872065 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Dec 13 02:00:50.889273 systemd[1]: Found device dev-mapper-usr.device. Dec 13 02:00:50.890749 systemd[1]: Mounting sysusr-usr.mount... Dec 13 02:00:50.892959 systemd[1]: Finished verity-setup.service. Dec 13 02:00:50.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:50.960971 systemd[1]: Mounted sysusr-usr.mount. Dec 13 02:00:50.962480 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 02:00:50.961592 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 02:00:50.962359 systemd[1]: Starting ignition-setup.service... Dec 13 02:00:50.963432 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 02:00:50.971257 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:00:50.971286 kernel: BTRFS info (device vda6): using free space tree Dec 13 02:00:50.971299 kernel: BTRFS info (device vda6): has skinny extents Dec 13 02:00:50.978645 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 02:00:50.985923 systemd[1]: Finished ignition-setup.service. Dec 13 02:00:50.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:50.988670 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 02:00:51.021342 ignition[647]: Ignition 2.14.0 Dec 13 02:00:51.021352 ignition[647]: Stage: fetch-offline Dec 13 02:00:51.021392 ignition[647]: no configs at "/usr/lib/ignition/base.d" Dec 13 02:00:51.021399 ignition[647]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 02:00:51.021493 ignition[647]: parsed url from cmdline: "" Dec 13 02:00:51.021496 ignition[647]: no config URL provided Dec 13 02:00:51.021501 ignition[647]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 02:00:51.025427 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 02:00:51.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:51.027000 audit: BPF prog-id=9 op=LOAD Dec 13 02:00:51.021508 ignition[647]: no config at "/usr/lib/ignition/user.ign" Dec 13 02:00:51.028503 systemd[1]: Starting systemd-networkd.service... Dec 13 02:00:51.021528 ignition[647]: op(1): [started] loading QEMU firmware config module Dec 13 02:00:51.021533 ignition[647]: op(1): executing: "modprobe" "qemu_fw_cfg" Dec 13 02:00:51.032102 ignition[647]: op(1): [finished] loading QEMU firmware config module Dec 13 02:00:51.048520 systemd-networkd[722]: lo: Link UP Dec 13 02:00:51.048528 systemd-networkd[722]: lo: Gained carrier Dec 13 02:00:51.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:51.049154 systemd-networkd[722]: Enumeration completed Dec 13 02:00:51.049238 systemd[1]: Started systemd-networkd.service. Dec 13 02:00:51.049632 systemd-networkd[722]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 02:00:51.050665 systemd[1]: Reached target network.target. Dec 13 02:00:51.051647 systemd-networkd[722]: eth0: Link UP Dec 13 02:00:51.051651 systemd-networkd[722]: eth0: Gained carrier Dec 13 02:00:51.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:51.052911 systemd[1]: Starting iscsiuio.service... Dec 13 02:00:51.057510 systemd[1]: Started iscsiuio.service. Dec 13 02:00:51.059758 systemd[1]: Starting iscsid.service... Dec 13 02:00:51.062915 iscsid[727]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 02:00:51.062915 iscsid[727]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 02:00:51.062915 iscsid[727]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 02:00:51.062915 iscsid[727]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 02:00:51.062915 iscsid[727]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 02:00:51.062915 iscsid[727]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 02:00:51.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:51.063557 systemd[1]: Started iscsid.service. Dec 13 02:00:51.065779 systemd[1]: Starting dracut-initqueue.service... Dec 13 02:00:51.080010 systemd[1]: Finished dracut-initqueue.service. Dec 13 02:00:51.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:51.081810 systemd[1]: Reached target remote-fs-pre.target. Dec 13 02:00:51.083568 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 02:00:51.085400 systemd[1]: Reached target remote-fs.target. Dec 13 02:00:51.087578 systemd[1]: Starting dracut-pre-mount.service... Dec 13 02:00:51.094018 systemd[1]: Finished dracut-pre-mount.service. Dec 13 02:00:51.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:51.109407 ignition[647]: parsing config with SHA512: 5c8f0795196e0b6298ad2f9d7c3e0664eb3f787f54ae55cc231502b3ab1f19b10586b474b9a33583df687bc43fc0d2348a7ff02df03dbdf34852fb6834900bde Dec 13 02:00:51.116030 unknown[647]: fetched base config from "system" Dec 13 02:00:51.116627 unknown[647]: fetched user config from "qemu" Dec 13 02:00:51.117219 ignition[647]: fetch-offline: fetch-offline passed Dec 13 02:00:51.117278 ignition[647]: Ignition finished successfully Dec 13 02:00:51.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:51.118270 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 02:00:51.119132 systemd-networkd[722]: eth0: DHCPv4 address 10.0.0.73/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 02:00:51.119662 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 02:00:51.120507 systemd[1]: Starting ignition-kargs.service... Dec 13 02:00:51.129429 ignition[742]: Ignition 2.14.0 Dec 13 02:00:51.129437 ignition[742]: Stage: kargs Dec 13 02:00:51.129524 ignition[742]: no configs at "/usr/lib/ignition/base.d" Dec 13 02:00:51.129531 ignition[742]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 02:00:51.131860 systemd[1]: Finished ignition-kargs.service. Dec 13 02:00:51.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:51.130381 ignition[742]: kargs: kargs passed Dec 13 02:00:51.130414 ignition[742]: Ignition finished successfully Dec 13 02:00:51.134419 systemd[1]: Starting ignition-disks.service... Dec 13 02:00:51.141146 ignition[748]: Ignition 2.14.0 Dec 13 02:00:51.141156 ignition[748]: Stage: disks Dec 13 02:00:51.141253 ignition[748]: no configs at "/usr/lib/ignition/base.d" Dec 13 02:00:51.141263 ignition[748]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 02:00:51.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:51.143043 systemd[1]: Finished ignition-disks.service. Dec 13 02:00:51.142400 ignition[748]: disks: disks passed Dec 13 02:00:51.144244 systemd[1]: Reached target initrd-root-device.target. Dec 13 02:00:51.142436 ignition[748]: Ignition finished successfully Dec 13 02:00:51.146022 systemd[1]: Reached target local-fs-pre.target. Dec 13 02:00:51.146848 systemd[1]: Reached target local-fs.target. Dec 13 02:00:51.148330 systemd[1]: Reached target sysinit.target. Dec 13 02:00:51.149113 systemd[1]: Reached target basic.target. Dec 13 02:00:51.151133 systemd[1]: Starting systemd-fsck-root.service... Dec 13 02:00:51.160899 systemd-fsck[756]: ROOT: clean, 621/553520 files, 56021/553472 blocks Dec 13 02:00:51.166310 systemd[1]: Finished systemd-fsck-root.service. Dec 13 02:00:51.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:51.167577 systemd[1]: Mounting sysroot.mount... Dec 13 02:00:51.173969 systemd[1]: Mounted sysroot.mount. Dec 13 02:00:51.176350 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 02:00:51.174779 systemd[1]: Reached target initrd-root-fs.target. Dec 13 02:00:51.177278 systemd[1]: Mounting sysroot-usr.mount... Dec 13 02:00:51.178446 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 02:00:51.178493 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 02:00:51.178516 systemd[1]: Reached target ignition-diskful.target. Dec 13 02:00:51.180693 systemd[1]: Mounted sysroot-usr.mount. Dec 13 02:00:51.182911 systemd[1]: Starting initrd-setup-root.service... Dec 13 02:00:51.187987 initrd-setup-root[766]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 02:00:51.189329 initrd-setup-root[774]: cut: /sysroot/etc/group: No such file or directory Dec 13 02:00:51.191821 initrd-setup-root[782]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 02:00:51.194316 initrd-setup-root[790]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 02:00:51.215355 systemd[1]: Finished initrd-setup-root.service. Dec 13 02:00:51.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:51.216296 systemd[1]: Starting ignition-mount.service... Dec 13 02:00:51.218063 systemd[1]: Starting sysroot-boot.service... Dec 13 02:00:51.221656 bash[807]: umount: /sysroot/usr/share/oem: not mounted. Dec 13 02:00:51.229180 ignition[808]: INFO : Ignition 2.14.0 Dec 13 02:00:51.229180 ignition[808]: INFO : Stage: mount Dec 13 02:00:51.231034 ignition[808]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 02:00:51.231034 ignition[808]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 02:00:51.231034 ignition[808]: INFO : mount: mount passed Dec 13 02:00:51.231034 ignition[808]: INFO : Ignition finished successfully Dec 13 02:00:51.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:51.230929 systemd[1]: Finished ignition-mount.service. Dec 13 02:00:51.240941 systemd[1]: Finished sysroot-boot.service. Dec 13 02:00:51.241000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:51.900175 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 02:00:51.906877 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (817) Dec 13 02:00:51.906908 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 02:00:51.906921 kernel: BTRFS info (device vda6): using free space tree Dec 13 02:00:51.907725 kernel: BTRFS info (device vda6): has skinny extents Dec 13 02:00:51.911276 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 02:00:51.912069 systemd[1]: Starting ignition-files.service... Dec 13 02:00:51.923972 ignition[837]: INFO : Ignition 2.14.0 Dec 13 02:00:51.923972 ignition[837]: INFO : Stage: files Dec 13 02:00:51.925878 ignition[837]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 02:00:51.925878 ignition[837]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 02:00:51.925878 ignition[837]: DEBUG : files: compiled without relabeling support, skipping Dec 13 02:00:51.925878 ignition[837]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 02:00:51.925878 ignition[837]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 02:00:51.932734 ignition[837]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 02:00:51.932734 ignition[837]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 02:00:51.932734 ignition[837]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 02:00:51.932734 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 02:00:51.932734 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 02:00:51.927614 unknown[837]: wrote ssh authorized keys file for user: core Dec 13 02:00:51.977175 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 13 02:00:52.051839 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 02:00:52.051839 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 02:00:52.056030 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 02:00:52.056030 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 02:00:52.056030 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 02:00:52.056030 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 02:00:52.056030 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 02:00:52.056030 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 02:00:52.056030 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 02:00:52.056030 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 02:00:52.056030 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 02:00:52.056030 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 02:00:52.056030 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 02:00:52.056030 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 02:00:52.056030 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-x86-64.raw: attempt #1 Dec 13 02:00:52.249176 systemd-networkd[722]: eth0: Gained IPv6LL Dec 13 02:00:52.443912 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Dec 13 02:00:52.872373 ignition[837]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 02:00:52.872373 ignition[837]: INFO : files: op(b): [started] processing unit "prepare-helm.service" Dec 13 02:00:52.877161 ignition[837]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 02:00:52.877161 ignition[837]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 02:00:52.877161 ignition[837]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" Dec 13 02:00:52.877161 ignition[837]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" Dec 13 02:00:52.877161 ignition[837]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 02:00:52.877161 ignition[837]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 02:00:52.877161 ignition[837]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" Dec 13 02:00:52.877161 ignition[837]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" Dec 13 02:00:52.877161 ignition[837]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 02:00:52.877161 ignition[837]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" Dec 13 02:00:52.877161 ignition[837]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 02:00:52.899749 ignition[837]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 02:00:52.902468 ignition[837]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" Dec 13 02:00:52.902468 ignition[837]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 02:00:52.902468 ignition[837]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 02:00:52.902468 ignition[837]: INFO : files: files passed Dec 13 02:00:52.902468 ignition[837]: INFO : Ignition finished successfully Dec 13 02:00:52.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:52.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:52.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:52.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:52.900979 systemd[1]: Finished ignition-files.service. Dec 13 02:00:52.903247 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 02:00:52.904971 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 02:00:52.919561 initrd-setup-root-after-ignition[863]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Dec 13 02:00:52.905593 systemd[1]: Starting ignition-quench.service... Dec 13 02:00:52.922482 initrd-setup-root-after-ignition[865]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 02:00:52.907993 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 02:00:52.908091 systemd[1]: Finished ignition-quench.service. Dec 13 02:00:52.910636 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 02:00:52.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:52.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:52.912312 systemd[1]: Reached target ignition-complete.target. Dec 13 02:00:52.914437 systemd[1]: Starting initrd-parse-etc.service... Dec 13 02:00:52.926265 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 02:00:52.926334 systemd[1]: Finished initrd-parse-etc.service. Dec 13 02:00:52.927248 systemd[1]: Reached target initrd-fs.target. Dec 13 02:00:52.928871 systemd[1]: Reached target initrd.target. Dec 13 02:00:52.929639 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 02:00:52.930165 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 02:00:52.938973 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 02:00:52.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:52.940349 systemd[1]: Starting initrd-cleanup.service... Dec 13 02:00:52.948260 systemd[1]: Stopped target nss-lookup.target. Dec 13 02:00:52.949166 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 02:00:52.950751 systemd[1]: Stopped target timers.target. Dec 13 02:00:52.952351 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 02:00:52.953000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:52.952446 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 02:00:52.953937 systemd[1]: Stopped target initrd.target. Dec 13 02:00:52.955561 systemd[1]: Stopped target basic.target. Dec 13 02:00:52.957121 systemd[1]: Stopped target ignition-complete.target. Dec 13 02:00:52.958642 systemd[1]: Stopped target ignition-diskful.target. Dec 13 02:00:52.960215 systemd[1]: Stopped target initrd-root-device.target. Dec 13 02:00:52.961915 systemd[1]: Stopped target remote-fs.target. Dec 13 02:00:52.963545 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 02:00:52.965206 systemd[1]: Stopped target sysinit.target. Dec 13 02:00:52.966732 systemd[1]: Stopped target local-fs.target. Dec 13 02:00:52.968275 systemd[1]: Stopped target local-fs-pre.target. Dec 13 02:00:52.969800 systemd[1]: Stopped target swap.target. Dec 13 02:00:52.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:52.971226 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 02:00:52.971310 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 02:00:52.975000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:52.972868 systemd[1]: Stopped target cryptsetup.target. Dec 13 02:00:52.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:52.974269 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 02:00:52.974349 systemd[1]: Stopped dracut-initqueue.service. Dec 13 02:00:52.976095 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 02:00:52.976180 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 02:00:52.977819 systemd[1]: Stopped target paths.target. Dec 13 02:00:52.979418 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 02:00:52.984086 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 02:00:52.986018 systemd[1]: Stopped target slices.target. Dec 13 02:00:52.987782 systemd[1]: Stopped target sockets.target. Dec 13 02:00:52.989427 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 02:00:52.991000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:52.989556 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 02:00:52.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:52.991338 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 02:00:52.997184 iscsid[727]: iscsid shutting down. Dec 13 02:00:52.991463 systemd[1]: Stopped ignition-files.service. Dec 13 02:00:52.998000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:52.994346 systemd[1]: Stopping ignition-mount.service... Dec 13 02:00:52.995493 systemd[1]: Stopping iscsid.service... Dec 13 02:00:53.002691 ignition[878]: INFO : Ignition 2.14.0 Dec 13 02:00:53.002691 ignition[878]: INFO : Stage: umount Dec 13 02:00:53.002691 ignition[878]: INFO : no configs at "/usr/lib/ignition/base.d" Dec 13 02:00:53.002691 ignition[878]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Dec 13 02:00:53.002691 ignition[878]: INFO : umount: umount passed Dec 13 02:00:53.002691 ignition[878]: INFO : Ignition finished successfully Dec 13 02:00:53.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:53.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:53.007000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:53.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:53.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:53.013000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:52.997212 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 02:00:53.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:52.997625 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 02:00:52.999968 systemd[1]: Stopping sysroot-boot.service... Dec 13 02:00:53.001189 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 02:00:53.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:53.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:53.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:53.001330 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 02:00:53.002853 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 02:00:53.002963 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 02:00:53.005899 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 02:00:53.005983 systemd[1]: Stopped iscsid.service. Dec 13 02:00:53.007372 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 02:00:53.007444 systemd[1]: Stopped ignition-mount.service. Dec 13 02:00:53.009368 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 02:00:53.009442 systemd[1]: Closed iscsid.socket. Dec 13 02:00:53.010536 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 02:00:53.031000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:53.010568 systemd[1]: Stopped ignition-disks.service. Dec 13 02:00:53.012223 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 02:00:53.012252 systemd[1]: Stopped ignition-kargs.service. Dec 13 02:00:53.037000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:53.013096 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 02:00:53.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:53.013125 systemd[1]: Stopped ignition-setup.service. Dec 13 02:00:53.041000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:53.015152 systemd[1]: Stopping iscsiuio.service... Dec 13 02:00:53.016279 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 02:00:53.016712 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 02:00:53.016779 systemd[1]: Finished initrd-cleanup.service. Dec 13 02:00:53.018370 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 02:00:53.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:53.018443 systemd[1]: Stopped iscsiuio.service. Dec 13 02:00:53.020723 systemd[1]: Stopped target network.target. Dec 13 02:00:53.021619 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 02:00:53.021647 systemd[1]: Closed iscsiuio.socket. Dec 13 02:00:53.050000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:53.023450 systemd[1]: Stopping systemd-networkd.service... Dec 13 02:00:53.052000 audit: BPF prog-id=6 op=UNLOAD Dec 13 02:00:53.025011 systemd[1]: Stopping systemd-resolved.service... Dec 13 02:00:53.029092 systemd-networkd[722]: eth0: DHCPv6 lease lost Dec 13 02:00:53.054000 audit: BPF prog-id=9 op=UNLOAD Dec 13 02:00:53.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:53.057000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:53.030113 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 02:00:53.059000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:53.030213 systemd[1]: Stopped systemd-networkd.service. Dec 13 02:00:53.032739 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 02:00:53.032770 systemd[1]: Closed systemd-networkd.socket. Dec 13 02:00:53.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:53.034896 systemd[1]: Stopping network-cleanup.service... Dec 13 02:00:53.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:53.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:53.066000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:53.035973 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 02:00:53.036010 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 02:00:53.037592 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 02:00:53.037630 systemd[1]: Stopped systemd-sysctl.service. Dec 13 02:00:53.039503 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 02:00:53.039534 systemd[1]: Stopped systemd-modules-load.service. Dec 13 02:00:53.041297 systemd[1]: Stopping systemd-udevd.service... Dec 13 02:00:53.044497 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 02:00:53.044873 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 02:00:53.044946 systemd[1]: Stopped systemd-resolved.service. Dec 13 02:00:53.049312 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 02:00:53.049441 systemd[1]: Stopped systemd-udevd.service. Dec 13 02:00:53.052302 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 02:00:53.052341 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 02:00:53.053251 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 02:00:53.053275 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 02:00:53.054838 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 02:00:53.054869 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 02:00:53.055827 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 02:00:53.055856 systemd[1]: Stopped dracut-cmdline.service. Dec 13 02:00:53.057560 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 02:00:53.057623 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 02:00:53.060147 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 02:00:53.061112 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 02:00:53.061153 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 02:00:53.063221 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 02:00:53.063306 systemd[1]: Stopped network-cleanup.service. Dec 13 02:00:53.064679 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 02:00:53.064742 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 02:00:53.102306 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 02:00:53.102419 systemd[1]: Stopped sysroot-boot.service. Dec 13 02:00:53.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:53.104315 systemd[1]: Reached target initrd-switch-root.target. Dec 13 02:00:53.106000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:53.105757 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 02:00:53.105800 systemd[1]: Stopped initrd-setup-root.service. Dec 13 02:00:53.107279 systemd[1]: Starting initrd-switch-root.service... Dec 13 02:00:53.123485 systemd[1]: Switching root. Dec 13 02:00:53.142862 systemd-journald[198]: Journal stopped Dec 13 02:00:55.880548 systemd-journald[198]: Received SIGTERM from PID 1 (systemd). Dec 13 02:00:55.880606 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 02:00:55.880625 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 02:00:55.880639 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 02:00:55.880651 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 02:00:55.880662 kernel: SELinux: policy capability open_perms=1 Dec 13 02:00:55.880675 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 02:00:55.880687 kernel: SELinux: policy capability always_check_network=0 Dec 13 02:00:55.880698 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 02:00:55.880713 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 02:00:55.880730 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 02:00:55.880742 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 02:00:55.880754 kernel: kauditd_printk_skb: 65 callbacks suppressed Dec 13 02:00:55.880773 kernel: audit: type=1403 audit(1734055253.204:76): auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 02:00:55.880787 systemd[1]: Successfully loaded SELinux policy in 39.854ms. Dec 13 02:00:55.880809 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.068ms. Dec 13 02:00:55.880825 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 02:00:55.880837 systemd[1]: Detected virtualization kvm. Dec 13 02:00:55.880850 systemd[1]: Detected architecture x86-64. Dec 13 02:00:55.880864 systemd[1]: Detected first boot. Dec 13 02:00:55.880880 systemd[1]: Initializing machine ID from VM UUID. Dec 13 02:00:55.880893 kernel: audit: type=1400 audit(1734055253.474:77): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 02:00:55.880909 kernel: audit: type=1400 audit(1734055253.474:78): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 02:00:55.880922 kernel: audit: type=1334 audit(1734055253.480:79): prog-id=10 op=LOAD Dec 13 02:00:55.880933 kernel: audit: type=1334 audit(1734055253.480:80): prog-id=10 op=UNLOAD Dec 13 02:00:55.880945 kernel: audit: type=1334 audit(1734055253.482:81): prog-id=11 op=LOAD Dec 13 02:00:55.880958 kernel: audit: type=1334 audit(1734055253.482:82): prog-id=11 op=UNLOAD Dec 13 02:00:55.880970 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 02:00:55.880983 kernel: audit: type=1400 audit(1734055253.517:83): avc: denied { associate } for pid=912 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 02:00:55.880997 kernel: audit: type=1300 audit(1734055253.517:83): arch=c000003e syscall=188 success=yes exit=0 a0=c0001858e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=895 pid=912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:55.881011 kernel: audit: type=1327 audit(1734055253.517:83): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 02:00:55.881024 systemd[1]: Populated /etc with preset unit settings. Dec 13 02:00:55.881038 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:00:55.881066 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:00:55.881080 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:00:55.881093 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 02:00:55.881109 systemd[1]: Stopped initrd-switch-root.service. Dec 13 02:00:55.881122 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 02:00:55.881135 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 02:00:55.881148 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 02:00:55.881161 systemd[1]: Created slice system-getty.slice. Dec 13 02:00:55.881174 systemd[1]: Created slice system-modprobe.slice. Dec 13 02:00:55.881187 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 02:00:55.881201 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 02:00:55.881214 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 02:00:55.881227 systemd[1]: Created slice user.slice. Dec 13 02:00:55.881241 systemd[1]: Started systemd-ask-password-console.path. Dec 13 02:00:55.881254 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 02:00:55.881267 systemd[1]: Set up automount boot.automount. Dec 13 02:00:55.881280 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 02:00:55.881293 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 02:00:55.881306 systemd[1]: Stopped target initrd-fs.target. Dec 13 02:00:55.881321 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 02:00:55.881342 systemd[1]: Reached target integritysetup.target. Dec 13 02:00:55.881355 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 02:00:55.881368 systemd[1]: Reached target remote-fs.target. Dec 13 02:00:55.881381 systemd[1]: Reached target slices.target. Dec 13 02:00:55.881393 systemd[1]: Reached target swap.target. Dec 13 02:00:55.881406 systemd[1]: Reached target torcx.target. Dec 13 02:00:55.881419 systemd[1]: Reached target veritysetup.target. Dec 13 02:00:55.881432 systemd[1]: Listening on systemd-coredump.socket. Dec 13 02:00:55.881446 systemd[1]: Listening on systemd-initctl.socket. Dec 13 02:00:55.881461 systemd[1]: Listening on systemd-networkd.socket. Dec 13 02:00:55.881474 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 02:00:55.881487 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 02:00:55.881501 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 02:00:55.881514 systemd[1]: Mounting dev-hugepages.mount... Dec 13 02:00:55.881527 systemd[1]: Mounting dev-mqueue.mount... Dec 13 02:00:55.881539 systemd[1]: Mounting media.mount... Dec 13 02:00:55.881552 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:00:55.881566 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 02:00:55.881580 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 02:00:55.881593 systemd[1]: Mounting tmp.mount... Dec 13 02:00:55.881606 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 02:00:55.881619 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:00:55.881634 systemd[1]: Starting kmod-static-nodes.service... Dec 13 02:00:55.881646 systemd[1]: Starting modprobe@configfs.service... Dec 13 02:00:55.881659 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:00:55.881672 systemd[1]: Starting modprobe@drm.service... Dec 13 02:00:55.881685 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:00:55.881699 systemd[1]: Starting modprobe@fuse.service... Dec 13 02:00:55.881712 systemd[1]: Starting modprobe@loop.service... Dec 13 02:00:55.881725 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 02:00:55.881738 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 02:00:55.881751 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 02:00:55.881764 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 02:00:55.881777 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 02:00:55.881790 systemd[1]: Stopped systemd-journald.service. Dec 13 02:00:55.881803 kernel: fuse: init (API version 7.34) Dec 13 02:00:55.881820 kernel: loop: module loaded Dec 13 02:00:55.881833 systemd[1]: Starting systemd-journald.service... Dec 13 02:00:55.881849 systemd[1]: Starting systemd-modules-load.service... Dec 13 02:00:55.881864 systemd[1]: Starting systemd-network-generator.service... Dec 13 02:00:55.881878 systemd[1]: Starting systemd-remount-fs.service... Dec 13 02:00:55.881890 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 02:00:55.881903 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 02:00:55.881916 systemd[1]: Stopped verity-setup.service. Dec 13 02:00:55.881929 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:00:55.881944 systemd[1]: Mounted dev-hugepages.mount. Dec 13 02:00:55.881960 systemd-journald[997]: Journal started Dec 13 02:00:55.882005 systemd-journald[997]: Runtime Journal (/run/log/journal/62d2a16fe57b47ef84bf26d77b2e04f1) is 6.0M, max 48.5M, 42.5M free. Dec 13 02:00:53.204000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 02:00:53.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 02:00:53.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 02:00:53.480000 audit: BPF prog-id=10 op=LOAD Dec 13 02:00:53.480000 audit: BPF prog-id=10 op=UNLOAD Dec 13 02:00:53.482000 audit: BPF prog-id=11 op=LOAD Dec 13 02:00:53.482000 audit: BPF prog-id=11 op=UNLOAD Dec 13 02:00:53.517000 audit[912]: AVC avc: denied { associate } for pid=912 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 02:00:53.517000 audit[912]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001858e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=895 pid=912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:53.517000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 02:00:53.519000 audit[912]: AVC avc: denied { associate } for pid=912 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 02:00:53.519000 audit[912]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001859b9 a2=1ed a3=0 items=2 ppid=895 pid=912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:53.519000 audit: CWD cwd="/" Dec 13 02:00:53.519000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:53.519000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:53.519000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 02:00:55.744000 audit: BPF prog-id=12 op=LOAD Dec 13 02:00:55.744000 audit: BPF prog-id=3 op=UNLOAD Dec 13 02:00:55.744000 audit: BPF prog-id=13 op=LOAD Dec 13 02:00:55.744000 audit: BPF prog-id=14 op=LOAD Dec 13 02:00:55.744000 audit: BPF prog-id=4 op=UNLOAD Dec 13 02:00:55.744000 audit: BPF prog-id=5 op=UNLOAD Dec 13 02:00:55.745000 audit: BPF prog-id=15 op=LOAD Dec 13 02:00:55.745000 audit: BPF prog-id=12 op=UNLOAD Dec 13 02:00:55.745000 audit: BPF prog-id=16 op=LOAD Dec 13 02:00:55.745000 audit: BPF prog-id=17 op=LOAD Dec 13 02:00:55.745000 audit: BPF prog-id=13 op=UNLOAD Dec 13 02:00:55.745000 audit: BPF prog-id=14 op=UNLOAD Dec 13 02:00:55.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:55.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:55.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:55.752000 audit: BPF prog-id=15 op=UNLOAD Dec 13 02:00:55.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:55.853000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:55.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:55.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:55.857000 audit: BPF prog-id=18 op=LOAD Dec 13 02:00:55.857000 audit: BPF prog-id=19 op=LOAD Dec 13 02:00:55.857000 audit: BPF prog-id=20 op=LOAD Dec 13 02:00:55.858000 audit: BPF prog-id=16 op=UNLOAD Dec 13 02:00:55.858000 audit: BPF prog-id=17 op=UNLOAD Dec 13 02:00:55.877000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:55.879000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 02:00:55.879000 audit[997]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffe6e12e730 a2=4000 a3=7ffe6e12e7cc items=0 ppid=1 pid=997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:55.879000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 02:00:55.742715 systemd[1]: Queued start job for default target multi-user.target. Dec 13 02:00:53.515431 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T02:00:53Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:00:55.742726 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 13 02:00:53.515622 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T02:00:53Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 02:00:55.745776 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 02:00:53.515638 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T02:00:53Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 02:00:53.515664 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T02:00:53Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 02:00:53.515673 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T02:00:53Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 02:00:53.515699 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T02:00:53Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 02:00:53.515710 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T02:00:53Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 02:00:55.884116 systemd[1]: Started systemd-journald.service. Dec 13 02:00:55.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:53.515893 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T02:00:53Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 02:00:53.515925 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T02:00:53Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 02:00:53.515936 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T02:00:53Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 02:00:55.884398 systemd[1]: Mounted dev-mqueue.mount. Dec 13 02:00:53.516798 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T02:00:53Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 02:00:53.516848 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T02:00:53Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 02:00:53.516870 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T02:00:53Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 02:00:53.516888 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T02:00:53Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 02:00:53.516909 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T02:00:53Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 02:00:53.516926 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T02:00:53Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 02:00:55.487213 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T02:00:55Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:00:55.487471 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T02:00:55Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:00:55.487563 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T02:00:55Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:00:55.487704 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T02:00:55Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 02:00:55.487750 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T02:00:55Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 02:00:55.487805 /usr/lib/systemd/system-generators/torcx-generator[912]: time="2024-12-13T02:00:55Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 02:00:55.885553 systemd[1]: Mounted media.mount. Dec 13 02:00:55.886405 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 02:00:55.887386 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 02:00:55.888395 systemd[1]: Mounted tmp.mount. Dec 13 02:00:55.889451 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 02:00:55.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:55.890701 systemd[1]: Finished kmod-static-nodes.service. Dec 13 02:00:55.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:55.891952 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 02:00:55.892102 systemd[1]: Finished modprobe@configfs.service. Dec 13 02:00:55.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:55.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:55.893570 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:00:55.893755 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:00:55.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:55.894000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:55.895030 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 02:00:55.895147 systemd[1]: Finished modprobe@drm.service. Dec 13 02:00:55.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:55.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:55.896480 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:00:55.896644 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:00:55.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:55.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:55.897887 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 02:00:55.898060 systemd[1]: Finished modprobe@fuse.service. Dec 13 02:00:55.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:55.898000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:55.899253 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:00:55.899434 systemd[1]: Finished modprobe@loop.service. Dec 13 02:00:55.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:55.900000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:55.900949 systemd[1]: Finished systemd-modules-load.service. Dec 13 02:00:55.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:55.902279 systemd[1]: Finished systemd-network-generator.service. Dec 13 02:00:55.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:55.903858 systemd[1]: Finished systemd-remount-fs.service. Dec 13 02:00:55.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:55.905455 systemd[1]: Reached target network-pre.target. Dec 13 02:00:55.907694 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 02:00:55.909641 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 02:00:55.910544 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 02:00:55.911995 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 02:00:55.913640 systemd[1]: Starting systemd-journal-flush.service... Dec 13 02:00:55.914508 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:00:55.915391 systemd[1]: Starting systemd-random-seed.service... Dec 13 02:00:55.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:55.916366 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:00:55.917223 systemd[1]: Starting systemd-sysctl.service... Dec 13 02:00:55.919680 systemd[1]: Starting systemd-sysusers.service... Dec 13 02:00:55.922717 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 02:00:55.923827 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 02:00:55.924740 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 02:00:55.927793 systemd-journald[997]: Time spent on flushing to /var/log/journal/62d2a16fe57b47ef84bf26d77b2e04f1 is 18.861ms for 1103 entries. Dec 13 02:00:55.927793 systemd-journald[997]: System Journal (/var/log/journal/62d2a16fe57b47ef84bf26d77b2e04f1) is 8.0M, max 195.6M, 187.6M free. Dec 13 02:00:55.972552 systemd-journald[997]: Received client request to flush runtime journal. Dec 13 02:00:55.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:55.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:55.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:55.928280 systemd[1]: Starting systemd-udev-settle.service... Dec 13 02:00:55.973095 udevadm[1015]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 02:00:55.937871 systemd[1]: Finished systemd-random-seed.service. Dec 13 02:00:55.939850 systemd[1]: Reached target first-boot-complete.target. Dec 13 02:00:55.942895 systemd[1]: Finished systemd-sysctl.service. Dec 13 02:00:55.944305 systemd[1]: Finished systemd-sysusers.service. Dec 13 02:00:55.973523 systemd[1]: Finished systemd-journal-flush.service. Dec 13 02:00:55.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:56.388734 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 02:00:56.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:56.390000 audit: BPF prog-id=21 op=LOAD Dec 13 02:00:56.390000 audit: BPF prog-id=22 op=LOAD Dec 13 02:00:56.390000 audit: BPF prog-id=7 op=UNLOAD Dec 13 02:00:56.390000 audit: BPF prog-id=8 op=UNLOAD Dec 13 02:00:56.391388 systemd[1]: Starting systemd-udevd.service... Dec 13 02:00:56.410353 systemd-udevd[1018]: Using default interface naming scheme 'v252'. Dec 13 02:00:56.424976 systemd[1]: Started systemd-udevd.service. Dec 13 02:00:56.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:56.427000 audit: BPF prog-id=23 op=LOAD Dec 13 02:00:56.429554 systemd[1]: Starting systemd-networkd.service... Dec 13 02:00:56.440000 audit: BPF prog-id=24 op=LOAD Dec 13 02:00:56.440000 audit: BPF prog-id=25 op=LOAD Dec 13 02:00:56.440000 audit: BPF prog-id=26 op=LOAD Dec 13 02:00:56.441617 systemd[1]: Starting systemd-userdbd.service... Dec 13 02:00:56.455894 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 02:00:56.469242 systemd[1]: Started systemd-userdbd.service. Dec 13 02:00:56.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:56.489101 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 02:00:56.514114 kernel: ACPI: button: Power Button [PWRF] Dec 13 02:00:56.516494 systemd-networkd[1030]: lo: Link UP Dec 13 02:00:56.516506 systemd-networkd[1030]: lo: Gained carrier Dec 13 02:00:56.516915 systemd-networkd[1030]: Enumeration completed Dec 13 02:00:56.517157 systemd[1]: Started systemd-networkd.service. Dec 13 02:00:56.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:56.517723 systemd-networkd[1030]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 02:00:56.518907 systemd-networkd[1030]: eth0: Link UP Dec 13 02:00:56.518918 systemd-networkd[1030]: eth0: Gained carrier Dec 13 02:00:56.522000 audit[1022]: AVC avc: denied { confidentiality } for pid=1022 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 02:00:56.534142 systemd-networkd[1030]: eth0: DHCPv4 address 10.0.0.73/16, gateway 10.0.0.1 acquired from 10.0.0.1 Dec 13 02:00:56.542094 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 02:00:56.522000 audit[1022]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562adc1b7370 a1=337fc a2=7f42732f6bc5 a3=5 items=110 ppid=1018 pid=1022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:56.522000 audit: CWD cwd="/" Dec 13 02:00:56.522000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=1 name=(null) inode=15814 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=2 name=(null) inode=15814 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=3 name=(null) inode=15815 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=4 name=(null) inode=15814 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=5 name=(null) inode=15816 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=6 name=(null) inode=15814 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=7 name=(null) inode=15817 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=8 name=(null) inode=15817 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=9 name=(null) inode=15818 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=10 name=(null) inode=15817 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=11 name=(null) inode=15819 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=12 name=(null) inode=15817 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=13 name=(null) inode=15820 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=14 name=(null) inode=15817 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=15 name=(null) inode=15821 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=16 name=(null) inode=15817 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=17 name=(null) inode=15822 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=18 name=(null) inode=15814 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=19 name=(null) inode=15823 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=20 name=(null) inode=15823 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=21 name=(null) inode=15824 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=22 name=(null) inode=15823 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=23 name=(null) inode=15825 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=24 name=(null) inode=15823 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=25 name=(null) inode=15826 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=26 name=(null) inode=15823 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=27 name=(null) inode=15827 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=28 name=(null) inode=15823 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=29 name=(null) inode=15828 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=30 name=(null) inode=15814 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=31 name=(null) inode=15829 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=32 name=(null) inode=15829 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=33 name=(null) inode=15830 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=34 name=(null) inode=15829 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=35 name=(null) inode=15831 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=36 name=(null) inode=15829 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=37 name=(null) inode=15832 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=38 name=(null) inode=15829 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=39 name=(null) inode=15833 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=40 name=(null) inode=15829 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=41 name=(null) inode=15834 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=42 name=(null) inode=15814 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=43 name=(null) inode=15835 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=44 name=(null) inode=15835 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=45 name=(null) inode=15836 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=46 name=(null) inode=15835 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=47 name=(null) inode=15837 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=48 name=(null) inode=15835 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=49 name=(null) inode=15838 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=50 name=(null) inode=15835 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=51 name=(null) inode=15839 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=52 name=(null) inode=15835 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=53 name=(null) inode=15840 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=55 name=(null) inode=15841 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=56 name=(null) inode=15841 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=57 name=(null) inode=15842 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=58 name=(null) inode=15841 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=59 name=(null) inode=15843 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=60 name=(null) inode=15841 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=61 name=(null) inode=15844 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=62 name=(null) inode=15844 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=63 name=(null) inode=15845 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=64 name=(null) inode=15844 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=65 name=(null) inode=15846 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=66 name=(null) inode=15844 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=67 name=(null) inode=15847 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=68 name=(null) inode=15844 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=69 name=(null) inode=15848 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=70 name=(null) inode=15844 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=71 name=(null) inode=15849 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=72 name=(null) inode=15841 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=73 name=(null) inode=15850 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=74 name=(null) inode=15850 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=75 name=(null) inode=15851 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=76 name=(null) inode=15850 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=77 name=(null) inode=15852 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=78 name=(null) inode=15850 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=79 name=(null) inode=15853 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=80 name=(null) inode=15850 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=81 name=(null) inode=15854 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=82 name=(null) inode=15850 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=83 name=(null) inode=15855 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=84 name=(null) inode=15841 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=85 name=(null) inode=15856 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=86 name=(null) inode=15856 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=87 name=(null) inode=15857 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=88 name=(null) inode=15856 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=89 name=(null) inode=15858 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=90 name=(null) inode=15856 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=91 name=(null) inode=15859 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=92 name=(null) inode=15856 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=93 name=(null) inode=15860 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=94 name=(null) inode=15856 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=95 name=(null) inode=15861 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=96 name=(null) inode=15841 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=97 name=(null) inode=15862 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=98 name=(null) inode=15862 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=99 name=(null) inode=15863 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=100 name=(null) inode=15862 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=101 name=(null) inode=15864 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=102 name=(null) inode=15862 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=103 name=(null) inode=15865 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=104 name=(null) inode=15862 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=105 name=(null) inode=15866 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=106 name=(null) inode=15862 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=107 name=(null) inode=15867 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PATH item=109 name=(null) inode=9821 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:00:56.522000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 02:00:56.595079 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Dec 13 02:00:56.595570 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Dec 13 02:00:56.595881 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Dec 13 02:00:56.601088 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Dec 13 02:00:56.606071 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 02:00:56.616121 kernel: kvm: Nested Virtualization enabled Dec 13 02:00:56.616230 kernel: SVM: kvm: Nested Paging enabled Dec 13 02:00:56.616266 kernel: SVM: Virtual VMLOAD VMSAVE supported Dec 13 02:00:56.616282 kernel: SVM: Virtual GIF supported Dec 13 02:00:56.640078 kernel: EDAC MC: Ver: 3.0.0 Dec 13 02:00:56.665418 systemd[1]: Finished systemd-udev-settle.service. Dec 13 02:00:56.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:56.667384 systemd[1]: Starting lvm2-activation-early.service... Dec 13 02:00:56.675288 lvm[1054]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 02:00:56.696991 systemd[1]: Finished lvm2-activation-early.service. Dec 13 02:00:56.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:56.697988 systemd[1]: Reached target cryptsetup.target. Dec 13 02:00:56.699570 systemd[1]: Starting lvm2-activation.service... Dec 13 02:00:56.703910 lvm[1055]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 02:00:56.732548 systemd[1]: Finished lvm2-activation.service. Dec 13 02:00:56.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:56.733764 systemd[1]: Reached target local-fs-pre.target. Dec 13 02:00:56.734752 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 02:00:56.734779 systemd[1]: Reached target local-fs.target. Dec 13 02:00:56.735659 systemd[1]: Reached target machines.target. Dec 13 02:00:56.737661 systemd[1]: Starting ldconfig.service... Dec 13 02:00:56.738771 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:00:56.738808 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:00:56.739803 systemd[1]: Starting systemd-boot-update.service... Dec 13 02:00:56.741740 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 02:00:56.744639 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 02:00:56.746979 systemd[1]: Starting systemd-sysext.service... Dec 13 02:00:56.749918 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1057 (bootctl) Dec 13 02:00:56.751255 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 02:00:56.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:56.756804 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 02:00:56.758558 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 02:00:56.761316 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 02:00:56.761476 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 02:00:56.794135 kernel: loop0: detected capacity change from 0 to 211296 Dec 13 02:00:57.031638 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 02:00:57.032410 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 02:00:57.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:57.037063 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 02:00:57.045788 systemd-fsck[1066]: fsck.fat 4.2 (2021-01-31) Dec 13 02:00:57.045788 systemd-fsck[1066]: /dev/vda1: 789 files, 119291/258078 clusters Dec 13 02:00:57.047291 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 02:00:57.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:57.050365 systemd[1]: Mounting boot.mount... Dec 13 02:00:57.052074 kernel: loop1: detected capacity change from 0 to 211296 Dec 13 02:00:57.058175 systemd[1]: Mounted boot.mount. Dec 13 02:00:57.059906 (sd-sysext)[1069]: Using extensions 'kubernetes'. Dec 13 02:00:57.060386 (sd-sysext)[1069]: Merged extensions into '/usr'. Dec 13 02:00:57.075877 systemd[1]: Finished systemd-boot-update.service. Dec 13 02:00:57.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:57.077355 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:00:57.078640 systemd[1]: Mounting usr-share-oem.mount... Dec 13 02:00:57.079702 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:00:57.081165 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:00:57.083307 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:00:57.085441 systemd[1]: Starting modprobe@loop.service... Dec 13 02:00:57.086370 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:00:57.086517 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:00:57.086654 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:00:57.089742 systemd[1]: Mounted usr-share-oem.mount. Dec 13 02:00:57.091204 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:00:57.091358 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:00:57.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:57.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:57.092852 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:00:57.092949 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:00:57.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:57.094000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:57.094643 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:00:57.094761 systemd[1]: Finished modprobe@loop.service. Dec 13 02:00:57.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:57.095000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:57.096117 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:00:57.096234 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:00:57.098070 systemd[1]: Finished systemd-sysext.service. Dec 13 02:00:57.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:57.100412 systemd[1]: Starting ensure-sysext.service... Dec 13 02:00:57.102154 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 02:00:57.107736 systemd[1]: Reloading. Dec 13 02:00:57.116722 systemd-tmpfiles[1077]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 02:00:57.118836 systemd-tmpfiles[1077]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 02:00:57.121810 systemd-tmpfiles[1077]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 02:00:57.133005 ldconfig[1056]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 02:00:57.160877 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2024-12-13T02:00:57Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:00:57.160916 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2024-12-13T02:00:57Z" level=info msg="torcx already run" Dec 13 02:00:57.222266 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:00:57.222287 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:00:57.239722 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:00:57.294000 audit: BPF prog-id=27 op=LOAD Dec 13 02:00:57.294000 audit: BPF prog-id=24 op=UNLOAD Dec 13 02:00:57.294000 audit: BPF prog-id=28 op=LOAD Dec 13 02:00:57.294000 audit: BPF prog-id=29 op=LOAD Dec 13 02:00:57.294000 audit: BPF prog-id=25 op=UNLOAD Dec 13 02:00:57.294000 audit: BPF prog-id=26 op=UNLOAD Dec 13 02:00:57.294000 audit: BPF prog-id=30 op=LOAD Dec 13 02:00:57.294000 audit: BPF prog-id=18 op=UNLOAD Dec 13 02:00:57.294000 audit: BPF prog-id=31 op=LOAD Dec 13 02:00:57.295000 audit: BPF prog-id=32 op=LOAD Dec 13 02:00:57.295000 audit: BPF prog-id=19 op=UNLOAD Dec 13 02:00:57.295000 audit: BPF prog-id=20 op=UNLOAD Dec 13 02:00:57.296000 audit: BPF prog-id=33 op=LOAD Dec 13 02:00:57.296000 audit: BPF prog-id=34 op=LOAD Dec 13 02:00:57.296000 audit: BPF prog-id=21 op=UNLOAD Dec 13 02:00:57.296000 audit: BPF prog-id=22 op=UNLOAD Dec 13 02:00:57.296000 audit: BPF prog-id=35 op=LOAD Dec 13 02:00:57.296000 audit: BPF prog-id=23 op=UNLOAD Dec 13 02:00:57.300135 systemd[1]: Finished ldconfig.service. Dec 13 02:00:57.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:57.302198 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 02:00:57.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:57.306106 systemd[1]: Starting audit-rules.service... Dec 13 02:00:57.307802 systemd[1]: Starting clean-ca-certificates.service... Dec 13 02:00:57.312000 audit: BPF prog-id=36 op=LOAD Dec 13 02:00:57.310155 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 02:00:57.313854 systemd[1]: Starting systemd-resolved.service... Dec 13 02:00:57.315000 audit: BPF prog-id=37 op=LOAD Dec 13 02:00:57.316568 systemd[1]: Starting systemd-timesyncd.service... Dec 13 02:00:57.318331 systemd[1]: Starting systemd-update-utmp.service... Dec 13 02:00:57.319688 systemd[1]: Finished clean-ca-certificates.service. Dec 13 02:00:57.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:57.322553 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:00:57.323000 audit[1150]: SYSTEM_BOOT pid=1150 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 02:00:57.328771 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:00:57.329084 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:00:57.330732 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:00:57.332949 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:00:57.335103 systemd[1]: Starting modprobe@loop.service... Dec 13 02:00:57.335927 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:00:57.336191 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:00:57.336437 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:00:57.336624 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:00:57.338428 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 02:00:57.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:57.340226 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:00:57.340368 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:00:57.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:57.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:57.342069 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:00:57.342355 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:00:57.343000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:57.343000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:57.344003 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:00:57.344147 systemd[1]: Finished modprobe@loop.service. Dec 13 02:00:57.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:57.345000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:57.346788 systemd[1]: Finished systemd-update-utmp.service. Dec 13 02:00:57.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:57.350312 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:00:57.350551 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:00:57.352395 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:00:57.354428 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:00:57.356393 systemd[1]: Starting modprobe@loop.service... Dec 13 02:00:57.357388 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:00:57.357538 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:00:57.359014 systemd[1]: Starting systemd-update-done.service... Dec 13 02:00:57.359940 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:00:57.360070 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:00:57.361700 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:00:57.361836 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:00:57.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:57.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:00:57.365000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 02:00:57.365000 audit[1162]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc6a4bddd0 a2=420 a3=0 items=0 ppid=1139 pid=1162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:00:57.365000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 02:00:57.366385 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:00:57.367868 augenrules[1162]: No rules Dec 13 02:00:57.366607 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:00:57.368199 systemd[1]: Finished audit-rules.service. Dec 13 02:00:57.369614 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:00:57.369835 systemd[1]: Finished modprobe@loop.service. Dec 13 02:00:57.371256 systemd[1]: Finished systemd-update-done.service. Dec 13 02:00:57.372846 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:00:57.372962 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:00:57.375919 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:00:57.376629 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 02:00:57.378066 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 02:00:57.380181 systemd[1]: Starting modprobe@drm.service... Dec 13 02:00:57.382372 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 02:00:57.384515 systemd[1]: Starting modprobe@loop.service... Dec 13 02:00:57.385475 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 02:00:57.385629 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:00:57.387101 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 02:00:57.388122 systemd-resolved[1146]: Positive Trust Anchors: Dec 13 02:00:57.388343 systemd-resolved[1146]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 02:00:57.388448 systemd-timesyncd[1149]: Contacted time server 10.0.0.1:123 (10.0.0.1). Dec 13 02:00:57.388454 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 02:00:57.388497 systemd-timesyncd[1149]: Initial clock synchronization to Fri 2024-12-13 02:00:57.451245 UTC. Dec 13 02:00:57.388596 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 02:00:57.388809 systemd-resolved[1146]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 02:00:57.389889 systemd[1]: Started systemd-timesyncd.service. Dec 13 02:00:57.391669 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 02:00:57.391812 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 02:00:57.393207 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 02:00:57.393371 systemd[1]: Finished modprobe@drm.service. Dec 13 02:00:57.394699 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 02:00:57.394849 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 02:00:57.396358 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 02:00:57.396515 systemd[1]: Finished modprobe@loop.service. Dec 13 02:00:57.397761 systemd-resolved[1146]: Defaulting to hostname 'linux'. Dec 13 02:00:57.398100 systemd[1]: Reached target time-set.target. Dec 13 02:00:57.399011 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 02:00:57.399161 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 02:00:57.400038 systemd[1]: Started systemd-resolved.service. Dec 13 02:00:57.401123 systemd[1]: Finished ensure-sysext.service. Dec 13 02:00:57.402168 systemd[1]: Reached target network.target. Dec 13 02:00:57.402964 systemd[1]: Reached target nss-lookup.target. Dec 13 02:00:57.403779 systemd[1]: Reached target sysinit.target. Dec 13 02:00:57.404619 systemd[1]: Started motdgen.path. Dec 13 02:00:57.405324 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 02:00:57.406553 systemd[1]: Started logrotate.timer. Dec 13 02:00:57.407312 systemd[1]: Started mdadm.timer. Dec 13 02:00:57.407966 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 02:00:57.408794 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 02:00:57.408824 systemd[1]: Reached target paths.target. Dec 13 02:00:57.409554 systemd[1]: Reached target timers.target. Dec 13 02:00:57.410610 systemd[1]: Listening on dbus.socket. Dec 13 02:00:57.412257 systemd[1]: Starting docker.socket... Dec 13 02:00:57.414724 systemd[1]: Listening on sshd.socket. Dec 13 02:00:57.415568 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:00:57.415880 systemd[1]: Listening on docker.socket. Dec 13 02:00:57.416679 systemd[1]: Reached target sockets.target. Dec 13 02:00:57.417475 systemd[1]: Reached target basic.target. Dec 13 02:00:57.418251 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 02:00:57.418274 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 02:00:57.418983 systemd[1]: Starting containerd.service... Dec 13 02:00:57.420569 systemd[1]: Starting dbus.service... Dec 13 02:00:57.421884 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 02:00:57.423712 systemd[1]: Starting extend-filesystems.service... Dec 13 02:00:57.424648 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 02:00:57.425769 systemd[1]: Starting motdgen.service... Dec 13 02:00:57.426888 jq[1181]: false Dec 13 02:00:57.427424 systemd[1]: Starting prepare-helm.service... Dec 13 02:00:57.429162 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 02:00:57.430950 systemd[1]: Starting sshd-keygen.service... Dec 13 02:00:57.434002 systemd[1]: Starting systemd-logind.service... Dec 13 02:00:57.436091 extend-filesystems[1182]: Found loop1 Dec 13 02:00:57.436091 extend-filesystems[1182]: Found sr0 Dec 13 02:00:57.439570 extend-filesystems[1182]: Found vda Dec 13 02:00:57.439570 extend-filesystems[1182]: Found vda1 Dec 13 02:00:57.439570 extend-filesystems[1182]: Found vda2 Dec 13 02:00:57.439570 extend-filesystems[1182]: Found vda3 Dec 13 02:00:57.439570 extend-filesystems[1182]: Found usr Dec 13 02:00:57.439570 extend-filesystems[1182]: Found vda4 Dec 13 02:00:57.439570 extend-filesystems[1182]: Found vda6 Dec 13 02:00:57.439570 extend-filesystems[1182]: Found vda7 Dec 13 02:00:57.439570 extend-filesystems[1182]: Found vda9 Dec 13 02:00:57.439570 extend-filesystems[1182]: Checking size of /dev/vda9 Dec 13 02:00:57.487086 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Dec 13 02:00:57.487146 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Dec 13 02:00:57.437026 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 02:00:57.506808 extend-filesystems[1182]: Resized partition /dev/vda9 Dec 13 02:00:57.462169 dbus-daemon[1180]: [system] SELinux support is enabled Dec 13 02:00:57.437094 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 02:00:57.508551 extend-filesystems[1208]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 02:00:57.508551 extend-filesystems[1208]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 13 02:00:57.508551 extend-filesystems[1208]: old_desc_blocks = 1, new_desc_blocks = 1 Dec 13 02:00:57.508551 extend-filesystems[1208]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Dec 13 02:00:57.437510 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 02:00:57.515704 jq[1199]: true Dec 13 02:00:57.515823 update_engine[1195]: I1213 02:00:57.510079 1195 main.cc:92] Flatcar Update Engine starting Dec 13 02:00:57.515823 update_engine[1195]: I1213 02:00:57.512341 1195 update_check_scheduler.cc:74] Next update check in 2m25s Dec 13 02:00:57.515970 extend-filesystems[1182]: Resized filesystem in /dev/vda9 Dec 13 02:00:57.438403 systemd[1]: Starting update-engine.service... Dec 13 02:00:57.440588 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 02:00:57.518225 tar[1201]: linux-amd64/helm Dec 13 02:00:57.444147 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 02:00:57.518479 jq[1209]: true Dec 13 02:00:57.444340 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 02:00:57.445330 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 02:00:57.445506 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 02:00:57.461957 systemd[1]: Created slice system-sshd.slice. Dec 13 02:00:57.477406 systemd[1]: Started dbus.service. Dec 13 02:00:57.481837 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 02:00:57.482012 systemd[1]: Finished motdgen.service. Dec 13 02:00:57.488973 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 02:00:57.488994 systemd[1]: Reached target system-config.target. Dec 13 02:00:57.492241 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 02:00:57.492264 systemd[1]: Reached target user-config.target. Dec 13 02:00:57.508808 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 02:00:57.508984 systemd[1]: Finished extend-filesystems.service. Dec 13 02:00:57.512277 systemd[1]: Started update-engine.service. Dec 13 02:00:57.516279 systemd[1]: Started locksmithd.service. Dec 13 02:00:57.521638 bash[1232]: Updated "/home/core/.ssh/authorized_keys" Dec 13 02:00:57.522388 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 02:00:57.524759 systemd-logind[1189]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 02:00:57.524782 systemd-logind[1189]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 02:00:57.526111 systemd-logind[1189]: New seat seat0. Dec 13 02:00:57.529097 env[1210]: time="2024-12-13T02:00:57.528398510Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 02:00:57.530613 systemd[1]: Started systemd-logind.service. Dec 13 02:00:57.550814 locksmithd[1234]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 02:00:57.558681 env[1210]: time="2024-12-13T02:00:57.558647909Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 02:00:57.558856 env[1210]: time="2024-12-13T02:00:57.558839398Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:00:57.560278 env[1210]: time="2024-12-13T02:00:57.560253329Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:00:57.560368 env[1210]: time="2024-12-13T02:00:57.560350602Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:00:57.560647 env[1210]: time="2024-12-13T02:00:57.560626449Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:00:57.560726 env[1210]: time="2024-12-13T02:00:57.560707742Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 02:00:57.560801 env[1210]: time="2024-12-13T02:00:57.560781861Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 02:00:57.560872 env[1210]: time="2024-12-13T02:00:57.560852724Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 02:00:57.561010 env[1210]: time="2024-12-13T02:00:57.560992977Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:00:57.561296 env[1210]: time="2024-12-13T02:00:57.561269655Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 02:00:57.561469 env[1210]: time="2024-12-13T02:00:57.561449152Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 02:00:57.561549 env[1210]: time="2024-12-13T02:00:57.561530535Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 02:00:57.561655 env[1210]: time="2024-12-13T02:00:57.561637746Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 02:00:57.561731 env[1210]: time="2024-12-13T02:00:57.561713528Z" level=info msg="metadata content store policy set" policy=shared Dec 13 02:00:57.567182 env[1210]: time="2024-12-13T02:00:57.567165873Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 02:00:57.567261 env[1210]: time="2024-12-13T02:00:57.567243258Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 02:00:57.567349 env[1210]: time="2024-12-13T02:00:57.567330452Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 02:00:57.567444 env[1210]: time="2024-12-13T02:00:57.567426241Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 02:00:57.567522 env[1210]: time="2024-12-13T02:00:57.567503396Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 02:00:57.567598 env[1210]: time="2024-12-13T02:00:57.567579469Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 02:00:57.567683 env[1210]: time="2024-12-13T02:00:57.567665229Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 02:00:57.567761 env[1210]: time="2024-12-13T02:00:57.567743586Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 02:00:57.567837 env[1210]: time="2024-12-13T02:00:57.567819749Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 02:00:57.567915 env[1210]: time="2024-12-13T02:00:57.567894890Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 02:00:57.567997 env[1210]: time="2024-12-13T02:00:57.567978988Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 02:00:57.568093 env[1210]: time="2024-12-13T02:00:57.568074657Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 02:00:57.568231 env[1210]: time="2024-12-13T02:00:57.568214860Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 02:00:57.568389 env[1210]: time="2024-12-13T02:00:57.568372486Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 02:00:57.568781 env[1210]: time="2024-12-13T02:00:57.568732451Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 02:00:57.568824 env[1210]: time="2024-12-13T02:00:57.568796741Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 02:00:57.568824 env[1210]: time="2024-12-13T02:00:57.568815436Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 02:00:57.568885 env[1210]: time="2024-12-13T02:00:57.568868266Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 02:00:57.568910 env[1210]: time="2024-12-13T02:00:57.568887341Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 02:00:57.568910 env[1210]: time="2024-12-13T02:00:57.568902800Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 02:00:57.568955 env[1210]: time="2024-12-13T02:00:57.568917708Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 02:00:57.568955 env[1210]: time="2024-12-13T02:00:57.568932937Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 02:00:57.568955 env[1210]: time="2024-12-13T02:00:57.568946983Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 02:00:57.569009 env[1210]: time="2024-12-13T02:00:57.568960789Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 02:00:57.569009 env[1210]: time="2024-12-13T02:00:57.568975647Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 02:00:57.569009 env[1210]: time="2024-12-13T02:00:57.568992388Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 02:00:57.569194 env[1210]: time="2024-12-13T02:00:57.569164982Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 02:00:57.569194 env[1210]: time="2024-12-13T02:00:57.569190450Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 02:00:57.569241 env[1210]: time="2024-12-13T02:00:57.569206209Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 02:00:57.569241 env[1210]: time="2024-12-13T02:00:57.569220556Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 02:00:57.569296 env[1210]: time="2024-12-13T02:00:57.569238951Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 02:00:57.569296 env[1210]: time="2024-12-13T02:00:57.569254670Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 02:00:57.569296 env[1210]: time="2024-12-13T02:00:57.569275980Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 02:00:57.569358 env[1210]: time="2024-12-13T02:00:57.569322297Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 02:00:57.569603 env[1210]: time="2024-12-13T02:00:57.569538162Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 02:00:57.570135 env[1210]: time="2024-12-13T02:00:57.569608323Z" level=info msg="Connect containerd service" Dec 13 02:00:57.570135 env[1210]: time="2024-12-13T02:00:57.569648970Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 02:00:57.570379 env[1210]: time="2024-12-13T02:00:57.570344985Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 02:00:57.570614 env[1210]: time="2024-12-13T02:00:57.570589463Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 02:00:57.570651 env[1210]: time="2024-12-13T02:00:57.570635740Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 02:00:57.570749 systemd[1]: Started containerd.service. Dec 13 02:00:57.571772 env[1210]: time="2024-12-13T02:00:57.571416655Z" level=info msg="Start subscribing containerd event" Dec 13 02:00:57.571772 env[1210]: time="2024-12-13T02:00:57.571469704Z" level=info msg="Start recovering state" Dec 13 02:00:57.571772 env[1210]: time="2024-12-13T02:00:57.571524337Z" level=info msg="Start event monitor" Dec 13 02:00:57.571772 env[1210]: time="2024-12-13T02:00:57.571539465Z" level=info msg="Start snapshots syncer" Dec 13 02:00:57.571772 env[1210]: time="2024-12-13T02:00:57.571548612Z" level=info msg="Start cni network conf syncer for default" Dec 13 02:00:57.571772 env[1210]: time="2024-12-13T02:00:57.571556898Z" level=info msg="Start streaming server" Dec 13 02:00:57.575449 env[1210]: time="2024-12-13T02:00:57.575414642Z" level=info msg="containerd successfully booted in 0.047698s" Dec 13 02:00:57.847019 tar[1201]: linux-amd64/LICENSE Dec 13 02:00:57.847019 tar[1201]: linux-amd64/README.md Dec 13 02:00:57.851043 systemd[1]: Finished prepare-helm.service. Dec 13 02:00:58.073228 systemd-networkd[1030]: eth0: Gained IPv6LL Dec 13 02:00:58.075156 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 02:00:58.076736 systemd[1]: Reached target network-online.target. Dec 13 02:00:58.079163 systemd[1]: Starting kubelet.service... Dec 13 02:00:58.161486 sshd_keygen[1197]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 02:00:58.180218 systemd[1]: Finished sshd-keygen.service. Dec 13 02:00:58.182521 systemd[1]: Starting issuegen.service... Dec 13 02:00:58.184088 systemd[1]: Started sshd@0-10.0.0.73:22-10.0.0.1:52430.service. Dec 13 02:00:58.186493 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 02:00:58.186639 systemd[1]: Finished issuegen.service. Dec 13 02:00:58.188718 systemd[1]: Starting systemd-user-sessions.service... Dec 13 02:00:58.193327 systemd[1]: Finished systemd-user-sessions.service. Dec 13 02:00:58.195621 systemd[1]: Started getty@tty1.service. Dec 13 02:00:58.197637 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 02:00:58.198809 systemd[1]: Reached target getty.target. Dec 13 02:00:58.227441 sshd[1256]: Accepted publickey for core from 10.0.0.1 port 52430 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:00:58.228898 sshd[1256]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:00:58.236258 systemd[1]: Created slice user-500.slice. Dec 13 02:00:58.238096 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 02:00:58.241133 systemd-logind[1189]: New session 1 of user core. Dec 13 02:00:58.246968 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 02:00:58.249840 systemd[1]: Starting user@500.service... Dec 13 02:00:58.252506 (systemd)[1264]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:00:58.339438 systemd[1264]: Queued start job for default target default.target. Dec 13 02:00:58.340003 systemd[1264]: Reached target paths.target. Dec 13 02:00:58.340033 systemd[1264]: Reached target sockets.target. Dec 13 02:00:58.340051 systemd[1264]: Reached target timers.target. Dec 13 02:00:58.340091 systemd[1264]: Reached target basic.target. Dec 13 02:00:58.340135 systemd[1264]: Reached target default.target. Dec 13 02:00:58.340166 systemd[1264]: Startup finished in 81ms. Dec 13 02:00:58.340449 systemd[1]: Started user@500.service. Dec 13 02:00:58.342343 systemd[1]: Started session-1.scope. Dec 13 02:00:58.394969 systemd[1]: Started sshd@1-10.0.0.73:22-10.0.0.1:50974.service. Dec 13 02:00:58.430142 sshd[1273]: Accepted publickey for core from 10.0.0.1 port 50974 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:00:58.431154 sshd[1273]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:00:58.434911 systemd-logind[1189]: New session 2 of user core. Dec 13 02:00:58.435908 systemd[1]: Started session-2.scope. Dec 13 02:00:58.489229 sshd[1273]: pam_unix(sshd:session): session closed for user core Dec 13 02:00:58.491484 systemd[1]: sshd@1-10.0.0.73:22-10.0.0.1:50974.service: Deactivated successfully. Dec 13 02:00:58.491908 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 02:00:58.492431 systemd-logind[1189]: Session 2 logged out. Waiting for processes to exit. Dec 13 02:00:58.493141 systemd[1]: Started sshd@2-10.0.0.73:22-10.0.0.1:50976.service. Dec 13 02:00:58.494966 systemd-logind[1189]: Removed session 2. Dec 13 02:00:58.526516 sshd[1279]: Accepted publickey for core from 10.0.0.1 port 50976 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:00:58.527617 sshd[1279]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:00:58.530799 systemd-logind[1189]: New session 3 of user core. Dec 13 02:00:58.531752 systemd[1]: Started session-3.scope. Dec 13 02:00:58.585598 sshd[1279]: pam_unix(sshd:session): session closed for user core Dec 13 02:00:58.587529 systemd[1]: sshd@2-10.0.0.73:22-10.0.0.1:50976.service: Deactivated successfully. Dec 13 02:00:58.588198 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 02:00:58.588724 systemd-logind[1189]: Session 3 logged out. Waiting for processes to exit. Dec 13 02:00:58.589512 systemd-logind[1189]: Removed session 3. Dec 13 02:00:58.662542 systemd[1]: Started kubelet.service. Dec 13 02:00:58.663778 systemd[1]: Reached target multi-user.target. Dec 13 02:00:58.665699 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 02:00:58.671699 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 02:00:58.671816 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 02:00:58.673246 systemd[1]: Startup finished in 642ms (kernel) + 4.434s (initrd) + 5.510s (userspace) = 10.588s. Dec 13 02:00:59.144956 kubelet[1286]: E1213 02:00:59.144874 1286 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:00:59.146451 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:00:59.146566 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:01:08.632224 systemd[1]: Started sshd@3-10.0.0.73:22-10.0.0.1:57866.service. Dec 13 02:01:08.664440 sshd[1296]: Accepted publickey for core from 10.0.0.1 port 57866 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:01:08.665338 sshd[1296]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:01:08.668135 systemd-logind[1189]: New session 4 of user core. Dec 13 02:01:08.668816 systemd[1]: Started session-4.scope. Dec 13 02:01:08.720273 sshd[1296]: pam_unix(sshd:session): session closed for user core Dec 13 02:01:08.722365 systemd[1]: sshd@3-10.0.0.73:22-10.0.0.1:57866.service: Deactivated successfully. Dec 13 02:01:08.722804 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 02:01:08.723181 systemd-logind[1189]: Session 4 logged out. Waiting for processes to exit. Dec 13 02:01:08.723927 systemd[1]: Started sshd@4-10.0.0.73:22-10.0.0.1:57872.service. Dec 13 02:01:08.724590 systemd-logind[1189]: Removed session 4. Dec 13 02:01:08.754513 sshd[1302]: Accepted publickey for core from 10.0.0.1 port 57872 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:01:08.755389 sshd[1302]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:01:08.758067 systemd-logind[1189]: New session 5 of user core. Dec 13 02:01:08.758902 systemd[1]: Started session-5.scope. Dec 13 02:01:08.806193 sshd[1302]: pam_unix(sshd:session): session closed for user core Dec 13 02:01:08.808331 systemd[1]: sshd@4-10.0.0.73:22-10.0.0.1:57872.service: Deactivated successfully. Dec 13 02:01:08.808739 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 02:01:08.809150 systemd-logind[1189]: Session 5 logged out. Waiting for processes to exit. Dec 13 02:01:08.809871 systemd[1]: Started sshd@5-10.0.0.73:22-10.0.0.1:57874.service. Dec 13 02:01:08.810471 systemd-logind[1189]: Removed session 5. Dec 13 02:01:08.840890 sshd[1308]: Accepted publickey for core from 10.0.0.1 port 57874 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:01:08.841693 sshd[1308]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:01:08.844462 systemd-logind[1189]: New session 6 of user core. Dec 13 02:01:08.845127 systemd[1]: Started session-6.scope. Dec 13 02:01:08.895624 sshd[1308]: pam_unix(sshd:session): session closed for user core Dec 13 02:01:08.897849 systemd[1]: sshd@5-10.0.0.73:22-10.0.0.1:57874.service: Deactivated successfully. Dec 13 02:01:08.898394 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 02:01:08.898884 systemd-logind[1189]: Session 6 logged out. Waiting for processes to exit. Dec 13 02:01:08.899731 systemd[1]: Started sshd@6-10.0.0.73:22-10.0.0.1:57880.service. Dec 13 02:01:08.900507 systemd-logind[1189]: Removed session 6. Dec 13 02:01:08.931081 sshd[1314]: Accepted publickey for core from 10.0.0.1 port 57880 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:01:08.931850 sshd[1314]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:01:08.934734 systemd-logind[1189]: New session 7 of user core. Dec 13 02:01:08.935407 systemd[1]: Started session-7.scope. Dec 13 02:01:09.036849 sudo[1318]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 02:01:09.037026 sudo[1318]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:01:09.046244 dbus-daemon[1180]: \xd0-K\u000f\x8fU: received setenforce notice (enforcing=-848787152) Dec 13 02:01:09.047957 sudo[1318]: pam_unix(sudo:session): session closed for user root Dec 13 02:01:09.049283 sshd[1314]: pam_unix(sshd:session): session closed for user core Dec 13 02:01:09.051540 systemd[1]: sshd@6-10.0.0.73:22-10.0.0.1:57880.service: Deactivated successfully. Dec 13 02:01:09.051992 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 02:01:09.052430 systemd-logind[1189]: Session 7 logged out. Waiting for processes to exit. Dec 13 02:01:09.053269 systemd[1]: Started sshd@7-10.0.0.73:22-10.0.0.1:57888.service. Dec 13 02:01:09.053843 systemd-logind[1189]: Removed session 7. Dec 13 02:01:09.084928 sshd[1322]: Accepted publickey for core from 10.0.0.1 port 57888 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:01:09.085896 sshd[1322]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:01:09.088648 systemd-logind[1189]: New session 8 of user core. Dec 13 02:01:09.089358 systemd[1]: Started session-8.scope. Dec 13 02:01:09.139258 sudo[1326]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 02:01:09.139438 sudo[1326]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:01:09.141405 sudo[1326]: pam_unix(sudo:session): session closed for user root Dec 13 02:01:09.144555 sudo[1325]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 02:01:09.144715 sudo[1325]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:01:09.150279 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 02:01:09.150515 systemd[1]: Stopped kubelet.service. Dec 13 02:01:09.151780 systemd[1]: Starting kubelet.service... Dec 13 02:01:09.153115 systemd[1]: Stopping audit-rules.service... Dec 13 02:01:09.152000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 02:01:09.154624 kernel: kauditd_printk_skb: 235 callbacks suppressed Dec 13 02:01:09.154686 kernel: audit: type=1305 audit(1734055269.152:197): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 02:01:09.154713 auditctl[1330]: No rules Dec 13 02:01:09.154762 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 02:01:09.154872 systemd[1]: Stopped audit-rules.service. Dec 13 02:01:09.152000 audit[1330]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc2247c830 a2=420 a3=0 items=0 ppid=1 pid=1330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:09.155871 systemd[1]: Starting audit-rules.service... Dec 13 02:01:09.161193 kernel: audit: type=1300 audit(1734055269.152:197): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc2247c830 a2=420 a3=0 items=0 ppid=1 pid=1330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:09.161244 kernel: audit: type=1327 audit(1734055269.152:197): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 02:01:09.152000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 02:01:09.164097 kernel: audit: type=1131 audit(1734055269.154:198): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:09.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:09.174237 augenrules[1348]: No rules Dec 13 02:01:09.174828 systemd[1]: Finished audit-rules.service. Dec 13 02:01:09.182384 kernel: audit: type=1130 audit(1734055269.173:199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:09.182501 kernel: audit: type=1106 audit(1734055269.174:200): pid=1325 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:01:09.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:09.174000 audit[1325]: USER_END pid=1325 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:01:09.175761 sudo[1325]: pam_unix(sudo:session): session closed for user root Dec 13 02:01:09.180044 systemd[1]: sshd@7-10.0.0.73:22-10.0.0.1:57888.service: Deactivated successfully. Dec 13 02:01:09.176917 sshd[1322]: pam_unix(sshd:session): session closed for user core Dec 13 02:01:09.180612 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 02:01:09.181279 systemd-logind[1189]: Session 8 logged out. Waiting for processes to exit. Dec 13 02:01:09.182280 systemd[1]: Started sshd@8-10.0.0.73:22-10.0.0.1:57902.service. Dec 13 02:01:09.186449 kernel: audit: type=1104 audit(1734055269.174:201): pid=1325 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:01:09.174000 audit[1325]: CRED_DISP pid=1325 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:01:09.183552 systemd-logind[1189]: Removed session 8. Dec 13 02:01:09.174000 audit[1322]: USER_END pid=1322 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:09.190944 kernel: audit: type=1106 audit(1734055269.174:202): pid=1322 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:09.191001 kernel: audit: type=1104 audit(1734055269.174:203): pid=1322 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:09.174000 audit[1322]: CRED_DISP pid=1322 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:09.194550 kernel: audit: type=1131 audit(1734055269.178:204): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.73:22-10.0.0.1:57888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:09.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.73:22-10.0.0.1:57888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:09.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.73:22-10.0.0.1:57902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:09.222000 audit[1354]: USER_ACCT pid=1354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:09.223841 sshd[1354]: Accepted publickey for core from 10.0.0.1 port 57902 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:01:09.223000 audit[1354]: CRED_ACQ pid=1354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:09.223000 audit[1354]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd16b36af0 a2=3 a3=0 items=0 ppid=1 pid=1354 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:09.223000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:01:09.225221 sshd[1354]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:01:09.229148 systemd-logind[1189]: New session 9 of user core. Dec 13 02:01:09.230978 systemd[1]: Started session-9.scope. Dec 13 02:01:09.233538 systemd[1]: Started kubelet.service. Dec 13 02:01:09.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:09.236000 audit[1354]: USER_START pid=1354 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:09.237000 audit[1363]: CRED_ACQ pid=1363 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:09.278235 kubelet[1358]: E1213 02:01:09.278154 1358 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:01:09.281164 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:01:09.281273 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:01:09.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:01:09.284000 audit[1367]: USER_ACCT pid=1367 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:01:09.285254 sudo[1367]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 02:01:09.284000 audit[1367]: CRED_REFR pid=1367 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:01:09.285498 sudo[1367]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 02:01:09.285000 audit[1367]: USER_START pid=1367 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:01:09.303848 systemd[1]: Starting docker.service... Dec 13 02:01:09.337109 env[1380]: time="2024-12-13T02:01:09.337068218Z" level=info msg="Starting up" Dec 13 02:01:09.338530 env[1380]: time="2024-12-13T02:01:09.338501147Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 02:01:09.338530 env[1380]: time="2024-12-13T02:01:09.338522336Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 02:01:09.338618 env[1380]: time="2024-12-13T02:01:09.338546274Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 02:01:09.338618 env[1380]: time="2024-12-13T02:01:09.338557143Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 02:01:09.339989 env[1380]: time="2024-12-13T02:01:09.339965412Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 02:01:09.339989 env[1380]: time="2024-12-13T02:01:09.339981280Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 02:01:09.340085 env[1380]: time="2024-12-13T02:01:09.339993264Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 02:01:09.340085 env[1380]: time="2024-12-13T02:01:09.340002037Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 02:01:09.727594 env[1380]: time="2024-12-13T02:01:09.727546155Z" level=info msg="Loading containers: start." Dec 13 02:01:09.773000 audit[1414]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:09.773000 audit[1414]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffff90ccb80 a2=0 a3=7ffff90ccb6c items=0 ppid=1380 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:09.773000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 02:01:09.774000 audit[1416]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1416 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:09.774000 audit[1416]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff27653180 a2=0 a3=7fff2765316c items=0 ppid=1380 pid=1416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:09.774000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 02:01:09.775000 audit[1418]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1418 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:09.775000 audit[1418]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe616ff100 a2=0 a3=7ffe616ff0ec items=0 ppid=1380 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:09.775000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 02:01:09.777000 audit[1420]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:09.777000 audit[1420]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe0f5936d0 a2=0 a3=7ffe0f5936bc items=0 ppid=1380 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:09.777000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 02:01:09.778000 audit[1422]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:09.778000 audit[1422]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffea2df3240 a2=0 a3=7ffea2df322c items=0 ppid=1380 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:09.778000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 02:01:09.801000 audit[1427]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:09.801000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdf538dda0 a2=0 a3=7ffdf538dd8c items=0 ppid=1380 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:09.801000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 02:01:09.809000 audit[1429]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:09.809000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdb0bbebe0 a2=0 a3=7ffdb0bbebcc items=0 ppid=1380 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:09.809000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 02:01:09.811000 audit[1431]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:09.811000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffe34b76380 a2=0 a3=7ffe34b7636c items=0 ppid=1380 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:09.811000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 02:01:09.812000 audit[1433]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:09.812000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffcda93e780 a2=0 a3=7ffcda93e76c items=0 ppid=1380 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:09.812000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:01:09.820000 audit[1437]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:09.820000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd2a9a7ec0 a2=0 a3=7ffd2a9a7eac items=0 ppid=1380 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:09.820000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:01:09.831000 audit[1438]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:09.831000 audit[1438]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc856ac920 a2=0 a3=7ffc856ac90c items=0 ppid=1380 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:09.831000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:01:09.840081 kernel: Initializing XFRM netlink socket Dec 13 02:01:09.866483 env[1380]: time="2024-12-13T02:01:09.866438401Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 02:01:09.879000 audit[1446]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:09.879000 audit[1446]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffeaa0a77b0 a2=0 a3=7ffeaa0a779c items=0 ppid=1380 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:09.879000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 02:01:09.889000 audit[1449]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:09.889000 audit[1449]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffd2c4a1670 a2=0 a3=7ffd2c4a165c items=0 ppid=1380 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:09.889000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 02:01:09.891000 audit[1452]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1452 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:09.891000 audit[1452]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff8a4b0130 a2=0 a3=7fff8a4b011c items=0 ppid=1380 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:09.891000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 02:01:09.893000 audit[1454]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1454 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:09.893000 audit[1454]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffbdfc0a40 a2=0 a3=7fffbdfc0a2c items=0 ppid=1380 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:09.893000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 02:01:09.894000 audit[1456]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1456 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:09.894000 audit[1456]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffd6deb1b00 a2=0 a3=7ffd6deb1aec items=0 ppid=1380 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:09.894000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 02:01:09.896000 audit[1458]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1458 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:09.896000 audit[1458]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffc98e0c590 a2=0 a3=7ffc98e0c57c items=0 ppid=1380 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:09.896000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 02:01:09.897000 audit[1460]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1460 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:09.897000 audit[1460]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffdadc38e80 a2=0 a3=7ffdadc38e6c items=0 ppid=1380 pid=1460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:09.897000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 02:01:09.904000 audit[1463]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1463 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:09.904000 audit[1463]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fffb40c7b40 a2=0 a3=7fffb40c7b2c items=0 ppid=1380 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:09.904000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 02:01:09.905000 audit[1465]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1465 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:09.905000 audit[1465]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff238b9040 a2=0 a3=7fff238b902c items=0 ppid=1380 pid=1465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:09.905000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 02:01:09.907000 audit[1467]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1467 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:09.907000 audit[1467]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd0bae7750 a2=0 a3=7ffd0bae773c items=0 ppid=1380 pid=1467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:09.907000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 02:01:09.908000 audit[1469]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1469 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:09.908000 audit[1469]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc702930d0 a2=0 a3=7ffc702930bc items=0 ppid=1380 pid=1469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:09.908000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 02:01:09.909905 systemd-networkd[1030]: docker0: Link UP Dec 13 02:01:09.917000 audit[1473]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1473 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:09.917000 audit[1473]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe01e736b0 a2=0 a3=7ffe01e7369c items=0 ppid=1380 pid=1473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:09.917000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:01:09.925000 audit[1474]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1474 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:09.925000 audit[1474]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc5b854160 a2=0 a3=7ffc5b85414c items=0 ppid=1380 pid=1474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:09.925000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 02:01:09.927179 env[1380]: time="2024-12-13T02:01:09.927143345Z" level=info msg="Loading containers: done." Dec 13 02:01:09.940690 env[1380]: time="2024-12-13T02:01:09.940654019Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 02:01:09.940823 env[1380]: time="2024-12-13T02:01:09.940795780Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 02:01:09.940891 env[1380]: time="2024-12-13T02:01:09.940876436Z" level=info msg="Daemon has completed initialization" Dec 13 02:01:09.957203 systemd[1]: Started docker.service. Dec 13 02:01:09.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:09.960793 env[1380]: time="2024-12-13T02:01:09.960759594Z" level=info msg="API listen on /run/docker.sock" Dec 13 02:01:10.680719 env[1210]: time="2024-12-13T02:01:10.680676312Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\"" Dec 13 02:01:11.589324 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2363662813.mount: Deactivated successfully. Dec 13 02:01:13.285139 env[1210]: time="2024-12-13T02:01:13.285080747Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:13.287270 env[1210]: time="2024-12-13T02:01:13.287219730Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:92fbbe8caf9c923e0406b93c082b9e7af30032ace2d836c785633f90514bfefa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:13.289148 env[1210]: time="2024-12-13T02:01:13.289076214Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:13.291121 env[1210]: time="2024-12-13T02:01:13.291092336Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2804b1e7b9e08f3a3468f8fd2f6487c55968b9293ee51b9efb865b3298acfa26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:13.291779 env[1210]: time="2024-12-13T02:01:13.291748330Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\" returns image reference \"sha256:92fbbe8caf9c923e0406b93c082b9e7af30032ace2d836c785633f90514bfefa\"" Dec 13 02:01:13.301418 env[1210]: time="2024-12-13T02:01:13.301372211Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\"" Dec 13 02:01:16.330005 env[1210]: time="2024-12-13T02:01:16.329943650Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:16.331943 env[1210]: time="2024-12-13T02:01:16.331898580Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f3b58a53109c96b6bf82adb5973fefa4baec46e2e9ee200be5cc03f3afbf127d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:16.333506 env[1210]: time="2024-12-13T02:01:16.333465970Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:16.335170 env[1210]: time="2024-12-13T02:01:16.335117958Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:e2f26a3f5ef3fd01f6330cab8b078cf303cfb6d36911a210d0915d535910e412,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:16.336116 env[1210]: time="2024-12-13T02:01:16.336085168Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\" returns image reference \"sha256:f3b58a53109c96b6bf82adb5973fefa4baec46e2e9ee200be5cc03f3afbf127d\"" Dec 13 02:01:16.345337 env[1210]: time="2024-12-13T02:01:16.345313160Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\"" Dec 13 02:01:18.461452 env[1210]: time="2024-12-13T02:01:18.461382995Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:18.463381 env[1210]: time="2024-12-13T02:01:18.463319327Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6d3373aa79026111619cc6cc1ffff8b27006c56422e7c95724b03a61b530eaf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:18.465395 env[1210]: time="2024-12-13T02:01:18.465354889Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:18.467009 env[1210]: time="2024-12-13T02:01:18.466960451Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:ed66e2102f4705d45de7513decf3ac61879704984409323779d19e98b970568c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:18.467818 env[1210]: time="2024-12-13T02:01:18.467769476Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\" returns image reference \"sha256:e6d3373aa79026111619cc6cc1ffff8b27006c56422e7c95724b03a61b530eaf\"" Dec 13 02:01:18.477631 env[1210]: time="2024-12-13T02:01:18.477583535Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 02:01:19.395574 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 02:01:19.404444 kernel: kauditd_printk_skb: 86 callbacks suppressed Dec 13 02:01:19.404502 kernel: audit: type=1130 audit(1734055279.395:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:19.404530 kernel: audit: type=1131 audit(1734055279.395:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:19.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:19.395000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:19.395788 systemd[1]: Stopped kubelet.service. Dec 13 02:01:19.397209 systemd[1]: Starting kubelet.service... Dec 13 02:01:19.471622 systemd[1]: Started kubelet.service. Dec 13 02:01:19.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:19.476074 kernel: audit: type=1130 audit(1734055279.471:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:19.514506 kubelet[1539]: E1213 02:01:19.514436 1539 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 02:01:19.517119 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 02:01:19.517235 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 02:01:19.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:01:19.521069 kernel: audit: type=1131 audit(1734055279.516:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 02:01:19.533648 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4089920638.mount: Deactivated successfully. Dec 13 02:01:21.054505 env[1210]: time="2024-12-13T02:01:21.054431907Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:21.056987 env[1210]: time="2024-12-13T02:01:21.056932416Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:21.058642 env[1210]: time="2024-12-13T02:01:21.058606633Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:21.060149 env[1210]: time="2024-12-13T02:01:21.060082899Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:21.060433 env[1210]: time="2024-12-13T02:01:21.060391449Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153\"" Dec 13 02:01:21.072462 env[1210]: time="2024-12-13T02:01:21.072402721Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 02:01:21.632636 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3154590937.mount: Deactivated successfully. Dec 13 02:01:22.572360 env[1210]: time="2024-12-13T02:01:22.572292070Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:22.575259 env[1210]: time="2024-12-13T02:01:22.575229643Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:22.576986 env[1210]: time="2024-12-13T02:01:22.576939504Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:22.578556 env[1210]: time="2024-12-13T02:01:22.578509367Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:22.579062 env[1210]: time="2024-12-13T02:01:22.579016389Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 02:01:22.587091 env[1210]: time="2024-12-13T02:01:22.587061615Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Dec 13 02:01:23.109732 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3483457643.mount: Deactivated successfully. Dec 13 02:01:23.115279 env[1210]: time="2024-12-13T02:01:23.115220079Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:23.116955 env[1210]: time="2024-12-13T02:01:23.116913385Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:23.118578 env[1210]: time="2024-12-13T02:01:23.118525919Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:23.119779 env[1210]: time="2024-12-13T02:01:23.119733840Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:23.120171 env[1210]: time="2024-12-13T02:01:23.120135515Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Dec 13 02:01:23.128088 env[1210]: time="2024-12-13T02:01:23.128032482Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Dec 13 02:01:23.702644 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount607363056.mount: Deactivated successfully. Dec 13 02:01:26.448195 env[1210]: time="2024-12-13T02:01:26.448123260Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:26.450034 env[1210]: time="2024-12-13T02:01:26.449980900Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:26.452014 env[1210]: time="2024-12-13T02:01:26.451960392Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:26.453900 env[1210]: time="2024-12-13T02:01:26.453867053Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:26.454887 env[1210]: time="2024-12-13T02:01:26.454829326Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7\"" Dec 13 02:01:28.999749 systemd[1]: Stopped kubelet.service. Dec 13 02:01:28.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:29.002291 systemd[1]: Starting kubelet.service... Dec 13 02:01:28.998000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:29.006761 kernel: audit: type=1130 audit(1734055288.998:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:29.006841 kernel: audit: type=1131 audit(1734055288.998:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:29.023300 systemd[1]: Reloading. Dec 13 02:01:29.090091 /usr/lib/systemd/system-generators/torcx-generator[1670]: time="2024-12-13T02:01:29Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:01:29.090129 /usr/lib/systemd/system-generators/torcx-generator[1670]: time="2024-12-13T02:01:29Z" level=info msg="torcx already run" Dec 13 02:01:29.413318 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:01:29.413334 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:01:29.430141 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:01:29.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.498382 kernel: audit: type=1400 audit(1734055289.490:247): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.498433 kernel: audit: type=1400 audit(1734055289.490:248): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.498452 kernel: audit: type=1400 audit(1734055289.490:249): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.505150 kernel: audit: type=1400 audit(1734055289.490:250): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.505204 kernel: audit: type=1400 audit(1734055289.490:251): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.508501 kernel: audit: type=1400 audit(1734055289.490:252): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.511965 kernel: audit: type=1400 audit(1734055289.490:253): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.515083 kernel: audit: type=1400 audit(1734055289.490:254): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.490000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.497000 audit: BPF prog-id=43 op=LOAD Dec 13 02:01:29.497000 audit: BPF prog-id=38 op=UNLOAD Dec 13 02:01:29.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.504000 audit: BPF prog-id=44 op=LOAD Dec 13 02:01:29.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.510000 audit: BPF prog-id=45 op=LOAD Dec 13 02:01:29.510000 audit: BPF prog-id=39 op=UNLOAD Dec 13 02:01:29.510000 audit: BPF prog-id=40 op=UNLOAD Dec 13 02:01:29.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.512000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.512000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.517000 audit: BPF prog-id=46 op=LOAD Dec 13 02:01:29.517000 audit: BPF prog-id=27 op=UNLOAD Dec 13 02:01:29.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.517000 audit: BPF prog-id=47 op=LOAD Dec 13 02:01:29.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.517000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.517000 audit: BPF prog-id=48 op=LOAD Dec 13 02:01:29.517000 audit: BPF prog-id=28 op=UNLOAD Dec 13 02:01:29.517000 audit: BPF prog-id=29 op=UNLOAD Dec 13 02:01:29.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.518000 audit: BPF prog-id=49 op=LOAD Dec 13 02:01:29.518000 audit: BPF prog-id=30 op=UNLOAD Dec 13 02:01:29.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.518000 audit: BPF prog-id=50 op=LOAD Dec 13 02:01:29.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.518000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.518000 audit: BPF prog-id=51 op=LOAD Dec 13 02:01:29.518000 audit: BPF prog-id=31 op=UNLOAD Dec 13 02:01:29.518000 audit: BPF prog-id=32 op=UNLOAD Dec 13 02:01:29.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.520000 audit: BPF prog-id=52 op=LOAD Dec 13 02:01:29.520000 audit: BPF prog-id=37 op=UNLOAD Dec 13 02:01:29.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.520000 audit: BPF prog-id=53 op=LOAD Dec 13 02:01:29.520000 audit: BPF prog-id=41 op=UNLOAD Dec 13 02:01:29.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.521000 audit: BPF prog-id=54 op=LOAD Dec 13 02:01:29.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.521000 audit: BPF prog-id=55 op=LOAD Dec 13 02:01:29.521000 audit: BPF prog-id=33 op=UNLOAD Dec 13 02:01:29.521000 audit: BPF prog-id=34 op=UNLOAD Dec 13 02:01:29.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.522000 audit: BPF prog-id=56 op=LOAD Dec 13 02:01:29.522000 audit: BPF prog-id=35 op=UNLOAD Dec 13 02:01:29.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:29.522000 audit: BPF prog-id=57 op=LOAD Dec 13 02:01:29.522000 audit: BPF prog-id=36 op=UNLOAD Dec 13 02:01:29.533724 systemd[1]: Started kubelet.service. Dec 13 02:01:29.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:29.537145 systemd[1]: Stopping kubelet.service... Dec 13 02:01:29.537482 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 02:01:29.537644 systemd[1]: Stopped kubelet.service. Dec 13 02:01:29.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:29.539023 systemd[1]: Starting kubelet.service... Dec 13 02:01:29.612631 systemd[1]: Started kubelet.service. Dec 13 02:01:29.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:29.652516 kubelet[1719]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:01:29.652516 kubelet[1719]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 02:01:29.652516 kubelet[1719]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:01:29.652884 kubelet[1719]: I1213 02:01:29.652547 1719 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 02:01:30.004674 kubelet[1719]: I1213 02:01:30.004640 1719 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 02:01:30.004674 kubelet[1719]: I1213 02:01:30.004665 1719 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 02:01:30.004875 kubelet[1719]: I1213 02:01:30.004859 1719 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 02:01:30.027555 kubelet[1719]: I1213 02:01:30.027517 1719 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 02:01:30.027962 kubelet[1719]: E1213 02:01:30.027937 1719 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.73:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.73:6443: connect: connection refused Dec 13 02:01:30.040799 kubelet[1719]: I1213 02:01:30.040757 1719 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 02:01:30.041010 kubelet[1719]: I1213 02:01:30.040990 1719 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 02:01:30.041216 kubelet[1719]: I1213 02:01:30.041196 1719 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 02:01:30.041341 kubelet[1719]: I1213 02:01:30.041219 1719 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 02:01:30.041341 kubelet[1719]: I1213 02:01:30.041230 1719 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 02:01:30.041341 kubelet[1719]: I1213 02:01:30.041335 1719 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:01:30.041437 kubelet[1719]: I1213 02:01:30.041427 1719 kubelet.go:396] "Attempting to sync node with API server" Dec 13 02:01:30.041472 kubelet[1719]: I1213 02:01:30.041443 1719 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 02:01:30.041472 kubelet[1719]: I1213 02:01:30.041468 1719 kubelet.go:312] "Adding apiserver pod source" Dec 13 02:01:30.041518 kubelet[1719]: I1213 02:01:30.041481 1719 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 02:01:30.042251 kubelet[1719]: W1213 02:01:30.042214 1719 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.0.0.73:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.73:6443: connect: connection refused Dec 13 02:01:30.042294 kubelet[1719]: E1213 02:01:30.042257 1719 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.73:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.73:6443: connect: connection refused Dec 13 02:01:30.042351 kubelet[1719]: W1213 02:01:30.042217 1719 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.0.0.73:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.73:6443: connect: connection refused Dec 13 02:01:30.042446 kubelet[1719]: E1213 02:01:30.042429 1719 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.73:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.73:6443: connect: connection refused Dec 13 02:01:30.042656 kubelet[1719]: I1213 02:01:30.042642 1719 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 02:01:30.049390 kubelet[1719]: I1213 02:01:30.049357 1719 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 02:01:30.049489 kubelet[1719]: W1213 02:01:30.049442 1719 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 02:01:30.050021 kubelet[1719]: I1213 02:01:30.050003 1719 server.go:1256] "Started kubelet" Dec 13 02:01:30.050738 kubelet[1719]: I1213 02:01:30.050312 1719 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 02:01:30.054438 kubelet[1719]: I1213 02:01:30.054407 1719 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 02:01:30.054612 kubelet[1719]: I1213 02:01:30.054587 1719 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 02:01:30.055267 kubelet[1719]: I1213 02:01:30.055245 1719 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 02:01:30.055319 kubelet[1719]: I1213 02:01:30.055283 1719 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 02:01:30.055362 kubelet[1719]: I1213 02:01:30.055346 1719 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 02:01:30.054000 audit[1719]: AVC avc: denied { mac_admin } for pid=1719 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:30.054000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:01:30.054000 audit[1719]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d59320 a1=c000d53d40 a2=c000d592f0 a3=25 items=0 ppid=1 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:30.054000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:01:30.054000 audit[1719]: AVC avc: denied { mac_admin } for pid=1719 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:30.054000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:01:30.054000 audit[1719]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d57b40 a1=c000d53d58 a2=c000d593b0 a3=25 items=0 ppid=1 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:30.054000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:01:30.055867 kubelet[1719]: I1213 02:01:30.055727 1719 server.go:461] "Adding debug handlers to kubelet server" Dec 13 02:01:30.056000 audit[1731]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:30.056000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd90bbdd00 a2=0 a3=7ffd90bbdcec items=0 ppid=1719 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:30.056000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 02:01:30.057000 audit[1732]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:30.057000 audit[1732]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc9ad5c8c0 a2=0 a3=7ffc9ad5c8ac items=0 ppid=1719 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:30.057000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 02:01:30.060215 kubelet[1719]: E1213 02:01:30.059537 1719 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 02:01:30.060215 kubelet[1719]: I1213 02:01:30.059647 1719 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 02:01:30.059000 audit[1734]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:30.059000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffd698eb10 a2=0 a3=7fffd698eafc items=0 ppid=1719 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:30.059000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:01:30.061273 kubelet[1719]: I1213 02:01:30.060842 1719 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 02:01:30.061448 kubelet[1719]: I1213 02:01:30.061107 1719 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 02:01:30.061000 audit[1736]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1736 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:30.061000 audit[1736]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd3151cb50 a2=0 a3=7ffd3151cb3c items=0 ppid=1719 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:30.061000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:01:30.064629 kubelet[1719]: E1213 02:01:30.064603 1719 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.73:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.73:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.18109a195050d5c1 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2024-12-13 02:01:30.049975745 +0000 UTC m=+0.433337615,LastTimestamp:2024-12-13 02:01:30.049975745 +0000 UTC m=+0.433337615,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Dec 13 02:01:30.064762 kubelet[1719]: W1213 02:01:30.064695 1719 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.0.0.73:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.73:6443: connect: connection refused Dec 13 02:01:30.064762 kubelet[1719]: E1213 02:01:30.064731 1719 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.73:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.73:6443: connect: connection refused Dec 13 02:01:30.065290 kubelet[1719]: E1213 02:01:30.065269 1719 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.73:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.73:6443: connect: connection refused" interval="200ms" Dec 13 02:01:30.065454 kubelet[1719]: I1213 02:01:30.065435 1719 factory.go:221] Registration of the systemd container factory successfully Dec 13 02:01:30.065575 kubelet[1719]: I1213 02:01:30.065549 1719 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 02:01:30.068295 kubelet[1719]: I1213 02:01:30.068272 1719 factory.go:221] Registration of the containerd container factory successfully Dec 13 02:01:30.068000 audit[1740]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:30.068000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff3151d9b0 a2=0 a3=7fff3151d99c items=0 ppid=1719 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:30.068000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 02:01:30.069568 kubelet[1719]: I1213 02:01:30.069538 1719 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 02:01:30.069000 audit[1742]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:01:30.069000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff564a6a70 a2=0 a3=7fff564a6a5c items=0 ppid=1719 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:30.069000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 02:01:30.070526 kubelet[1719]: I1213 02:01:30.070499 1719 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 02:01:30.070526 kubelet[1719]: I1213 02:01:30.070521 1719 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 02:01:30.070583 kubelet[1719]: I1213 02:01:30.070542 1719 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 02:01:30.070611 kubelet[1719]: E1213 02:01:30.070589 1719 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 02:01:30.069000 audit[1743]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1743 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:30.069000 audit[1743]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffec6caf5b0 a2=0 a3=7ffec6caf59c items=0 ppid=1719 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:30.069000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 02:01:30.070000 audit[1745]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1745 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:30.070000 audit[1745]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc6fb28040 a2=0 a3=7ffc6fb2802c items=0 ppid=1719 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:30.070000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 02:01:30.071000 audit[1744]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:01:30.071000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc5d979b10 a2=0 a3=7ffc5d979afc items=0 ppid=1719 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:30.071000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 02:01:30.071000 audit[1746]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:30.071000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe23947360 a2=0 a3=7ffe2394734c items=0 ppid=1719 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:30.071000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 02:01:30.072000 audit[1747]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:01:30.072000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fffd6946a70 a2=0 a3=7fffd6946a5c items=0 ppid=1719 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:30.072000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 02:01:30.073000 audit[1748]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1748 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:01:30.073000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe2070c730 a2=0 a3=7ffe2070c71c items=0 ppid=1719 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:30.073000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 02:01:30.075889 kubelet[1719]: W1213 02:01:30.075837 1719 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.0.0.73:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.73:6443: connect: connection refused Dec 13 02:01:30.075889 kubelet[1719]: E1213 02:01:30.075886 1719 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.73:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.73:6443: connect: connection refused Dec 13 02:01:30.077515 kubelet[1719]: I1213 02:01:30.077493 1719 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 02:01:30.077515 kubelet[1719]: I1213 02:01:30.077513 1719 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 02:01:30.077587 kubelet[1719]: I1213 02:01:30.077533 1719 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:01:30.161888 kubelet[1719]: I1213 02:01:30.161841 1719 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 02:01:30.162233 kubelet[1719]: E1213 02:01:30.162212 1719 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.73:6443/api/v1/nodes\": dial tcp 10.0.0.73:6443: connect: connection refused" node="localhost" Dec 13 02:01:30.171511 kubelet[1719]: E1213 02:01:30.171474 1719 kubelet.go:2353] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 13 02:01:30.266459 kubelet[1719]: E1213 02:01:30.266330 1719 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.73:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.73:6443: connect: connection refused" interval="400ms" Dec 13 02:01:30.363765 kubelet[1719]: I1213 02:01:30.363742 1719 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 02:01:30.364044 kubelet[1719]: E1213 02:01:30.364022 1719 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.73:6443/api/v1/nodes\": dial tcp 10.0.0.73:6443: connect: connection refused" node="localhost" Dec 13 02:01:30.372176 kubelet[1719]: E1213 02:01:30.372140 1719 kubelet.go:2353] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 13 02:01:30.538316 kubelet[1719]: I1213 02:01:30.538153 1719 policy_none.go:49] "None policy: Start" Dec 13 02:01:30.539174 kubelet[1719]: I1213 02:01:30.539142 1719 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 02:01:30.539174 kubelet[1719]: I1213 02:01:30.539178 1719 state_mem.go:35] "Initializing new in-memory state store" Dec 13 02:01:30.667653 kubelet[1719]: E1213 02:01:30.667615 1719 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.73:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.73:6443: connect: connection refused" interval="800ms" Dec 13 02:01:30.765983 kubelet[1719]: I1213 02:01:30.765955 1719 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 02:01:30.766396 kubelet[1719]: E1213 02:01:30.766360 1719 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.73:6443/api/v1/nodes\": dial tcp 10.0.0.73:6443: connect: connection refused" node="localhost" Dec 13 02:01:30.772433 kubelet[1719]: E1213 02:01:30.772407 1719 kubelet.go:2353] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 13 02:01:30.909608 kubelet[1719]: W1213 02:01:30.909574 1719 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.0.0.73:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.73:6443: connect: connection refused Dec 13 02:01:30.909608 kubelet[1719]: E1213 02:01:30.909612 1719 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.73:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.73:6443: connect: connection refused Dec 13 02:01:31.112182 kubelet[1719]: W1213 02:01:31.112106 1719 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.0.0.73:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.73:6443: connect: connection refused Dec 13 02:01:31.112182 kubelet[1719]: E1213 02:01:31.112179 1719 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.73:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.73:6443: connect: connection refused Dec 13 02:01:31.150415 kubelet[1719]: W1213 02:01:31.150371 1719 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.0.0.73:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.73:6443: connect: connection refused Dec 13 02:01:31.150415 kubelet[1719]: E1213 02:01:31.150410 1719 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.73:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.73:6443: connect: connection refused Dec 13 02:01:31.176091 kubelet[1719]: W1213 02:01:31.175998 1719 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.0.0.73:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.73:6443: connect: connection refused Dec 13 02:01:31.176091 kubelet[1719]: E1213 02:01:31.176023 1719 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.73:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.73:6443: connect: connection refused Dec 13 02:01:31.469009 kubelet[1719]: E1213 02:01:31.468899 1719 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.73:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.73:6443: connect: connection refused" interval="1.6s" Dec 13 02:01:31.555170 systemd[1]: Created slice kubepods.slice. Dec 13 02:01:31.558528 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 02:01:31.560924 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 02:01:31.567498 kubelet[1719]: I1213 02:01:31.567479 1719 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 02:01:31.567772 kubelet[1719]: E1213 02:01:31.567759 1719 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.73:6443/api/v1/nodes\": dial tcp 10.0.0.73:6443: connect: connection refused" node="localhost" Dec 13 02:01:31.571605 kubelet[1719]: I1213 02:01:31.571591 1719 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 02:01:31.570000 audit[1719]: AVC avc: denied { mac_admin } for pid=1719 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:31.570000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:01:31.570000 audit[1719]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000fc0930 a1=c000fb9218 a2=c000fc0900 a3=25 items=0 ppid=1 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:31.570000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:01:31.571913 kubelet[1719]: I1213 02:01:31.571719 1719 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 02:01:31.571913 kubelet[1719]: I1213 02:01:31.571899 1719 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 02:01:31.572489 kubelet[1719]: I1213 02:01:31.572463 1719 topology_manager.go:215] "Topology Admit Handler" podUID="4f8e0d694c07e04969646aa3c152c34a" podNamespace="kube-system" podName="kube-controller-manager-localhost" Dec 13 02:01:31.572674 kubelet[1719]: E1213 02:01:31.572656 1719 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Dec 13 02:01:31.573344 kubelet[1719]: I1213 02:01:31.573326 1719 topology_manager.go:215] "Topology Admit Handler" podUID="c4144e8f85b2123a6afada0c1705bbba" podNamespace="kube-system" podName="kube-scheduler-localhost" Dec 13 02:01:31.573937 kubelet[1719]: I1213 02:01:31.573920 1719 topology_manager.go:215] "Topology Admit Handler" podUID="dda7b22ad6c9e8af082ce62b5d3678f8" podNamespace="kube-system" podName="kube-apiserver-localhost" Dec 13 02:01:31.577307 systemd[1]: Created slice kubepods-burstable-pod4f8e0d694c07e04969646aa3c152c34a.slice. Dec 13 02:01:31.584795 systemd[1]: Created slice kubepods-burstable-podc4144e8f85b2123a6afada0c1705bbba.slice. Dec 13 02:01:31.593359 systemd[1]: Created slice kubepods-burstable-poddda7b22ad6c9e8af082ce62b5d3678f8.slice. Dec 13 02:01:31.671062 kubelet[1719]: I1213 02:01:31.671000 1719 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/dda7b22ad6c9e8af082ce62b5d3678f8-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"dda7b22ad6c9e8af082ce62b5d3678f8\") " pod="kube-system/kube-apiserver-localhost" Dec 13 02:01:31.671062 kubelet[1719]: I1213 02:01:31.671044 1719 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:01:31.671452 kubelet[1719]: I1213 02:01:31.671079 1719 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:01:31.671452 kubelet[1719]: I1213 02:01:31.671097 1719 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/c4144e8f85b2123a6afada0c1705bbba-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"c4144e8f85b2123a6afada0c1705bbba\") " pod="kube-system/kube-scheduler-localhost" Dec 13 02:01:31.671452 kubelet[1719]: I1213 02:01:31.671114 1719 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/dda7b22ad6c9e8af082ce62b5d3678f8-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"dda7b22ad6c9e8af082ce62b5d3678f8\") " pod="kube-system/kube-apiserver-localhost" Dec 13 02:01:31.671452 kubelet[1719]: I1213 02:01:31.671157 1719 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/dda7b22ad6c9e8af082ce62b5d3678f8-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"dda7b22ad6c9e8af082ce62b5d3678f8\") " pod="kube-system/kube-apiserver-localhost" Dec 13 02:01:31.671452 kubelet[1719]: I1213 02:01:31.671196 1719 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:01:31.671562 kubelet[1719]: I1213 02:01:31.671221 1719 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:01:31.671562 kubelet[1719]: I1213 02:01:31.671261 1719 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:01:31.883223 kubelet[1719]: E1213 02:01:31.883117 1719 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:31.883786 env[1210]: time="2024-12-13T02:01:31.883743285Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:4f8e0d694c07e04969646aa3c152c34a,Namespace:kube-system,Attempt:0,}" Dec 13 02:01:31.892909 kubelet[1719]: E1213 02:01:31.892881 1719 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:31.893220 env[1210]: time="2024-12-13T02:01:31.893187083Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:c4144e8f85b2123a6afada0c1705bbba,Namespace:kube-system,Attempt:0,}" Dec 13 02:01:31.895378 kubelet[1719]: E1213 02:01:31.895363 1719 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:31.895659 env[1210]: time="2024-12-13T02:01:31.895638793Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:dda7b22ad6c9e8af082ce62b5d3678f8,Namespace:kube-system,Attempt:0,}" Dec 13 02:01:32.219889 kubelet[1719]: E1213 02:01:32.219849 1719 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.73:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.73:6443: connect: connection refused Dec 13 02:01:32.397774 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1279882591.mount: Deactivated successfully. Dec 13 02:01:32.401885 env[1210]: time="2024-12-13T02:01:32.401844126Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:32.404742 env[1210]: time="2024-12-13T02:01:32.404698352Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:32.408175 env[1210]: time="2024-12-13T02:01:32.408127504Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:32.409542 env[1210]: time="2024-12-13T02:01:32.409487262Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:32.410091 env[1210]: time="2024-12-13T02:01:32.410064552Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:32.412072 env[1210]: time="2024-12-13T02:01:32.412014867Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:32.413719 env[1210]: time="2024-12-13T02:01:32.413683170Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:32.415354 env[1210]: time="2024-12-13T02:01:32.415325692Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:32.416651 env[1210]: time="2024-12-13T02:01:32.416626744Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:32.418987 env[1210]: time="2024-12-13T02:01:32.418952246Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:32.420239 env[1210]: time="2024-12-13T02:01:32.420206375Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:32.420891 env[1210]: time="2024-12-13T02:01:32.420869736Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:32.439472 env[1210]: time="2024-12-13T02:01:32.436325685Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:01:32.439472 env[1210]: time="2024-12-13T02:01:32.436360625Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:01:32.439472 env[1210]: time="2024-12-13T02:01:32.436369693Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:01:32.439472 env[1210]: time="2024-12-13T02:01:32.436484821Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/737074ae79bfc7794e2f86531c761703f4563d5bb2c6a5a34926d88977e925c1 pid=1760 runtime=io.containerd.runc.v2 Dec 13 02:01:32.449124 systemd[1]: Started cri-containerd-737074ae79bfc7794e2f86531c761703f4563d5bb2c6a5a34926d88977e925c1.scope. Dec 13 02:01:32.454138 env[1210]: time="2024-12-13T02:01:32.453892598Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:01:32.454138 env[1210]: time="2024-12-13T02:01:32.453938980Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:01:32.454138 env[1210]: time="2024-12-13T02:01:32.453953720Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:01:32.454254 env[1210]: time="2024-12-13T02:01:32.454099330Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a33bfa095fdb6dab3152aa652e186a9b098fb4a91effca46e78596d6c3fe778b pid=1780 runtime=io.containerd.runc.v2 Dec 13 02:01:32.458260 env[1210]: time="2024-12-13T02:01:32.458103386Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:01:32.458260 env[1210]: time="2024-12-13T02:01:32.458156171Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:01:32.458260 env[1210]: time="2024-12-13T02:01:32.458169739Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:01:32.458464 env[1210]: time="2024-12-13T02:01:32.458386109Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/11fe57ca84766476bca8d2e8eea74abeb7b53a3af7fd12c8c5748ce8b5b805f0 pid=1799 runtime=io.containerd.runc.v2 Dec 13 02:01:32.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.458000 audit: BPF prog-id=58 op=LOAD Dec 13 02:01:32.459000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.459000 audit[1768]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1760 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:32.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733373037346165373962666337373934653266383635333163373631 Dec 13 02:01:32.459000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.459000 audit[1768]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1760 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:32.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733373037346165373962666337373934653266383635333163373631 Dec 13 02:01:32.459000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.459000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.459000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.459000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.459000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.459000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.459000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.459000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.459000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.459000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.459000 audit: BPF prog-id=59 op=LOAD Dec 13 02:01:32.459000 audit[1768]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00035a720 items=0 ppid=1760 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:32.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733373037346165373962666337373934653266383635333163373631 Dec 13 02:01:32.459000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.459000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.459000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.459000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.459000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.459000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.459000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.459000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.459000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.459000 audit: BPF prog-id=60 op=LOAD Dec 13 02:01:32.459000 audit[1768]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00035a768 items=0 ppid=1760 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:32.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733373037346165373962666337373934653266383635333163373631 Dec 13 02:01:32.459000 audit: BPF prog-id=60 op=UNLOAD Dec 13 02:01:32.459000 audit: BPF prog-id=59 op=UNLOAD Dec 13 02:01:32.459000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.459000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.459000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.459000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.459000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.459000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.459000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.459000 audit[1768]: AVC avc: denied { perfmon } for pid=1768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.459000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.459000 audit[1768]: AVC avc: denied { bpf } for pid=1768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.459000 audit: BPF prog-id=61 op=LOAD Dec 13 02:01:32.459000 audit[1768]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00035ab78 items=0 ppid=1760 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:32.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733373037346165373962666337373934653266383635333163373631 Dec 13 02:01:32.468246 systemd[1]: Started cri-containerd-a33bfa095fdb6dab3152aa652e186a9b098fb4a91effca46e78596d6c3fe778b.scope. Dec 13 02:01:32.472811 systemd[1]: Started cri-containerd-11fe57ca84766476bca8d2e8eea74abeb7b53a3af7fd12c8c5748ce8b5b805f0.scope. Dec 13 02:01:32.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.483000 audit: BPF prog-id=62 op=LOAD Dec 13 02:01:32.486377 env[1210]: time="2024-12-13T02:01:32.486325044Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:4f8e0d694c07e04969646aa3c152c34a,Namespace:kube-system,Attempt:0,} returns sandbox id \"737074ae79bfc7794e2f86531c761703f4563d5bb2c6a5a34926d88977e925c1\"" Dec 13 02:01:32.487463 kubelet[1719]: E1213 02:01:32.487436 1719 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:32.488000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.488000 audit[1812]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1780 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:32.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133336266613039356664623664616233313532616136353265313836 Dec 13 02:01:32.488000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.488000 audit[1812]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1780 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:32.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133336266613039356664623664616233313532616136353265313836 Dec 13 02:01:32.491179 env[1210]: time="2024-12-13T02:01:32.491132140Z" level=info msg="CreateContainer within sandbox \"737074ae79bfc7794e2f86531c761703f4563d5bb2c6a5a34926d88977e925c1\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 02:01:32.490000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.490000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.490000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.490000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.490000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.490000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.490000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.490000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.490000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.490000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.490000 audit: BPF prog-id=63 op=LOAD Dec 13 02:01:32.490000 audit[1812]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002870a0 items=0 ppid=1780 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:32.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133336266613039356664623664616233313532616136353265313836 Dec 13 02:01:32.490000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.490000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.490000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.490000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.490000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.490000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.490000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.490000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.490000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.490000 audit: BPF prog-id=64 op=LOAD Dec 13 02:01:32.490000 audit[1812]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002870e8 items=0 ppid=1780 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:32.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133336266613039356664623664616233313532616136353265313836 Dec 13 02:01:32.490000 audit: BPF prog-id=64 op=UNLOAD Dec 13 02:01:32.490000 audit: BPF prog-id=63 op=UNLOAD Dec 13 02:01:32.490000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.490000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.490000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.490000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.490000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.490000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.490000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.490000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.490000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.490000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.490000 audit: BPF prog-id=65 op=LOAD Dec 13 02:01:32.490000 audit[1812]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002874f8 items=0 ppid=1780 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:32.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133336266613039356664623664616233313532616136353265313836 Dec 13 02:01:32.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.493000 audit: BPF prog-id=66 op=LOAD Dec 13 02:01:32.493000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.493000 audit[1822]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=1799 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:32.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131666535376361383437363634373662636138643265386565613734 Dec 13 02:01:32.493000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.493000 audit[1822]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=1799 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:32.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131666535376361383437363634373662636138643265386565613734 Dec 13 02:01:32.493000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.493000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.493000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.493000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.493000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.493000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.493000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.493000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.493000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.493000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.493000 audit: BPF prog-id=67 op=LOAD Dec 13 02:01:32.493000 audit[1822]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0002849d0 items=0 ppid=1799 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:32.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131666535376361383437363634373662636138643265386565613734 Dec 13 02:01:32.493000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.493000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.493000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.493000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.493000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.493000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.493000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.493000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.493000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.493000 audit: BPF prog-id=68 op=LOAD Dec 13 02:01:32.493000 audit[1822]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000284a18 items=0 ppid=1799 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:32.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131666535376361383437363634373662636138643265386565613734 Dec 13 02:01:32.494000 audit: BPF prog-id=68 op=UNLOAD Dec 13 02:01:32.494000 audit: BPF prog-id=67 op=UNLOAD Dec 13 02:01:32.494000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.494000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.494000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.494000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.494000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.494000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.494000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.494000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.494000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.494000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.494000 audit: BPF prog-id=69 op=LOAD Dec 13 02:01:32.494000 audit[1822]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000284e28 items=0 ppid=1799 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:32.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131666535376361383437363634373662636138643265386565613734 Dec 13 02:01:32.518808 env[1210]: time="2024-12-13T02:01:32.518760115Z" level=info msg="CreateContainer within sandbox \"737074ae79bfc7794e2f86531c761703f4563d5bb2c6a5a34926d88977e925c1\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"458489d2a8ad9fc616790afed59d90a0f2d911de03698cafda7a7b8a9960184d\"" Dec 13 02:01:32.518957 env[1210]: time="2024-12-13T02:01:32.518833011Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:dda7b22ad6c9e8af082ce62b5d3678f8,Namespace:kube-system,Attempt:0,} returns sandbox id \"a33bfa095fdb6dab3152aa652e186a9b098fb4a91effca46e78596d6c3fe778b\"" Dec 13 02:01:32.519616 env[1210]: time="2024-12-13T02:01:32.519574527Z" level=info msg="StartContainer for \"458489d2a8ad9fc616790afed59d90a0f2d911de03698cafda7a7b8a9960184d\"" Dec 13 02:01:32.521346 kubelet[1719]: E1213 02:01:32.521193 1719 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:32.523143 env[1210]: time="2024-12-13T02:01:32.523108016Z" level=info msg="CreateContainer within sandbox \"a33bfa095fdb6dab3152aa652e186a9b098fb4a91effca46e78596d6c3fe778b\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 02:01:32.530480 env[1210]: time="2024-12-13T02:01:32.530444230Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:c4144e8f85b2123a6afada0c1705bbba,Namespace:kube-system,Attempt:0,} returns sandbox id \"11fe57ca84766476bca8d2e8eea74abeb7b53a3af7fd12c8c5748ce8b5b805f0\"" Dec 13 02:01:32.531391 kubelet[1719]: E1213 02:01:32.531373 1719 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:32.533767 env[1210]: time="2024-12-13T02:01:32.533738503Z" level=info msg="CreateContainer within sandbox \"11fe57ca84766476bca8d2e8eea74abeb7b53a3af7fd12c8c5748ce8b5b805f0\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 02:01:32.535512 systemd[1]: Started cri-containerd-458489d2a8ad9fc616790afed59d90a0f2d911de03698cafda7a7b8a9960184d.scope. Dec 13 02:01:32.540212 env[1210]: time="2024-12-13T02:01:32.539285512Z" level=info msg="CreateContainer within sandbox \"a33bfa095fdb6dab3152aa652e186a9b098fb4a91effca46e78596d6c3fe778b\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"94c00f7ee0aa63ae039df10466d0cb2b98b21f32f5bb91b4bd48d7f39c550f38\"" Dec 13 02:01:32.540212 env[1210]: time="2024-12-13T02:01:32.539617884Z" level=info msg="StartContainer for \"94c00f7ee0aa63ae039df10466d0cb2b98b21f32f5bb91b4bd48d7f39c550f38\"" Dec 13 02:01:32.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.547000 audit: BPF prog-id=70 op=LOAD Dec 13 02:01:32.549000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.549000 audit[1888]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1760 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:32.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435383438396432613861643966633631363739306166656435396439 Dec 13 02:01:32.549000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.549000 audit[1888]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1760 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:32.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435383438396432613861643966633631363739306166656435396439 Dec 13 02:01:32.549000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.549000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.549000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.549000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.549000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.549000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.549000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.549000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.549000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.549000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.549000 audit: BPF prog-id=71 op=LOAD Dec 13 02:01:32.549000 audit[1888]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00029be40 items=0 ppid=1760 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:32.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435383438396432613861643966633631363739306166656435396439 Dec 13 02:01:32.549000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.549000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.549000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.549000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.549000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.549000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.549000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.549000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.549000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.549000 audit: BPF prog-id=72 op=LOAD Dec 13 02:01:32.549000 audit[1888]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00029be88 items=0 ppid=1760 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:32.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435383438396432613861643966633631363739306166656435396439 Dec 13 02:01:32.549000 audit: BPF prog-id=72 op=UNLOAD Dec 13 02:01:32.549000 audit: BPF prog-id=71 op=UNLOAD Dec 13 02:01:32.549000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.549000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.549000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.549000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.549000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.549000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.549000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.549000 audit[1888]: AVC avc: denied { perfmon } for pid=1888 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.549000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.549000 audit[1888]: AVC avc: denied { bpf } for pid=1888 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.549000 audit: BPF prog-id=73 op=LOAD Dec 13 02:01:32.549000 audit[1888]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000414298 items=0 ppid=1760 pid=1888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:32.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435383438396432613861643966633631363739306166656435396439 Dec 13 02:01:32.554751 systemd[1]: Started cri-containerd-94c00f7ee0aa63ae039df10466d0cb2b98b21f32f5bb91b4bd48d7f39c550f38.scope. Dec 13 02:01:32.555760 env[1210]: time="2024-12-13T02:01:32.555713567Z" level=info msg="CreateContainer within sandbox \"11fe57ca84766476bca8d2e8eea74abeb7b53a3af7fd12c8c5748ce8b5b805f0\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"7dcf666843af4cb1ce876b755aacc20f15c1ca1cab2a8f73ca5ac73aacdc26df\"" Dec 13 02:01:32.557569 env[1210]: time="2024-12-13T02:01:32.557520998Z" level=info msg="StartContainer for \"7dcf666843af4cb1ce876b755aacc20f15c1ca1cab2a8f73ca5ac73aacdc26df\"" Dec 13 02:01:32.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.572000 audit: BPF prog-id=74 op=LOAD Dec 13 02:01:32.573000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.573000 audit[1915]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1780 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:32.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934633030663765653061613633616530333964663130343636643063 Dec 13 02:01:32.573000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.573000 audit[1915]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1780 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:32.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934633030663765653061613633616530333964663130343636643063 Dec 13 02:01:32.573000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.573000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.573000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.573000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.573000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.573000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.573000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.573000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.573000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.573000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.573000 audit: BPF prog-id=75 op=LOAD Dec 13 02:01:32.573000 audit[1915]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000328150 items=0 ppid=1780 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:32.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934633030663765653061613633616530333964663130343636643063 Dec 13 02:01:32.573000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.573000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.573000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.573000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.573000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.573000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.573000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.573000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.573000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.573000 audit: BPF prog-id=76 op=LOAD Dec 13 02:01:32.573000 audit[1915]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000328198 items=0 ppid=1780 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:32.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934633030663765653061613633616530333964663130343636643063 Dec 13 02:01:32.573000 audit: BPF prog-id=76 op=UNLOAD Dec 13 02:01:32.573000 audit: BPF prog-id=75 op=UNLOAD Dec 13 02:01:32.573000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.573000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.573000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.573000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.573000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.573000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.573000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.573000 audit[1915]: AVC avc: denied { perfmon } for pid=1915 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.573000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.573000 audit[1915]: AVC avc: denied { bpf } for pid=1915 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.573000 audit: BPF prog-id=77 op=LOAD Dec 13 02:01:32.573000 audit[1915]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003285a8 items=0 ppid=1780 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:32.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934633030663765653061613633616530333964663130343636643063 Dec 13 02:01:32.578802 systemd[1]: Started cri-containerd-7dcf666843af4cb1ce876b755aacc20f15c1ca1cab2a8f73ca5ac73aacdc26df.scope. Dec 13 02:01:32.580772 env[1210]: time="2024-12-13T02:01:32.578825006Z" level=info msg="StartContainer for \"458489d2a8ad9fc616790afed59d90a0f2d911de03698cafda7a7b8a9960184d\" returns successfully" Dec 13 02:01:32.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.593000 audit: BPF prog-id=78 op=LOAD Dec 13 02:01:32.593000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.593000 audit[1940]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=1799 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:32.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764636636363638343361663463623163653837366237353561616363 Dec 13 02:01:32.593000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.593000 audit[1940]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=1799 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:32.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764636636363638343361663463623163653837366237353561616363 Dec 13 02:01:32.593000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.593000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.593000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.593000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.593000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.593000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.593000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.593000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.593000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.593000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.593000 audit: BPF prog-id=79 op=LOAD Dec 13 02:01:32.593000 audit[1940]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c0002111e0 items=0 ppid=1799 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:32.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764636636363638343361663463623163653837366237353561616363 Dec 13 02:01:32.594000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.594000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.594000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.594000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.594000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.594000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.594000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.594000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.594000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.594000 audit: BPF prog-id=80 op=LOAD Dec 13 02:01:32.594000 audit[1940]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c000211228 items=0 ppid=1799 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:32.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764636636363638343361663463623163653837366237353561616363 Dec 13 02:01:32.594000 audit: BPF prog-id=80 op=UNLOAD Dec 13 02:01:32.594000 audit: BPF prog-id=79 op=UNLOAD Dec 13 02:01:32.594000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.594000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.594000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.594000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.594000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.594000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.594000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.594000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.594000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.594000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:32.594000 audit: BPF prog-id=81 op=LOAD Dec 13 02:01:32.594000 audit[1940]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c000211638 items=0 ppid=1799 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:32.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764636636363638343361663463623163653837366237353561616363 Dec 13 02:01:32.615803 env[1210]: time="2024-12-13T02:01:32.615744310Z" level=info msg="StartContainer for \"94c00f7ee0aa63ae039df10466d0cb2b98b21f32f5bb91b4bd48d7f39c550f38\" returns successfully" Dec 13 02:01:32.629481 env[1210]: time="2024-12-13T02:01:32.629360293Z" level=info msg="StartContainer for \"7dcf666843af4cb1ce876b755aacc20f15c1ca1cab2a8f73ca5ac73aacdc26df\" returns successfully" Dec 13 02:01:33.082093 kubelet[1719]: E1213 02:01:33.082042 1719 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:33.083869 kubelet[1719]: E1213 02:01:33.083845 1719 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:33.085460 kubelet[1719]: E1213 02:01:33.085396 1719 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:33.169298 kubelet[1719]: I1213 02:01:33.169247 1719 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 02:01:33.607000 audit[1926]: AVC avc: denied { watch } for pid=1926 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8232 scontext=system_u:system_r:svirt_lxc_net_t:s0:c220,c693 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:01:33.607000 audit[1926]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c003f59380 a2=fc6 a3=0 items=0 ppid=1780 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c220,c693 key=(null) Dec 13 02:01:33.607000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:01:33.608000 audit[1926]: AVC avc: denied { watch } for pid=1926 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c220,c693 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:01:33.608000 audit[1926]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c005cf55e0 a2=fc6 a3=0 items=0 ppid=1780 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c220,c693 key=(null) Dec 13 02:01:33.608000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:01:33.608000 audit[1926]: AVC avc: denied { watch } for pid=1926 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c220,c693 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:01:33.608000 audit[1926]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c002d63320 a2=fc6 a3=0 items=0 ppid=1780 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c220,c693 key=(null) Dec 13 02:01:33.608000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:01:33.620000 audit[1926]: AVC avc: denied { watch } for pid=1926 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c220,c693 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:01:33.620000 audit[1926]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c003f59a10 a2=fc6 a3=0 items=0 ppid=1780 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c220,c693 key=(null) Dec 13 02:01:33.620000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:01:33.629750 kubelet[1719]: E1213 02:01:33.629729 1719 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Dec 13 02:01:33.634000 audit[1926]: AVC avc: denied { watch } for pid=1926 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c220,c693 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:01:33.634000 audit[1926]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c005fa6100 a2=fc6 a3=0 items=0 ppid=1780 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c220,c693 key=(null) Dec 13 02:01:33.634000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:01:33.634000 audit[1926]: AVC avc: denied { watch } for pid=1926 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8232 scontext=system_u:system_r:svirt_lxc_net_t:s0:c220,c693 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:01:33.634000 audit[1926]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c002ee72c0 a2=fc6 a3=0 items=0 ppid=1780 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c220,c693 key=(null) Dec 13 02:01:33.634000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:01:33.726586 kubelet[1719]: I1213 02:01:33.726536 1719 kubelet_node_status.go:76] "Successfully registered node" node="localhost" Dec 13 02:01:33.733820 kubelet[1719]: E1213 02:01:33.733787 1719 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 02:01:33.834602 kubelet[1719]: E1213 02:01:33.834542 1719 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 02:01:33.867000 audit[1902]: AVC avc: denied { watch } for pid=1902 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c385,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:01:33.867000 audit[1902]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000708ba0 a2=fc6 a3=0 items=0 ppid=1760 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c385,c612 key=(null) Dec 13 02:01:33.867000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:01:33.867000 audit[1902]: AVC avc: denied { watch } for pid=1902 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8232 scontext=system_u:system_r:svirt_lxc_net_t:s0:c385,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:01:33.867000 audit[1902]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00057a5d0 a2=fc6 a3=0 items=0 ppid=1760 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c385,c612 key=(null) Dec 13 02:01:33.867000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:01:34.044289 kubelet[1719]: I1213 02:01:34.044251 1719 apiserver.go:52] "Watching apiserver" Dec 13 02:01:34.061603 kubelet[1719]: I1213 02:01:34.061566 1719 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 02:01:34.091499 kubelet[1719]: E1213 02:01:34.091460 1719 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost" Dec 13 02:01:34.091895 kubelet[1719]: E1213 02:01:34.091867 1719 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:36.279686 systemd[1]: Reloading. Dec 13 02:01:36.345097 /usr/lib/systemd/system-generators/torcx-generator[2018]: time="2024-12-13T02:01:36Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 02:01:36.345394 /usr/lib/systemd/system-generators/torcx-generator[2018]: time="2024-12-13T02:01:36Z" level=info msg="torcx already run" Dec 13 02:01:36.444126 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 02:01:36.444142 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 02:01:36.461469 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 02:01:36.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.531151 kernel: kauditd_printk_skb: 581 callbacks suppressed Dec 13 02:01:36.531214 kernel: audit: type=1400 audit(1734055296.528:553): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.537232 kernel: audit: type=1400 audit(1734055296.528:554): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.537281 kernel: audit: type=1400 audit(1734055296.528:555): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.540210 kernel: audit: type=1400 audit(1734055296.528:556): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.543119 kernel: audit: type=1400 audit(1734055296.528:557): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.546073 kernel: audit: type=1400 audit(1734055296.529:558): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.548951 kernel: audit: type=1400 audit(1734055296.529:559): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.551870 kernel: audit: type=1400 audit(1734055296.529:560): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.554752 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 02:01:36.554787 kernel: audit: type=1400 audit(1734055296.529:561): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.533000 audit: BPF prog-id=82 op=LOAD Dec 13 02:01:36.533000 audit: BPF prog-id=66 op=UNLOAD Dec 13 02:01:36.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.536000 audit: BPF prog-id=83 op=LOAD Dec 13 02:01:36.536000 audit: BPF prog-id=43 op=UNLOAD Dec 13 02:01:36.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.536000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.539000 audit: BPF prog-id=84 op=LOAD Dec 13 02:01:36.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.545000 audit: BPF prog-id=85 op=LOAD Dec 13 02:01:36.545000 audit: BPF prog-id=44 op=UNLOAD Dec 13 02:01:36.545000 audit: BPF prog-id=45 op=UNLOAD Dec 13 02:01:36.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.547000 audit: BPF prog-id=86 op=LOAD Dec 13 02:01:36.547000 audit: BPF prog-id=78 op=UNLOAD Dec 13 02:01:36.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.550000 audit: BPF prog-id=87 op=LOAD Dec 13 02:01:36.550000 audit: BPF prog-id=46 op=UNLOAD Dec 13 02:01:36.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.557000 audit: BPF prog-id=89 op=LOAD Dec 13 02:01:36.557000 audit: BPF prog-id=47 op=UNLOAD Dec 13 02:01:36.557000 audit: BPF prog-id=48 op=UNLOAD Dec 13 02:01:36.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.558000 audit: BPF prog-id=90 op=LOAD Dec 13 02:01:36.558000 audit: BPF prog-id=49 op=UNLOAD Dec 13 02:01:36.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.558000 audit: BPF prog-id=91 op=LOAD Dec 13 02:01:36.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.558000 audit: BPF prog-id=92 op=LOAD Dec 13 02:01:36.558000 audit: BPF prog-id=50 op=UNLOAD Dec 13 02:01:36.558000 audit: BPF prog-id=51 op=UNLOAD Dec 13 02:01:36.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.559000 audit: BPF prog-id=93 op=LOAD Dec 13 02:01:36.559000 audit: BPF prog-id=74 op=UNLOAD Dec 13 02:01:36.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.560000 audit: BPF prog-id=94 op=LOAD Dec 13 02:01:36.560000 audit: BPF prog-id=52 op=UNLOAD Dec 13 02:01:36.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.560000 audit: BPF prog-id=95 op=LOAD Dec 13 02:01:36.560000 audit: BPF prog-id=53 op=UNLOAD Dec 13 02:01:36.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.561000 audit: BPF prog-id=96 op=LOAD Dec 13 02:01:36.561000 audit: BPF prog-id=62 op=UNLOAD Dec 13 02:01:36.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.562000 audit: BPF prog-id=97 op=LOAD Dec 13 02:01:36.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.562000 audit: BPF prog-id=98 op=LOAD Dec 13 02:01:36.562000 audit: BPF prog-id=54 op=UNLOAD Dec 13 02:01:36.562000 audit: BPF prog-id=55 op=UNLOAD Dec 13 02:01:36.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.562000 audit: BPF prog-id=99 op=LOAD Dec 13 02:01:36.562000 audit: BPF prog-id=56 op=UNLOAD Dec 13 02:01:36.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.563000 audit: BPF prog-id=100 op=LOAD Dec 13 02:01:36.563000 audit: BPF prog-id=57 op=UNLOAD Dec 13 02:01:36.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.564000 audit: BPF prog-id=101 op=LOAD Dec 13 02:01:36.565000 audit: BPF prog-id=58 op=UNLOAD Dec 13 02:01:36.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.566000 audit: BPF prog-id=102 op=LOAD Dec 13 02:01:36.566000 audit: BPF prog-id=70 op=UNLOAD Dec 13 02:01:36.576499 kubelet[1719]: I1213 02:01:36.576478 1719 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 02:01:36.576553 systemd[1]: Stopping kubelet.service... Dec 13 02:01:36.600368 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 02:01:36.600586 systemd[1]: Stopped kubelet.service. Dec 13 02:01:36.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:36.602643 systemd[1]: Starting kubelet.service... Dec 13 02:01:36.691354 systemd[1]: Started kubelet.service. Dec 13 02:01:36.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:36.732177 kubelet[2064]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:01:36.732585 kubelet[2064]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 02:01:36.732677 kubelet[2064]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 02:01:36.732852 kubelet[2064]: I1213 02:01:36.732818 2064 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 02:01:36.737919 kubelet[2064]: I1213 02:01:36.737892 2064 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 02:01:36.737919 kubelet[2064]: I1213 02:01:36.737925 2064 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 02:01:36.738183 kubelet[2064]: I1213 02:01:36.738137 2064 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 02:01:36.739446 kubelet[2064]: I1213 02:01:36.739427 2064 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 02:01:36.741909 kubelet[2064]: I1213 02:01:36.741659 2064 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 02:01:36.750629 kubelet[2064]: I1213 02:01:36.750595 2064 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 02:01:36.750824 kubelet[2064]: I1213 02:01:36.750801 2064 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 02:01:36.750982 kubelet[2064]: I1213 02:01:36.750960 2064 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 02:01:36.751084 kubelet[2064]: I1213 02:01:36.750990 2064 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 02:01:36.751084 kubelet[2064]: I1213 02:01:36.751002 2064 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 02:01:36.751084 kubelet[2064]: I1213 02:01:36.751034 2064 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:01:36.751169 kubelet[2064]: I1213 02:01:36.751153 2064 kubelet.go:396] "Attempting to sync node with API server" Dec 13 02:01:36.751192 kubelet[2064]: I1213 02:01:36.751178 2064 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 02:01:36.751214 kubelet[2064]: I1213 02:01:36.751205 2064 kubelet.go:312] "Adding apiserver pod source" Dec 13 02:01:36.751239 kubelet[2064]: I1213 02:01:36.751223 2064 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 02:01:36.752293 kubelet[2064]: I1213 02:01:36.752266 2064 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 02:01:36.752646 kubelet[2064]: I1213 02:01:36.752620 2064 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 02:01:36.753177 kubelet[2064]: I1213 02:01:36.753156 2064 server.go:1256] "Started kubelet" Dec 13 02:01:36.754000 audit[2064]: AVC avc: denied { mac_admin } for pid=2064 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.754000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:01:36.754000 audit[2064]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a074a0 a1=c000d50198 a2=c000a07470 a3=25 items=0 ppid=1 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:36.754000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:01:36.754000 audit[2064]: AVC avc: denied { mac_admin } for pid=2064 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.754000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:01:36.754000 audit[2064]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00018d5e0 a1=c000d501b0 a2=c000a07530 a3=25 items=0 ppid=1 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:36.754000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:01:36.755865 kubelet[2064]: I1213 02:01:36.755140 2064 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 02:01:36.755865 kubelet[2064]: I1213 02:01:36.755177 2064 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 02:01:36.755865 kubelet[2064]: I1213 02:01:36.755198 2064 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 02:01:36.757036 kubelet[2064]: I1213 02:01:36.757009 2064 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 02:01:36.758118 kubelet[2064]: I1213 02:01:36.758096 2064 server.go:461] "Adding debug handlers to kubelet server" Dec 13 02:01:36.763800 kubelet[2064]: I1213 02:01:36.763773 2064 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 02:01:36.764833 kubelet[2064]: I1213 02:01:36.764820 2064 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 02:01:36.765092 kubelet[2064]: I1213 02:01:36.765079 2064 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 02:01:36.770500 kubelet[2064]: I1213 02:01:36.770470 2064 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 02:01:36.770815 kubelet[2064]: I1213 02:01:36.770790 2064 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 02:01:36.771103 kubelet[2064]: I1213 02:01:36.771076 2064 factory.go:221] Registration of the systemd container factory successfully Dec 13 02:01:36.771772 kubelet[2064]: I1213 02:01:36.771198 2064 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 02:01:36.774949 kubelet[2064]: I1213 02:01:36.774886 2064 factory.go:221] Registration of the containerd container factory successfully Dec 13 02:01:36.791600 kubelet[2064]: I1213 02:01:36.789140 2064 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 02:01:36.791600 kubelet[2064]: I1213 02:01:36.790786 2064 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 02:01:36.791600 kubelet[2064]: I1213 02:01:36.790811 2064 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 02:01:36.791600 kubelet[2064]: I1213 02:01:36.790829 2064 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 02:01:36.791600 kubelet[2064]: E1213 02:01:36.790873 2064 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 02:01:36.820416 kubelet[2064]: I1213 02:01:36.819633 2064 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 02:01:36.820416 kubelet[2064]: I1213 02:01:36.819668 2064 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 02:01:36.820416 kubelet[2064]: I1213 02:01:36.819688 2064 state_mem.go:36] "Initialized new in-memory state store" Dec 13 02:01:36.820416 kubelet[2064]: I1213 02:01:36.819919 2064 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 02:01:36.820416 kubelet[2064]: I1213 02:01:36.819950 2064 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 02:01:36.820416 kubelet[2064]: I1213 02:01:36.819959 2064 policy_none.go:49] "None policy: Start" Dec 13 02:01:36.821690 kubelet[2064]: I1213 02:01:36.821000 2064 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 02:01:36.821690 kubelet[2064]: I1213 02:01:36.821033 2064 state_mem.go:35] "Initializing new in-memory state store" Dec 13 02:01:36.821690 kubelet[2064]: I1213 02:01:36.821250 2064 state_mem.go:75] "Updated machine memory state" Dec 13 02:01:36.826000 audit[2064]: AVC avc: denied { mac_admin } for pid=2064 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:36.826000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 02:01:36.826000 audit[2064]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00128cd20 a1=c000e1e8b8 a2=c00128ccf0 a3=25 items=0 ppid=1 pid=2064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:36.826000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 02:01:36.828359 kubelet[2064]: I1213 02:01:36.827687 2064 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 02:01:36.828359 kubelet[2064]: I1213 02:01:36.827763 2064 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 02:01:36.828407 kubelet[2064]: I1213 02:01:36.828370 2064 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 02:01:36.868421 kubelet[2064]: I1213 02:01:36.868320 2064 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Dec 13 02:01:36.891672 kubelet[2064]: I1213 02:01:36.891640 2064 topology_manager.go:215] "Topology Admit Handler" podUID="dda7b22ad6c9e8af082ce62b5d3678f8" podNamespace="kube-system" podName="kube-apiserver-localhost" Dec 13 02:01:36.891791 kubelet[2064]: I1213 02:01:36.891754 2064 topology_manager.go:215] "Topology Admit Handler" podUID="4f8e0d694c07e04969646aa3c152c34a" podNamespace="kube-system" podName="kube-controller-manager-localhost" Dec 13 02:01:36.891834 kubelet[2064]: I1213 02:01:36.891810 2064 topology_manager.go:215] "Topology Admit Handler" podUID="c4144e8f85b2123a6afada0c1705bbba" podNamespace="kube-system" podName="kube-scheduler-localhost" Dec 13 02:01:36.974841 kubelet[2064]: I1213 02:01:36.974785 2064 kubelet_node_status.go:112] "Node was previously registered" node="localhost" Dec 13 02:01:36.975006 kubelet[2064]: I1213 02:01:36.974862 2064 kubelet_node_status.go:76] "Successfully registered node" node="localhost" Dec 13 02:01:37.066019 kubelet[2064]: I1213 02:01:37.065874 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:01:37.066019 kubelet[2064]: I1213 02:01:37.065920 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:01:37.066019 kubelet[2064]: I1213 02:01:37.065941 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/dda7b22ad6c9e8af082ce62b5d3678f8-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"dda7b22ad6c9e8af082ce62b5d3678f8\") " pod="kube-system/kube-apiserver-localhost" Dec 13 02:01:37.066019 kubelet[2064]: I1213 02:01:37.065959 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/dda7b22ad6c9e8af082ce62b5d3678f8-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"dda7b22ad6c9e8af082ce62b5d3678f8\") " pod="kube-system/kube-apiserver-localhost" Dec 13 02:01:37.066019 kubelet[2064]: I1213 02:01:37.065996 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/dda7b22ad6c9e8af082ce62b5d3678f8-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"dda7b22ad6c9e8af082ce62b5d3678f8\") " pod="kube-system/kube-apiserver-localhost" Dec 13 02:01:37.066310 kubelet[2064]: I1213 02:01:37.066081 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:01:37.066310 kubelet[2064]: I1213 02:01:37.066140 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:01:37.066310 kubelet[2064]: I1213 02:01:37.066162 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/c4144e8f85b2123a6afada0c1705bbba-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"c4144e8f85b2123a6afada0c1705bbba\") " pod="kube-system/kube-scheduler-localhost" Dec 13 02:01:37.066310 kubelet[2064]: I1213 02:01:37.066186 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/4f8e0d694c07e04969646aa3c152c34a-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"4f8e0d694c07e04969646aa3c152c34a\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 02:01:37.273820 kubelet[2064]: E1213 02:01:37.273776 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:37.274239 kubelet[2064]: E1213 02:01:37.274211 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:37.278654 kubelet[2064]: E1213 02:01:37.278623 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:37.752650 kubelet[2064]: I1213 02:01:37.752605 2064 apiserver.go:52] "Watching apiserver" Dec 13 02:01:37.765815 kubelet[2064]: I1213 02:01:37.765758 2064 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 02:01:37.806457 kubelet[2064]: E1213 02:01:37.806413 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:37.807142 kubelet[2064]: E1213 02:01:37.807114 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:37.807523 kubelet[2064]: E1213 02:01:37.807496 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:38.153139 kubelet[2064]: I1213 02:01:38.153080 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=2.153004631 podStartE2EDuration="2.153004631s" podCreationTimestamp="2024-12-13 02:01:36 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:01:38.150463763 +0000 UTC m=+1.455781968" watchObservedRunningTime="2024-12-13 02:01:38.153004631 +0000 UTC m=+1.458322826" Dec 13 02:01:38.153392 kubelet[2064]: I1213 02:01:38.153241 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=2.153220875 podStartE2EDuration="2.153220875s" podCreationTimestamp="2024-12-13 02:01:36 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:01:38.076928731 +0000 UTC m=+1.382246926" watchObservedRunningTime="2024-12-13 02:01:38.153220875 +0000 UTC m=+1.458539060" Dec 13 02:01:38.339000 audit[1902]: AVC avc: denied { watch } for pid=1902 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c385,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:01:38.339000 audit[1902]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000fa2c00 a2=fc6 a3=0 items=0 ppid=1760 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c385,c612 key=(null) Dec 13 02:01:38.339000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:01:38.340000 audit[1902]: AVC avc: denied { watch } for pid=1902 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c385,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:01:38.340000 audit[1902]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000fa2c40 a2=fc6 a3=0 items=0 ppid=1760 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c385,c612 key=(null) Dec 13 02:01:38.340000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:01:38.341000 audit[1902]: AVC avc: denied { watch } for pid=1902 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c385,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:01:38.341000 audit[1902]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000fa2c80 a2=fc6 a3=0 items=0 ppid=1760 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c385,c612 key=(null) Dec 13 02:01:38.341000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:01:38.341000 audit[1902]: AVC avc: denied { watch } for pid=1902 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c385,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:01:38.341000 audit[1902]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000fa2cc0 a2=fc6 a3=0 items=0 ppid=1760 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c385,c612 key=(null) Dec 13 02:01:38.341000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:01:38.807422 kubelet[2064]: E1213 02:01:38.807377 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:38.808170 kubelet[2064]: E1213 02:01:38.808143 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:40.939491 sudo[1367]: pam_unix(sudo:session): session closed for user root Dec 13 02:01:40.938000 audit[1367]: USER_END pid=1367 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:01:40.938000 audit[1367]: CRED_DISP pid=1367 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 02:01:40.940825 sshd[1354]: pam_unix(sshd:session): session closed for user core Dec 13 02:01:40.940000 audit[1354]: USER_END pid=1354 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:40.940000 audit[1354]: CRED_DISP pid=1354 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:01:40.943271 systemd[1]: sshd@8-10.0.0.73:22-10.0.0.1:57902.service: Deactivated successfully. Dec 13 02:01:40.942000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.73:22-10.0.0.1:57902 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:01:40.943911 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 02:01:40.944057 systemd[1]: session-9.scope: Consumed 4.205s CPU time. Dec 13 02:01:40.944662 systemd-logind[1189]: Session 9 logged out. Waiting for processes to exit. Dec 13 02:01:40.945304 systemd-logind[1189]: Removed session 9. Dec 13 02:01:43.087979 update_engine[1195]: I1213 02:01:43.087925 1195 update_attempter.cc:509] Updating boot flags... Dec 13 02:01:43.916783 kubelet[2064]: E1213 02:01:43.916754 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:43.939284 kubelet[2064]: I1213 02:01:43.939253 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=7.939216062 podStartE2EDuration="7.939216062s" podCreationTimestamp="2024-12-13 02:01:36 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:01:38.183471201 +0000 UTC m=+1.488789397" watchObservedRunningTime="2024-12-13 02:01:43.939216062 +0000 UTC m=+7.244534257" Dec 13 02:01:44.815444 kubelet[2064]: E1213 02:01:44.815408 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:45.738534 kubelet[2064]: E1213 02:01:45.738494 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:45.816798 kubelet[2064]: E1213 02:01:45.816757 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:45.816943 kubelet[2064]: E1213 02:01:45.816842 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:48.271366 kubelet[2064]: E1213 02:01:48.271331 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:51.234000 audit[1902]: AVC avc: denied { watch } for pid=1902 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=8269 scontext=system_u:system_r:svirt_lxc_net_t:s0:c385,c612 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 02:01:51.236231 kernel: kauditd_printk_skb: 275 callbacks suppressed Dec 13 02:01:51.236313 kernel: audit: type=1400 audit(1734055311.234:806): avc: denied { watch } for pid=1902 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=8269 scontext=system_u:system_r:svirt_lxc_net_t:s0:c385,c612 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 02:01:51.234000 audit[1902]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b70cc0 a2=fc6 a3=0 items=0 ppid=1760 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c385,c612 key=(null) Dec 13 02:01:51.247653 kernel: audit: type=1300 audit(1734055311.234:806): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b70cc0 a2=fc6 a3=0 items=0 ppid=1760 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c385,c612 key=(null) Dec 13 02:01:51.234000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:01:51.252553 kernel: audit: type=1327 audit(1734055311.234:806): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:01:51.562831 kubelet[2064]: I1213 02:01:51.562739 2064 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 02:01:51.563231 kubelet[2064]: I1213 02:01:51.563193 2064 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 02:01:51.563296 env[1210]: time="2024-12-13T02:01:51.563025999Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 02:01:52.348332 kubelet[2064]: I1213 02:01:52.348278 2064 topology_manager.go:215] "Topology Admit Handler" podUID="41535a74-aa6b-4ea1-b3b9-55a68b969a66" podNamespace="kube-system" podName="kube-proxy-plw22" Dec 13 02:01:52.352801 systemd[1]: Created slice kubepods-besteffort-pod41535a74_aa6b_4ea1_b3b9_55a68b969a66.slice. Dec 13 02:01:52.371299 kubelet[2064]: I1213 02:01:52.371234 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/41535a74-aa6b-4ea1-b3b9-55a68b969a66-lib-modules\") pod \"kube-proxy-plw22\" (UID: \"41535a74-aa6b-4ea1-b3b9-55a68b969a66\") " pod="kube-system/kube-proxy-plw22" Dec 13 02:01:52.371299 kubelet[2064]: I1213 02:01:52.371293 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/41535a74-aa6b-4ea1-b3b9-55a68b969a66-kube-proxy\") pod \"kube-proxy-plw22\" (UID: \"41535a74-aa6b-4ea1-b3b9-55a68b969a66\") " pod="kube-system/kube-proxy-plw22" Dec 13 02:01:52.371299 kubelet[2064]: I1213 02:01:52.371312 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6tkqh\" (UniqueName: \"kubernetes.io/projected/41535a74-aa6b-4ea1-b3b9-55a68b969a66-kube-api-access-6tkqh\") pod \"kube-proxy-plw22\" (UID: \"41535a74-aa6b-4ea1-b3b9-55a68b969a66\") " pod="kube-system/kube-proxy-plw22" Dec 13 02:01:52.371537 kubelet[2064]: I1213 02:01:52.371328 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/41535a74-aa6b-4ea1-b3b9-55a68b969a66-xtables-lock\") pod \"kube-proxy-plw22\" (UID: \"41535a74-aa6b-4ea1-b3b9-55a68b969a66\") " pod="kube-system/kube-proxy-plw22" Dec 13 02:01:52.457113 kubelet[2064]: I1213 02:01:52.457068 2064 topology_manager.go:215] "Topology Admit Handler" podUID="624d3b8c-732e-4939-a70a-98ffdce3638e" podNamespace="tigera-operator" podName="tigera-operator-c7ccbd65-mdr5l" Dec 13 02:01:52.462415 systemd[1]: Created slice kubepods-besteffort-pod624d3b8c_732e_4939_a70a_98ffdce3638e.slice. Dec 13 02:01:52.472447 kubelet[2064]: I1213 02:01:52.472404 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-24bd4\" (UniqueName: \"kubernetes.io/projected/624d3b8c-732e-4939-a70a-98ffdce3638e-kube-api-access-24bd4\") pod \"tigera-operator-c7ccbd65-mdr5l\" (UID: \"624d3b8c-732e-4939-a70a-98ffdce3638e\") " pod="tigera-operator/tigera-operator-c7ccbd65-mdr5l" Dec 13 02:01:52.472525 kubelet[2064]: I1213 02:01:52.472509 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/624d3b8c-732e-4939-a70a-98ffdce3638e-var-lib-calico\") pod \"tigera-operator-c7ccbd65-mdr5l\" (UID: \"624d3b8c-732e-4939-a70a-98ffdce3638e\") " pod="tigera-operator/tigera-operator-c7ccbd65-mdr5l" Dec 13 02:01:52.661223 kubelet[2064]: E1213 02:01:52.661107 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:52.661766 env[1210]: time="2024-12-13T02:01:52.661717737Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-plw22,Uid:41535a74-aa6b-4ea1-b3b9-55a68b969a66,Namespace:kube-system,Attempt:0,}" Dec 13 02:01:52.687760 env[1210]: time="2024-12-13T02:01:52.687284915Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:01:52.687760 env[1210]: time="2024-12-13T02:01:52.687392972Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:01:52.687760 env[1210]: time="2024-12-13T02:01:52.687407169Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:01:52.688707 env[1210]: time="2024-12-13T02:01:52.688641757Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c7a65ef8d11b73e46913822b0eb2cbe195e271b05f74da86dd58698bc1f92ae1 pid=2173 runtime=io.containerd.runc.v2 Dec 13 02:01:52.703700 systemd[1]: Started cri-containerd-c7a65ef8d11b73e46913822b0eb2cbe195e271b05f74da86dd58698bc1f92ae1.scope. Dec 13 02:01:52.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.720775 kernel: audit: type=1400 audit(1734055312.712:807): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.720841 kernel: audit: type=1400 audit(1734055312.712:808): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.720863 kernel: audit: type=1400 audit(1734055312.712:809): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.733641 kernel: audit: type=1400 audit(1734055312.712:810): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.733751 kernel: audit: type=1400 audit(1734055312.712:811): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.733776 kernel: audit: type=1400 audit(1734055312.712:812): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.738516 kernel: audit: type=1400 audit(1734055312.712:813): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.715000 audit: BPF prog-id=103 op=LOAD Dec 13 02:01:52.716000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.716000 audit[2185]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2173 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:52.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337613635656638643131623733653436393133383232623065623263 Dec 13 02:01:52.716000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.716000 audit[2185]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2173 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:52.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337613635656638643131623733653436393133383232623065623263 Dec 13 02:01:52.716000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.716000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.716000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.716000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.716000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.716000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.716000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.716000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.716000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.716000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.716000 audit: BPF prog-id=104 op=LOAD Dec 13 02:01:52.716000 audit[2185]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003aab90 items=0 ppid=2173 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:52.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337613635656638643131623733653436393133383232623065623263 Dec 13 02:01:52.723000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.723000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.723000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.723000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.723000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.723000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.723000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.723000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.723000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.723000 audit: BPF prog-id=105 op=LOAD Dec 13 02:01:52.723000 audit[2185]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003aabd8 items=0 ppid=2173 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:52.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337613635656638643131623733653436393133383232623065623263 Dec 13 02:01:52.730000 audit: BPF prog-id=105 op=UNLOAD Dec 13 02:01:52.730000 audit: BPF prog-id=104 op=UNLOAD Dec 13 02:01:52.730000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.730000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.730000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.730000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.730000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.730000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.730000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.730000 audit[2185]: AVC avc: denied { perfmon } for pid=2185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.730000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.730000 audit[2185]: AVC avc: denied { bpf } for pid=2185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.730000 audit: BPF prog-id=106 op=LOAD Dec 13 02:01:52.730000 audit[2185]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003aafe8 items=0 ppid=2173 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:52.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337613635656638643131623733653436393133383232623065623263 Dec 13 02:01:52.746094 env[1210]: time="2024-12-13T02:01:52.746059544Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-plw22,Uid:41535a74-aa6b-4ea1-b3b9-55a68b969a66,Namespace:kube-system,Attempt:0,} returns sandbox id \"c7a65ef8d11b73e46913822b0eb2cbe195e271b05f74da86dd58698bc1f92ae1\"" Dec 13 02:01:52.746847 kubelet[2064]: E1213 02:01:52.746827 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:52.749160 env[1210]: time="2024-12-13T02:01:52.748790090Z" level=info msg="CreateContainer within sandbox \"c7a65ef8d11b73e46913822b0eb2cbe195e271b05f74da86dd58698bc1f92ae1\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 02:01:52.764691 env[1210]: time="2024-12-13T02:01:52.764648145Z" level=info msg="CreateContainer within sandbox \"c7a65ef8d11b73e46913822b0eb2cbe195e271b05f74da86dd58698bc1f92ae1\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"98517f5bd0b3b3b6c915a0171dd68de717984b6a1b1b5c7cbd2093415219a919\"" Dec 13 02:01:52.765015 env[1210]: time="2024-12-13T02:01:52.764988569Z" level=info msg="StartContainer for \"98517f5bd0b3b3b6c915a0171dd68de717984b6a1b1b5c7cbd2093415219a919\"" Dec 13 02:01:52.766686 env[1210]: time="2024-12-13T02:01:52.766650597Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-mdr5l,Uid:624d3b8c-732e-4939-a70a-98ffdce3638e,Namespace:tigera-operator,Attempt:0,}" Dec 13 02:01:52.779967 systemd[1]: Started cri-containerd-98517f5bd0b3b3b6c915a0171dd68de717984b6a1b1b5c7cbd2093415219a919.scope. Dec 13 02:01:52.783536 env[1210]: time="2024-12-13T02:01:52.783462371Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:01:52.783672 env[1210]: time="2024-12-13T02:01:52.783646865Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:01:52.783768 env[1210]: time="2024-12-13T02:01:52.783746576Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:01:52.784034 env[1210]: time="2024-12-13T02:01:52.784010482Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c59bfe20305a211758bffc54eb2f906da7e25a222f13f5b2f1fe2147a3a8bc22 pid=2232 runtime=io.containerd.runc.v2 Dec 13 02:01:52.796648 systemd[1]: Started cri-containerd-c59bfe20305a211758bffc54eb2f906da7e25a222f13f5b2f1fe2147a3a8bc22.scope. Dec 13 02:01:52.797000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.797000 audit[2215]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fccf88574d8 items=0 ppid=2173 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:52.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938353137663562643062336233623663393135613031373164643638 Dec 13 02:01:52.797000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.797000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.797000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.797000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.797000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.797000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.797000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.797000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.797000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.797000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.797000 audit: BPF prog-id=107 op=LOAD Dec 13 02:01:52.797000 audit[2215]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002190c8 items=0 ppid=2173 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:52.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938353137663562643062336233623663393135613031373164643638 Dec 13 02:01:52.798000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.798000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.798000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.798000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.798000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.798000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.798000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.798000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.798000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.798000 audit: BPF prog-id=108 op=LOAD Dec 13 02:01:52.798000 audit[2215]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000219118 items=0 ppid=2173 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:52.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938353137663562643062336233623663393135613031373164643638 Dec 13 02:01:52.798000 audit: BPF prog-id=108 op=UNLOAD Dec 13 02:01:52.798000 audit: BPF prog-id=107 op=UNLOAD Dec 13 02:01:52.798000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.798000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.798000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.798000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.798000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.798000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.798000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.798000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.798000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.798000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.798000 audit: BPF prog-id=109 op=LOAD Dec 13 02:01:52.798000 audit[2215]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002191a8 items=0 ppid=2173 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:52.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938353137663562643062336233623663393135613031373164643638 Dec 13 02:01:52.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.810000 audit: BPF prog-id=110 op=LOAD Dec 13 02:01:52.811000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.811000 audit[2245]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2232 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:52.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335396266653230333035613231313735386266666335346562326639 Dec 13 02:01:52.811000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.811000 audit[2245]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2232 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:52.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335396266653230333035613231313735386266666335346562326639 Dec 13 02:01:52.811000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.811000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.811000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.811000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.811000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.811000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.811000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.811000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.811000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.811000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.811000 audit: BPF prog-id=111 op=LOAD Dec 13 02:01:52.811000 audit[2245]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000308a80 items=0 ppid=2232 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:52.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335396266653230333035613231313735386266666335346562326639 Dec 13 02:01:52.811000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.811000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.811000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.811000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.811000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.811000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.811000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.811000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.811000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.811000 audit: BPF prog-id=112 op=LOAD Dec 13 02:01:52.811000 audit[2245]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000308ac8 items=0 ppid=2232 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:52.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335396266653230333035613231313735386266666335346562326639 Dec 13 02:01:52.811000 audit: BPF prog-id=112 op=UNLOAD Dec 13 02:01:52.811000 audit: BPF prog-id=111 op=UNLOAD Dec 13 02:01:52.811000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.811000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.811000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.811000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.811000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.811000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.811000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.811000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.811000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.811000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:52.811000 audit: BPF prog-id=113 op=LOAD Dec 13 02:01:52.811000 audit[2245]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000308ed8 items=0 ppid=2232 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:52.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335396266653230333035613231313735386266666335346562326639 Dec 13 02:01:52.816270 env[1210]: time="2024-12-13T02:01:52.816242463Z" level=info msg="StartContainer for \"98517f5bd0b3b3b6c915a0171dd68de717984b6a1b1b5c7cbd2093415219a919\" returns successfully" Dec 13 02:01:52.827369 kubelet[2064]: E1213 02:01:52.827341 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:01:52.841548 env[1210]: time="2024-12-13T02:01:52.841512570Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-mdr5l,Uid:624d3b8c-732e-4939-a70a-98ffdce3638e,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"c59bfe20305a211758bffc54eb2f906da7e25a222f13f5b2f1fe2147a3a8bc22\"" Dec 13 02:01:52.842869 env[1210]: time="2024-12-13T02:01:52.842851047Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 02:01:52.868000 audit[2309]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2309 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:01:52.868000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc8ec8dfe0 a2=0 a3=7ffc8ec8dfcc items=0 ppid=2244 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:52.868000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 02:01:52.868000 audit[2310]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:52.868000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffd5469600 a2=0 a3=7fffd54695ec items=0 ppid=2244 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:52.868000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 02:01:52.869000 audit[2311]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2311 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:01:52.869000 audit[2311]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcdb670480 a2=0 a3=7ffcdb67046c items=0 ppid=2244 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:52.869000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 02:01:52.869000 audit[2312]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2312 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:52.869000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3cac9e40 a2=0 a3=7ffe3cac9e2c items=0 ppid=2244 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:52.869000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 02:01:52.871000 audit[2313]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:52.871000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc8807b970 a2=0 a3=7ffc8807b95c items=0 ppid=2244 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:52.871000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 02:01:52.872000 audit[2314]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:01:52.872000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeaeb1e3e0 a2=0 a3=7ffeaeb1e3cc items=0 ppid=2244 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:52.872000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 02:01:52.973000 audit[2315]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2315 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:52.973000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc0fe87700 a2=0 a3=7ffc0fe876ec items=0 ppid=2244 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:52.973000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 02:01:52.976000 audit[2317]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2317 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:52.976000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd829aa210 a2=0 a3=7ffd829aa1fc items=0 ppid=2244 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:52.976000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 02:01:52.979000 audit[2320]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2320 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:52.979000 audit[2320]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe2c9d8770 a2=0 a3=7ffe2c9d875c items=0 ppid=2244 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:52.979000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 02:01:52.981000 audit[2321]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2321 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:52.981000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda341dbc0 a2=0 a3=7ffda341dbac items=0 ppid=2244 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:52.981000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 02:01:52.983000 audit[2323]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2323 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:52.983000 audit[2323]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc4429ccf0 a2=0 a3=7ffc4429ccdc items=0 ppid=2244 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:52.983000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 02:01:52.984000 audit[2324]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2324 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:52.984000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd9d8e6220 a2=0 a3=7ffd9d8e620c items=0 ppid=2244 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:52.984000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 02:01:52.986000 audit[2326]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2326 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:52.986000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffeaa049a10 a2=0 a3=7ffeaa0499fc items=0 ppid=2244 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:52.986000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 02:01:52.989000 audit[2329]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2329 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:52.989000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdbde7f3c0 a2=0 a3=7ffdbde7f3ac items=0 ppid=2244 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:52.989000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 02:01:52.990000 audit[2330]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:52.990000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe74220060 a2=0 a3=7ffe7422004c items=0 ppid=2244 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:52.990000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 02:01:52.992000 audit[2332]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2332 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:52.992000 audit[2332]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff5d942560 a2=0 a3=7fff5d94254c items=0 ppid=2244 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:52.992000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 02:01:52.993000 audit[2333]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2333 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:52.993000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcaa41fc20 a2=0 a3=7ffcaa41fc0c items=0 ppid=2244 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:52.993000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 02:01:52.994000 audit[2335]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:52.994000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffca5f975b0 a2=0 a3=7ffca5f9759c items=0 ppid=2244 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:52.994000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:01:52.997000 audit[2338]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2338 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:52.997000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcd93825f0 a2=0 a3=7ffcd93825dc items=0 ppid=2244 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:52.997000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:01:53.000000 audit[2341]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2341 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:53.000000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe86151800 a2=0 a3=7ffe861517ec items=0 ppid=2244 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:53.000000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 02:01:53.001000 audit[2342]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2342 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:53.001000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcdf0b56c0 a2=0 a3=7ffcdf0b56ac items=0 ppid=2244 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:53.001000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 02:01:53.003000 audit[2344]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2344 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:53.003000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffeb0b8ec10 a2=0 a3=7ffeb0b8ebfc items=0 ppid=2244 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:53.003000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:01:53.005000 audit[2347]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2347 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:53.005000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe4990e000 a2=0 a3=7ffe4990dfec items=0 ppid=2244 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:53.005000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:01:53.006000 audit[2348]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2348 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:53.006000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff147dae40 a2=0 a3=7fff147dae2c items=0 ppid=2244 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:53.006000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 02:01:53.008000 audit[2350]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2350 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 02:01:53.008000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd27495060 a2=0 a3=7ffd2749504c items=0 ppid=2244 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:53.008000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 02:01:53.024000 audit[2356]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2356 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:53.024000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffe74d170d0 a2=0 a3=7ffe74d170bc items=0 ppid=2244 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:53.024000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:53.033000 audit[2356]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2356 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:53.033000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffe74d170d0 a2=0 a3=7ffe74d170bc items=0 ppid=2244 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:53.033000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:53.034000 audit[2362]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2362 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:01:53.034000 audit[2362]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe0750fb70 a2=0 a3=7ffe0750fb5c items=0 ppid=2244 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:53.034000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 02:01:53.035000 audit[2364]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2364 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:01:53.035000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcdfb50430 a2=0 a3=7ffcdfb5041c items=0 ppid=2244 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:53.035000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 02:01:53.038000 audit[2367]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2367 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:01:53.038000 audit[2367]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff9633bb20 a2=0 a3=7fff9633bb0c items=0 ppid=2244 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:53.038000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 02:01:53.039000 audit[2368]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2368 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:01:53.039000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff6278d4d0 a2=0 a3=7fff6278d4bc items=0 ppid=2244 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:53.039000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 02:01:53.041000 audit[2370]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:01:53.041000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc1a67c530 a2=0 a3=7ffc1a67c51c items=0 ppid=2244 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:53.041000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 02:01:53.042000 audit[2371]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2371 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:01:53.042000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff69439cf0 a2=0 a3=7fff69439cdc items=0 ppid=2244 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:53.042000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 02:01:53.044000 audit[2373]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2373 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:01:53.044000 audit[2373]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd7fe4cf80 a2=0 a3=7ffd7fe4cf6c items=0 ppid=2244 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:53.044000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 02:01:53.046000 audit[2376]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2376 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:01:53.046000 audit[2376]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc1de46480 a2=0 a3=7ffc1de4646c items=0 ppid=2244 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:53.046000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 02:01:53.047000 audit[2377]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2377 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:01:53.047000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde7f416f0 a2=0 a3=7ffde7f416dc items=0 ppid=2244 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:53.047000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 02:01:53.049000 audit[2379]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2379 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:01:53.049000 audit[2379]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffec61f4ff0 a2=0 a3=7ffec61f4fdc items=0 ppid=2244 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:53.049000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 02:01:53.050000 audit[2380]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2380 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:01:53.050000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff7e76c4e0 a2=0 a3=7fff7e76c4cc items=0 ppid=2244 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:53.050000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 02:01:53.052000 audit[2382]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2382 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:01:53.052000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc03cf1230 a2=0 a3=7ffc03cf121c items=0 ppid=2244 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:53.052000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 02:01:53.055000 audit[2385]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2385 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:01:53.055000 audit[2385]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc58c343d0 a2=0 a3=7ffc58c343bc items=0 ppid=2244 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:53.055000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 02:01:53.057000 audit[2388]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2388 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:01:53.057000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd11b9e620 a2=0 a3=7ffd11b9e60c items=0 ppid=2244 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:53.057000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 02:01:53.058000 audit[2389]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2389 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:01:53.058000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff09a29000 a2=0 a3=7fff09a28fec items=0 ppid=2244 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:53.058000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 02:01:53.060000 audit[2391]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2391 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:01:53.060000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff7457e2a0 a2=0 a3=7fff7457e28c items=0 ppid=2244 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:53.060000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:01:53.062000 audit[2394]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2394 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:01:53.062000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff4565a040 a2=0 a3=7fff4565a02c items=0 ppid=2244 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:53.062000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 02:01:53.063000 audit[2395]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2395 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:01:53.063000 audit[2395]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd6a00890 a2=0 a3=7fffd6a0087c items=0 ppid=2244 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:53.063000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 02:01:53.065000 audit[2397]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2397 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:01:53.065000 audit[2397]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd96dd9320 a2=0 a3=7ffd96dd930c items=0 ppid=2244 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:53.065000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 02:01:53.066000 audit[2398]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2398 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:01:53.066000 audit[2398]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff275d4fb0 a2=0 a3=7fff275d4f9c items=0 ppid=2244 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:53.066000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 02:01:53.068000 audit[2400]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2400 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:01:53.068000 audit[2400]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcb5db4b70 a2=0 a3=7ffcb5db4b5c items=0 ppid=2244 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:53.068000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:01:53.070000 audit[2403]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2403 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 02:01:53.070000 audit[2403]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff9ddf5820 a2=0 a3=7fff9ddf580c items=0 ppid=2244 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:53.070000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 02:01:53.072000 audit[2405]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2405 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 02:01:53.072000 audit[2405]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7fff6326ed10 a2=0 a3=7fff6326ecfc items=0 ppid=2244 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:53.072000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:53.073000 audit[2405]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2405 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 02:01:53.073000 audit[2405]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff6326ed10 a2=0 a3=7fff6326ecfc items=0 ppid=2244 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:53.073000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:55.990363 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2255013035.mount: Deactivated successfully. Dec 13 02:01:57.067370 env[1210]: time="2024-12-13T02:01:57.067301074Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:57.069418 env[1210]: time="2024-12-13T02:01:57.069386167Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:57.070918 env[1210]: time="2024-12-13T02:01:57.070880191Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:57.072489 env[1210]: time="2024-12-13T02:01:57.072451272Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:01:57.073077 env[1210]: time="2024-12-13T02:01:57.073020409Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 02:01:57.074524 env[1210]: time="2024-12-13T02:01:57.074501088Z" level=info msg="CreateContainer within sandbox \"c59bfe20305a211758bffc54eb2f906da7e25a222f13f5b2f1fe2147a3a8bc22\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 02:01:57.083894 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2499396910.mount: Deactivated successfully. Dec 13 02:01:57.086662 env[1210]: time="2024-12-13T02:01:57.086619877Z" level=info msg="CreateContainer within sandbox \"c59bfe20305a211758bffc54eb2f906da7e25a222f13f5b2f1fe2147a3a8bc22\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"ea8af308284ad1ada042a2fb1b8fe3b9811afb74b16e10281892e76a87e59580\"" Dec 13 02:01:57.087251 env[1210]: time="2024-12-13T02:01:57.087224653Z" level=info msg="StartContainer for \"ea8af308284ad1ada042a2fb1b8fe3b9811afb74b16e10281892e76a87e59580\"" Dec 13 02:01:57.103822 systemd[1]: Started cri-containerd-ea8af308284ad1ada042a2fb1b8fe3b9811afb74b16e10281892e76a87e59580.scope. Dec 13 02:01:57.113497 kernel: kauditd_printk_skb: 303 callbacks suppressed Dec 13 02:01:57.113597 kernel: audit: type=1400 audit(1734055317.111:900): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.119010 kernel: audit: type=1400 audit(1734055317.111:901): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.119067 kernel: audit: type=1400 audit(1734055317.111:902): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.121984 kernel: audit: type=1400 audit(1734055317.111:903): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.128015 kernel: audit: type=1400 audit(1734055317.111:904): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.134063 kernel: audit: type=1400 audit(1734055317.111:905): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.134105 kernel: audit: type=1400 audit(1734055317.111:906): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.134126 kernel: audit: type=1400 audit(1734055317.111:907): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.140290 kernel: audit: type=1400 audit(1734055317.111:908): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.140333 kernel: audit: type=1400 audit(1734055317.115:909): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.115000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.115000 audit: BPF prog-id=114 op=LOAD Dec 13 02:01:57.115000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.115000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2232 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:57.115000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561386166333038323834616431616461303432613266623162386665 Dec 13 02:01:57.115000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.115000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2232 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:57.115000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561386166333038323834616431616461303432613266623162386665 Dec 13 02:01:57.115000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.115000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.115000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.115000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.115000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.115000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.115000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.115000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.115000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.115000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.115000 audit: BPF prog-id=115 op=LOAD Dec 13 02:01:57.115000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024cb0 items=0 ppid=2232 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:57.115000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561386166333038323834616431616461303432613266623162386665 Dec 13 02:01:57.120000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.120000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.120000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.120000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.120000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.120000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.120000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.120000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.120000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.120000 audit: BPF prog-id=116 op=LOAD Dec 13 02:01:57.120000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024cf8 items=0 ppid=2232 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:57.120000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561386166333038323834616431616461303432613266623162386665 Dec 13 02:01:57.123000 audit: BPF prog-id=116 op=UNLOAD Dec 13 02:01:57.123000 audit: BPF prog-id=115 op=UNLOAD Dec 13 02:01:57.123000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.123000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.123000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.123000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.123000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.123000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.123000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.123000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.123000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.123000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:01:57.123000 audit: BPF prog-id=117 op=LOAD Dec 13 02:01:57.123000 audit[2413]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025108 items=0 ppid=2232 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:57.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561386166333038323834616431616461303432613266623162386665 Dec 13 02:01:57.274776 env[1210]: time="2024-12-13T02:01:57.274710504Z" level=info msg="StartContainer for \"ea8af308284ad1ada042a2fb1b8fe3b9811afb74b16e10281892e76a87e59580\" returns successfully" Dec 13 02:01:57.841235 kubelet[2064]: I1213 02:01:57.841145 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-plw22" podStartSLOduration=5.841103585 podStartE2EDuration="5.841103585s" podCreationTimestamp="2024-12-13 02:01:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:01:52.83896274 +0000 UTC m=+16.144280945" watchObservedRunningTime="2024-12-13 02:01:57.841103585 +0000 UTC m=+21.146421780" Dec 13 02:01:59.901000 audit[2446]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2446 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:59.901000 audit[2446]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd1b3aa700 a2=0 a3=7ffd1b3aa6ec items=0 ppid=2244 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:59.901000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:59.905000 audit[2446]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2446 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:59.905000 audit[2446]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd1b3aa700 a2=0 a3=0 items=0 ppid=2244 pid=2446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:59.905000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:59.920000 audit[2448]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2448 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:59.920000 audit[2448]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffdc0b33760 a2=0 a3=7ffdc0b3374c items=0 ppid=2244 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:59.920000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:01:59.929000 audit[2448]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2448 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:01:59.929000 audit[2448]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdc0b33760 a2=0 a3=0 items=0 ppid=2244 pid=2448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:01:59.929000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:02:00.032572 kubelet[2064]: I1213 02:02:00.032521 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-c7ccbd65-mdr5l" podStartSLOduration=3.801572006 podStartE2EDuration="8.032462039s" podCreationTimestamp="2024-12-13 02:01:52 +0000 UTC" firstStartedPulling="2024-12-13 02:01:52.842414249 +0000 UTC m=+16.147732444" lastFinishedPulling="2024-12-13 02:01:57.073304282 +0000 UTC m=+20.378622477" observedRunningTime="2024-12-13 02:01:57.84159793 +0000 UTC m=+21.146916145" watchObservedRunningTime="2024-12-13 02:02:00.032462039 +0000 UTC m=+23.337780234" Dec 13 02:02:00.033590 kubelet[2064]: I1213 02:02:00.033550 2064 topology_manager.go:215] "Topology Admit Handler" podUID="385e3ee7-b761-42c6-9f9c-2a12b938f1c0" podNamespace="calico-system" podName="calico-typha-9655bdc4c-qnb6n" Dec 13 02:02:00.037847 systemd[1]: Created slice kubepods-besteffort-pod385e3ee7_b761_42c6_9f9c_2a12b938f1c0.slice. Dec 13 02:02:00.038650 kubelet[2064]: W1213 02:02:00.038543 2064 reflector.go:539] object-"calico-system"/"typha-certs": failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:localhost" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'localhost' and this object Dec 13 02:02:00.038650 kubelet[2064]: E1213 02:02:00.038570 2064 reflector.go:147] object-"calico-system"/"typha-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:localhost" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'localhost' and this object Dec 13 02:02:00.038650 kubelet[2064]: W1213 02:02:00.038600 2064 reflector.go:539] object-"calico-system"/"tigera-ca-bundle": failed to list *v1.ConfigMap: configmaps "tigera-ca-bundle" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'localhost' and this object Dec 13 02:02:00.038650 kubelet[2064]: E1213 02:02:00.038608 2064 reflector.go:147] object-"calico-system"/"tigera-ca-bundle": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "tigera-ca-bundle" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'localhost' and this object Dec 13 02:02:00.038650 kubelet[2064]: W1213 02:02:00.038630 2064 reflector.go:539] object-"calico-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'localhost' and this object Dec 13 02:02:00.038797 kubelet[2064]: E1213 02:02:00.038637 2064 reflector.go:147] object-"calico-system"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'localhost' and this object Dec 13 02:02:00.090513 kubelet[2064]: I1213 02:02:00.090467 2064 topology_manager.go:215] "Topology Admit Handler" podUID="4f2daace-2e31-4ae5-9f7d-1f8fc2a65222" podNamespace="calico-system" podName="calico-node-pvxbs" Dec 13 02:02:00.094828 systemd[1]: Created slice kubepods-besteffort-pod4f2daace_2e31_4ae5_9f7d_1f8fc2a65222.slice. Dec 13 02:02:00.128424 kubelet[2064]: I1213 02:02:00.128355 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/385e3ee7-b761-42c6-9f9c-2a12b938f1c0-tigera-ca-bundle\") pod \"calico-typha-9655bdc4c-qnb6n\" (UID: \"385e3ee7-b761-42c6-9f9c-2a12b938f1c0\") " pod="calico-system/calico-typha-9655bdc4c-qnb6n" Dec 13 02:02:00.128424 kubelet[2064]: I1213 02:02:00.128430 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lwf5n\" (UniqueName: \"kubernetes.io/projected/385e3ee7-b761-42c6-9f9c-2a12b938f1c0-kube-api-access-lwf5n\") pod \"calico-typha-9655bdc4c-qnb6n\" (UID: \"385e3ee7-b761-42c6-9f9c-2a12b938f1c0\") " pod="calico-system/calico-typha-9655bdc4c-qnb6n" Dec 13 02:02:00.128642 kubelet[2064]: I1213 02:02:00.128456 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4f2daace-2e31-4ae5-9f7d-1f8fc2a65222-tigera-ca-bundle\") pod \"calico-node-pvxbs\" (UID: \"4f2daace-2e31-4ae5-9f7d-1f8fc2a65222\") " pod="calico-system/calico-node-pvxbs" Dec 13 02:02:00.128642 kubelet[2064]: I1213 02:02:00.128480 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4f2daace-2e31-4ae5-9f7d-1f8fc2a65222-lib-modules\") pod \"calico-node-pvxbs\" (UID: \"4f2daace-2e31-4ae5-9f7d-1f8fc2a65222\") " pod="calico-system/calico-node-pvxbs" Dec 13 02:02:00.128642 kubelet[2064]: I1213 02:02:00.128503 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4f2daace-2e31-4ae5-9f7d-1f8fc2a65222-xtables-lock\") pod \"calico-node-pvxbs\" (UID: \"4f2daace-2e31-4ae5-9f7d-1f8fc2a65222\") " pod="calico-system/calico-node-pvxbs" Dec 13 02:02:00.128642 kubelet[2064]: I1213 02:02:00.128523 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/4f2daace-2e31-4ae5-9f7d-1f8fc2a65222-var-lib-calico\") pod \"calico-node-pvxbs\" (UID: \"4f2daace-2e31-4ae5-9f7d-1f8fc2a65222\") " pod="calico-system/calico-node-pvxbs" Dec 13 02:02:00.128642 kubelet[2064]: I1213 02:02:00.128544 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/4f2daace-2e31-4ae5-9f7d-1f8fc2a65222-node-certs\") pod \"calico-node-pvxbs\" (UID: \"4f2daace-2e31-4ae5-9f7d-1f8fc2a65222\") " pod="calico-system/calico-node-pvxbs" Dec 13 02:02:00.128807 kubelet[2064]: I1213 02:02:00.128565 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/4f2daace-2e31-4ae5-9f7d-1f8fc2a65222-var-run-calico\") pod \"calico-node-pvxbs\" (UID: \"4f2daace-2e31-4ae5-9f7d-1f8fc2a65222\") " pod="calico-system/calico-node-pvxbs" Dec 13 02:02:00.128807 kubelet[2064]: I1213 02:02:00.128589 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/4f2daace-2e31-4ae5-9f7d-1f8fc2a65222-cni-bin-dir\") pod \"calico-node-pvxbs\" (UID: \"4f2daace-2e31-4ae5-9f7d-1f8fc2a65222\") " pod="calico-system/calico-node-pvxbs" Dec 13 02:02:00.128807 kubelet[2064]: I1213 02:02:00.128611 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/4f2daace-2e31-4ae5-9f7d-1f8fc2a65222-cni-log-dir\") pod \"calico-node-pvxbs\" (UID: \"4f2daace-2e31-4ae5-9f7d-1f8fc2a65222\") " pod="calico-system/calico-node-pvxbs" Dec 13 02:02:00.128807 kubelet[2064]: I1213 02:02:00.128636 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/4f2daace-2e31-4ae5-9f7d-1f8fc2a65222-flexvol-driver-host\") pod \"calico-node-pvxbs\" (UID: \"4f2daace-2e31-4ae5-9f7d-1f8fc2a65222\") " pod="calico-system/calico-node-pvxbs" Dec 13 02:02:00.128807 kubelet[2064]: I1213 02:02:00.128660 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/4f2daace-2e31-4ae5-9f7d-1f8fc2a65222-cni-net-dir\") pod \"calico-node-pvxbs\" (UID: \"4f2daace-2e31-4ae5-9f7d-1f8fc2a65222\") " pod="calico-system/calico-node-pvxbs" Dec 13 02:02:00.128923 kubelet[2064]: I1213 02:02:00.128683 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/4f2daace-2e31-4ae5-9f7d-1f8fc2a65222-policysync\") pod \"calico-node-pvxbs\" (UID: \"4f2daace-2e31-4ae5-9f7d-1f8fc2a65222\") " pod="calico-system/calico-node-pvxbs" Dec 13 02:02:00.128923 kubelet[2064]: I1213 02:02:00.128705 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-699s9\" (UniqueName: \"kubernetes.io/projected/4f2daace-2e31-4ae5-9f7d-1f8fc2a65222-kube-api-access-699s9\") pod \"calico-node-pvxbs\" (UID: \"4f2daace-2e31-4ae5-9f7d-1f8fc2a65222\") " pod="calico-system/calico-node-pvxbs" Dec 13 02:02:00.128923 kubelet[2064]: I1213 02:02:00.128736 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/385e3ee7-b761-42c6-9f9c-2a12b938f1c0-typha-certs\") pod \"calico-typha-9655bdc4c-qnb6n\" (UID: \"385e3ee7-b761-42c6-9f9c-2a12b938f1c0\") " pod="calico-system/calico-typha-9655bdc4c-qnb6n" Dec 13 02:02:00.202966 kubelet[2064]: I1213 02:02:00.202837 2064 topology_manager.go:215] "Topology Admit Handler" podUID="37bc7145-5a7a-456a-94e8-117913a4280c" podNamespace="calico-system" podName="csi-node-driver-m7k69" Dec 13 02:02:00.203139 kubelet[2064]: E1213 02:02:00.203119 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m7k69" podUID="37bc7145-5a7a-456a-94e8-117913a4280c" Dec 13 02:02:00.230415 kubelet[2064]: I1213 02:02:00.230083 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/37bc7145-5a7a-456a-94e8-117913a4280c-registration-dir\") pod \"csi-node-driver-m7k69\" (UID: \"37bc7145-5a7a-456a-94e8-117913a4280c\") " pod="calico-system/csi-node-driver-m7k69" Dec 13 02:02:00.230415 kubelet[2064]: I1213 02:02:00.230247 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/37bc7145-5a7a-456a-94e8-117913a4280c-socket-dir\") pod \"csi-node-driver-m7k69\" (UID: \"37bc7145-5a7a-456a-94e8-117913a4280c\") " pod="calico-system/csi-node-driver-m7k69" Dec 13 02:02:00.230415 kubelet[2064]: I1213 02:02:00.230326 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/37bc7145-5a7a-456a-94e8-117913a4280c-kubelet-dir\") pod \"csi-node-driver-m7k69\" (UID: \"37bc7145-5a7a-456a-94e8-117913a4280c\") " pod="calico-system/csi-node-driver-m7k69" Dec 13 02:02:00.230700 kubelet[2064]: I1213 02:02:00.230448 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/37bc7145-5a7a-456a-94e8-117913a4280c-varrun\") pod \"csi-node-driver-m7k69\" (UID: \"37bc7145-5a7a-456a-94e8-117913a4280c\") " pod="calico-system/csi-node-driver-m7k69" Dec 13 02:02:00.230739 kubelet[2064]: I1213 02:02:00.230721 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qztvp\" (UniqueName: \"kubernetes.io/projected/37bc7145-5a7a-456a-94e8-117913a4280c-kube-api-access-qztvp\") pod \"csi-node-driver-m7k69\" (UID: \"37bc7145-5a7a-456a-94e8-117913a4280c\") " pod="calico-system/csi-node-driver-m7k69" Dec 13 02:02:00.231192 kubelet[2064]: E1213 02:02:00.231150 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.231192 kubelet[2064]: W1213 02:02:00.231171 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.232103 kubelet[2064]: E1213 02:02:00.232080 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.232748 kubelet[2064]: E1213 02:02:00.232306 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.232748 kubelet[2064]: W1213 02:02:00.232317 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.232748 kubelet[2064]: E1213 02:02:00.232331 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.232748 kubelet[2064]: E1213 02:02:00.232479 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.232748 kubelet[2064]: W1213 02:02:00.232486 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.232748 kubelet[2064]: E1213 02:02:00.232497 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.232748 kubelet[2064]: E1213 02:02:00.232712 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.232748 kubelet[2064]: W1213 02:02:00.232733 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.232748 kubelet[2064]: E1213 02:02:00.232746 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.238786 kubelet[2064]: E1213 02:02:00.236983 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.238786 kubelet[2064]: W1213 02:02:00.237006 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.238786 kubelet[2064]: E1213 02:02:00.237030 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.332472 kubelet[2064]: E1213 02:02:00.332421 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.332472 kubelet[2064]: W1213 02:02:00.332450 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.332472 kubelet[2064]: E1213 02:02:00.332475 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.332777 kubelet[2064]: E1213 02:02:00.332732 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.332777 kubelet[2064]: W1213 02:02:00.332749 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.332777 kubelet[2064]: E1213 02:02:00.332764 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.333128 kubelet[2064]: E1213 02:02:00.333079 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.333128 kubelet[2064]: W1213 02:02:00.333094 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.333128 kubelet[2064]: E1213 02:02:00.333120 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.333438 kubelet[2064]: E1213 02:02:00.333403 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.333438 kubelet[2064]: W1213 02:02:00.333436 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.333552 kubelet[2064]: E1213 02:02:00.333472 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.333744 kubelet[2064]: E1213 02:02:00.333725 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.333744 kubelet[2064]: W1213 02:02:00.333741 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.333828 kubelet[2064]: E1213 02:02:00.333763 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.334133 kubelet[2064]: E1213 02:02:00.333982 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.334186 kubelet[2064]: W1213 02:02:00.334136 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.334186 kubelet[2064]: E1213 02:02:00.334159 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.334418 kubelet[2064]: E1213 02:02:00.334398 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.334418 kubelet[2064]: W1213 02:02:00.334415 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.334501 kubelet[2064]: E1213 02:02:00.334443 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.334733 kubelet[2064]: E1213 02:02:00.334717 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.334814 kubelet[2064]: W1213 02:02:00.334797 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.334910 kubelet[2064]: E1213 02:02:00.334893 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.335266 kubelet[2064]: E1213 02:02:00.335252 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.335390 kubelet[2064]: W1213 02:02:00.335337 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.335695 kubelet[2064]: E1213 02:02:00.335475 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.335695 kubelet[2064]: E1213 02:02:00.335670 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.335695 kubelet[2064]: W1213 02:02:00.335682 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.335695 kubelet[2064]: E1213 02:02:00.335696 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.336015 kubelet[2064]: E1213 02:02:00.335989 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.336015 kubelet[2064]: W1213 02:02:00.336007 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.336278 kubelet[2064]: E1213 02:02:00.336035 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.336500 kubelet[2064]: E1213 02:02:00.336453 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.336500 kubelet[2064]: W1213 02:02:00.336469 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.336500 kubelet[2064]: E1213 02:02:00.336488 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.336759 kubelet[2064]: E1213 02:02:00.336694 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.336759 kubelet[2064]: W1213 02:02:00.336710 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.336759 kubelet[2064]: E1213 02:02:00.336726 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.337023 kubelet[2064]: E1213 02:02:00.336998 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.337023 kubelet[2064]: W1213 02:02:00.337020 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.337144 kubelet[2064]: E1213 02:02:00.337058 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.337335 kubelet[2064]: E1213 02:02:00.337306 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.337335 kubelet[2064]: W1213 02:02:00.337330 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.337475 kubelet[2064]: E1213 02:02:00.337353 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.337604 kubelet[2064]: E1213 02:02:00.337587 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.337604 kubelet[2064]: W1213 02:02:00.337597 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.337708 kubelet[2064]: E1213 02:02:00.337635 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.337802 kubelet[2064]: E1213 02:02:00.337783 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.337802 kubelet[2064]: W1213 02:02:00.337796 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.337905 kubelet[2064]: E1213 02:02:00.337832 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.338094 kubelet[2064]: E1213 02:02:00.338074 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.338094 kubelet[2064]: W1213 02:02:00.338087 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.338194 kubelet[2064]: E1213 02:02:00.338171 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.338292 kubelet[2064]: E1213 02:02:00.338275 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.338292 kubelet[2064]: W1213 02:02:00.338284 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.338399 kubelet[2064]: E1213 02:02:00.338327 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.338503 kubelet[2064]: E1213 02:02:00.338488 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.338503 kubelet[2064]: W1213 02:02:00.338497 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.338579 kubelet[2064]: E1213 02:02:00.338511 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.338725 kubelet[2064]: E1213 02:02:00.338709 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.338725 kubelet[2064]: W1213 02:02:00.338723 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.338801 kubelet[2064]: E1213 02:02:00.338749 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.338937 kubelet[2064]: E1213 02:02:00.338925 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.338937 kubelet[2064]: W1213 02:02:00.338935 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.339004 kubelet[2064]: E1213 02:02:00.338953 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.339222 kubelet[2064]: E1213 02:02:00.339206 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.339222 kubelet[2064]: W1213 02:02:00.339217 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.339327 kubelet[2064]: E1213 02:02:00.339234 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.339675 kubelet[2064]: E1213 02:02:00.339641 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.339675 kubelet[2064]: W1213 02:02:00.339660 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.339675 kubelet[2064]: E1213 02:02:00.339687 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.340371 kubelet[2064]: E1213 02:02:00.340343 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.340371 kubelet[2064]: W1213 02:02:00.340367 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.340485 kubelet[2064]: E1213 02:02:00.340461 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.340652 kubelet[2064]: E1213 02:02:00.340636 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.340652 kubelet[2064]: W1213 02:02:00.340647 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.340739 kubelet[2064]: E1213 02:02:00.340678 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.340892 kubelet[2064]: E1213 02:02:00.340878 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.340892 kubelet[2064]: W1213 02:02:00.340889 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.340946 kubelet[2064]: E1213 02:02:00.340927 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.341167 kubelet[2064]: E1213 02:02:00.341136 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.341167 kubelet[2064]: W1213 02:02:00.341159 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.341273 kubelet[2064]: E1213 02:02:00.341179 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.341438 kubelet[2064]: E1213 02:02:00.341408 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.341438 kubelet[2064]: W1213 02:02:00.341421 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.341438 kubelet[2064]: E1213 02:02:00.341436 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.341921 kubelet[2064]: E1213 02:02:00.341901 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.341921 kubelet[2064]: W1213 02:02:00.341920 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.341998 kubelet[2064]: E1213 02:02:00.341938 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.437892 kubelet[2064]: E1213 02:02:00.437844 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.437892 kubelet[2064]: W1213 02:02:00.437867 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.437892 kubelet[2064]: E1213 02:02:00.437886 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.438150 kubelet[2064]: E1213 02:02:00.438071 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.438150 kubelet[2064]: W1213 02:02:00.438079 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.438150 kubelet[2064]: E1213 02:02:00.438092 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.438262 kubelet[2064]: E1213 02:02:00.438248 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.438262 kubelet[2064]: W1213 02:02:00.438257 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.438330 kubelet[2064]: E1213 02:02:00.438266 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.438451 kubelet[2064]: E1213 02:02:00.438427 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.438451 kubelet[2064]: W1213 02:02:00.438438 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.438451 kubelet[2064]: E1213 02:02:00.438447 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.438597 kubelet[2064]: E1213 02:02:00.438591 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.438597 kubelet[2064]: W1213 02:02:00.438597 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.438659 kubelet[2064]: E1213 02:02:00.438605 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.438756 kubelet[2064]: E1213 02:02:00.438736 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.438756 kubelet[2064]: W1213 02:02:00.438746 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.438756 kubelet[2064]: E1213 02:02:00.438754 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.539850 kubelet[2064]: E1213 02:02:00.539741 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.539850 kubelet[2064]: W1213 02:02:00.539759 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.539850 kubelet[2064]: E1213 02:02:00.539782 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.540067 kubelet[2064]: E1213 02:02:00.539941 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.540067 kubelet[2064]: W1213 02:02:00.539947 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.540067 kubelet[2064]: E1213 02:02:00.539955 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.540174 kubelet[2064]: E1213 02:02:00.540115 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.540174 kubelet[2064]: W1213 02:02:00.540121 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.540174 kubelet[2064]: E1213 02:02:00.540130 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.540407 kubelet[2064]: E1213 02:02:00.540341 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.540407 kubelet[2064]: W1213 02:02:00.540371 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.540407 kubelet[2064]: E1213 02:02:00.540396 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.540708 kubelet[2064]: E1213 02:02:00.540691 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.540708 kubelet[2064]: W1213 02:02:00.540701 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.540860 kubelet[2064]: E1213 02:02:00.540730 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.540964 kubelet[2064]: E1213 02:02:00.540951 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.540964 kubelet[2064]: W1213 02:02:00.540961 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.541124 kubelet[2064]: E1213 02:02:00.540973 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.641534 kubelet[2064]: E1213 02:02:00.641500 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.641534 kubelet[2064]: W1213 02:02:00.641516 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.641534 kubelet[2064]: E1213 02:02:00.641535 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.641728 kubelet[2064]: E1213 02:02:00.641679 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.641728 kubelet[2064]: W1213 02:02:00.641684 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.641728 kubelet[2064]: E1213 02:02:00.641693 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.641850 kubelet[2064]: E1213 02:02:00.641833 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.641850 kubelet[2064]: W1213 02:02:00.641841 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.641850 kubelet[2064]: E1213 02:02:00.641849 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.641987 kubelet[2064]: E1213 02:02:00.641972 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.641987 kubelet[2064]: W1213 02:02:00.641980 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.641987 kubelet[2064]: E1213 02:02:00.641988 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.642147 kubelet[2064]: E1213 02:02:00.642133 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.642147 kubelet[2064]: W1213 02:02:00.642140 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.642147 kubelet[2064]: E1213 02:02:00.642149 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.642288 kubelet[2064]: E1213 02:02:00.642280 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.642288 kubelet[2064]: W1213 02:02:00.642287 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.642337 kubelet[2064]: E1213 02:02:00.642294 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.743307 kubelet[2064]: E1213 02:02:00.743271 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.743307 kubelet[2064]: W1213 02:02:00.743289 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.743307 kubelet[2064]: E1213 02:02:00.743312 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.743586 kubelet[2064]: E1213 02:02:00.743568 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.743586 kubelet[2064]: W1213 02:02:00.743579 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.743644 kubelet[2064]: E1213 02:02:00.743591 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.743760 kubelet[2064]: E1213 02:02:00.743747 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.743760 kubelet[2064]: W1213 02:02:00.743756 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.743824 kubelet[2064]: E1213 02:02:00.743767 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.743930 kubelet[2064]: E1213 02:02:00.743917 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.743930 kubelet[2064]: W1213 02:02:00.743926 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.743999 kubelet[2064]: E1213 02:02:00.743937 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.744110 kubelet[2064]: E1213 02:02:00.744101 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.744136 kubelet[2064]: W1213 02:02:00.744110 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.744136 kubelet[2064]: E1213 02:02:00.744121 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.744262 kubelet[2064]: E1213 02:02:00.744250 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.744262 kubelet[2064]: W1213 02:02:00.744259 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.744332 kubelet[2064]: E1213 02:02:00.744269 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.844858 kubelet[2064]: E1213 02:02:00.844764 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.844858 kubelet[2064]: W1213 02:02:00.844780 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.844858 kubelet[2064]: E1213 02:02:00.844799 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.845319 kubelet[2064]: E1213 02:02:00.845248 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.845319 kubelet[2064]: W1213 02:02:00.845274 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.845319 kubelet[2064]: E1213 02:02:00.845306 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.845658 kubelet[2064]: E1213 02:02:00.845628 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.845658 kubelet[2064]: W1213 02:02:00.845642 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.845658 kubelet[2064]: E1213 02:02:00.845658 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.845858 kubelet[2064]: E1213 02:02:00.845845 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.845858 kubelet[2064]: W1213 02:02:00.845855 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.845986 kubelet[2064]: E1213 02:02:00.845868 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.846095 kubelet[2064]: E1213 02:02:00.846071 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.846095 kubelet[2064]: W1213 02:02:00.846081 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.846095 kubelet[2064]: E1213 02:02:00.846091 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.846319 kubelet[2064]: E1213 02:02:00.846230 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.846319 kubelet[2064]: W1213 02:02:00.846236 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.846319 kubelet[2064]: E1213 02:02:00.846244 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.919457 kubelet[2064]: E1213 02:02:00.917622 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.919457 kubelet[2064]: W1213 02:02:00.917636 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.919457 kubelet[2064]: E1213 02:02:00.917653 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.924117 kubelet[2064]: E1213 02:02:00.919925 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.924117 kubelet[2064]: W1213 02:02:00.919936 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.924117 kubelet[2064]: E1213 02:02:00.919946 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.924832 kubelet[2064]: E1213 02:02:00.924813 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.924876 kubelet[2064]: W1213 02:02:00.924834 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.924876 kubelet[2064]: E1213 02:02:00.924864 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.939000 audit[2522]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2522 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:02:00.939000 audit[2522]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffccb6ec110 a2=0 a3=7ffccb6ec0fc items=0 ppid=2244 pid=2522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:00.939000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:02:00.946827 kubelet[2064]: E1213 02:02:00.946803 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.946827 kubelet[2064]: W1213 02:02:00.946815 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.946827 kubelet[2064]: E1213 02:02:00.946827 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.947004 kubelet[2064]: E1213 02:02:00.946988 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.947004 kubelet[2064]: W1213 02:02:00.946997 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.947076 kubelet[2064]: E1213 02:02:00.947006 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.947152 kubelet[2064]: E1213 02:02:00.947138 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:00.947152 kubelet[2064]: W1213 02:02:00.947147 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:00.947199 kubelet[2064]: E1213 02:02:00.947155 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:00.947000 audit[2522]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2522 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:02:00.947000 audit[2522]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffccb6ec110 a2=0 a3=0 items=0 ppid=2244 pid=2522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:00.947000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:02:01.048248 kubelet[2064]: E1213 02:02:01.048199 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:01.048248 kubelet[2064]: W1213 02:02:01.048220 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:01.048248 kubelet[2064]: E1213 02:02:01.048240 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:01.048669 kubelet[2064]: E1213 02:02:01.048374 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:01.048669 kubelet[2064]: W1213 02:02:01.048379 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:01.048669 kubelet[2064]: E1213 02:02:01.048392 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:01.048669 kubelet[2064]: E1213 02:02:01.048599 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:01.048669 kubelet[2064]: W1213 02:02:01.048604 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:01.048669 kubelet[2064]: E1213 02:02:01.048615 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:01.142072 kubelet[2064]: E1213 02:02:01.141962 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:01.142072 kubelet[2064]: W1213 02:02:01.141982 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:01.142072 kubelet[2064]: E1213 02:02:01.142005 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:01.142241 kubelet[2064]: E1213 02:02:01.142214 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:01.142241 kubelet[2064]: W1213 02:02:01.142221 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:01.142241 kubelet[2064]: E1213 02:02:01.142230 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:01.146930 kubelet[2064]: E1213 02:02:01.146893 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:01.146930 kubelet[2064]: W1213 02:02:01.146914 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:01.147095 kubelet[2064]: E1213 02:02:01.146938 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:01.240516 kubelet[2064]: E1213 02:02:01.240445 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:02:01.241434 env[1210]: time="2024-12-13T02:02:01.241379278Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-9655bdc4c-qnb6n,Uid:385e3ee7-b761-42c6-9f9c-2a12b938f1c0,Namespace:calico-system,Attempt:0,}" Dec 13 02:02:01.263731 env[1210]: time="2024-12-13T02:02:01.263658172Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:02:01.263923 env[1210]: time="2024-12-13T02:02:01.263881338Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:02:01.263923 env[1210]: time="2024-12-13T02:02:01.263920072Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:02:01.264263 env[1210]: time="2024-12-13T02:02:01.264184566Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2d107450e711ebedb9e5a312c07b4fe3824575771bf510b9cca7a07bf814cc0c pid=2539 runtime=io.containerd.runc.v2 Dec 13 02:02:01.280910 systemd[1]: Started cri-containerd-2d107450e711ebedb9e5a312c07b4fe3824575771bf510b9cca7a07bf814cc0c.scope. Dec 13 02:02:01.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.292000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.292000 audit: BPF prog-id=118 op=LOAD Dec 13 02:02:01.293000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.293000 audit[2551]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000217c48 a2=10 a3=1c items=0 ppid=2539 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:01.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264313037343530653731316562656462396535613331326330376234 Dec 13 02:02:01.293000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.293000 audit[2551]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0002176b0 a2=3c a3=c items=0 ppid=2539 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:01.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264313037343530653731316562656462396535613331326330376234 Dec 13 02:02:01.293000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.293000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.293000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.293000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.293000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.293000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.293000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.293000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.293000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.293000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.293000 audit: BPF prog-id=119 op=LOAD Dec 13 02:02:01.293000 audit[2551]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0002179d8 a2=78 a3=c0002dfce0 items=0 ppid=2539 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:01.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264313037343530653731316562656462396535613331326330376234 Dec 13 02:02:01.293000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.293000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.293000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.293000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.293000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.293000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.293000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.293000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.293000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.293000 audit: BPF prog-id=120 op=LOAD Dec 13 02:02:01.293000 audit[2551]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000217770 a2=78 a3=c0002dfd28 items=0 ppid=2539 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:01.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264313037343530653731316562656462396535613331326330376234 Dec 13 02:02:01.293000 audit: BPF prog-id=120 op=UNLOAD Dec 13 02:02:01.293000 audit: BPF prog-id=119 op=UNLOAD Dec 13 02:02:01.293000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.293000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.293000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.293000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.293000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.293000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.293000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.293000 audit[2551]: AVC avc: denied { perfmon } for pid=2551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.293000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.293000 audit[2551]: AVC avc: denied { bpf } for pid=2551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.293000 audit: BPF prog-id=121 op=LOAD Dec 13 02:02:01.293000 audit[2551]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000217c30 a2=78 a3=c0003e2138 items=0 ppid=2539 pid=2551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:01.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264313037343530653731316562656462396535613331326330376234 Dec 13 02:02:01.297395 kubelet[2064]: E1213 02:02:01.297351 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:02:01.299200 env[1210]: time="2024-12-13T02:02:01.298202641Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-pvxbs,Uid:4f2daace-2e31-4ae5-9f7d-1f8fc2a65222,Namespace:calico-system,Attempt:0,}" Dec 13 02:02:01.322743 env[1210]: time="2024-12-13T02:02:01.322692318Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-9655bdc4c-qnb6n,Uid:385e3ee7-b761-42c6-9f9c-2a12b938f1c0,Namespace:calico-system,Attempt:0,} returns sandbox id \"2d107450e711ebedb9e5a312c07b4fe3824575771bf510b9cca7a07bf814cc0c\"" Dec 13 02:02:01.323344 kubelet[2064]: E1213 02:02:01.323316 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:02:01.324372 env[1210]: time="2024-12-13T02:02:01.324331392Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 02:02:01.431091 env[1210]: time="2024-12-13T02:02:01.431022852Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:02:01.431286 env[1210]: time="2024-12-13T02:02:01.431093528Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:02:01.431286 env[1210]: time="2024-12-13T02:02:01.431106452Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:02:01.431286 env[1210]: time="2024-12-13T02:02:01.431210580Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fb28f973c6076b24679dfa13ec6eaf3cede5d9fe27fb922f8f3444c8f07e07e3 pid=2581 runtime=io.containerd.runc.v2 Dec 13 02:02:01.439875 systemd[1]: Started cri-containerd-fb28f973c6076b24679dfa13ec6eaf3cede5d9fe27fb922f8f3444c8f07e07e3.scope. Dec 13 02:02:01.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.449000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.449000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.449000 audit: BPF prog-id=122 op=LOAD Dec 13 02:02:01.450000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.450000 audit[2591]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2581 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:01.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662323866393733633630373662323436373964666131336563366561 Dec 13 02:02:01.450000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.450000 audit[2591]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2581 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:01.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662323866393733633630373662323436373964666131336563366561 Dec 13 02:02:01.450000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.450000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.450000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.450000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.450000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.450000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.450000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.450000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.450000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.450000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.450000 audit: BPF prog-id=123 op=LOAD Dec 13 02:02:01.450000 audit[2591]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00031cc70 items=0 ppid=2581 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:01.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662323866393733633630373662323436373964666131336563366561 Dec 13 02:02:01.450000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.450000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.450000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.450000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.450000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.450000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.450000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.450000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.450000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.450000 audit: BPF prog-id=124 op=LOAD Dec 13 02:02:01.450000 audit[2591]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00031ccb8 items=0 ppid=2581 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:01.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662323866393733633630373662323436373964666131336563366561 Dec 13 02:02:01.450000 audit: BPF prog-id=124 op=UNLOAD Dec 13 02:02:01.450000 audit: BPF prog-id=123 op=UNLOAD Dec 13 02:02:01.450000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.450000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.450000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.450000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.450000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.450000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.450000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.450000 audit[2591]: AVC avc: denied { perfmon } for pid=2591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.450000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.450000 audit[2591]: AVC avc: denied { bpf } for pid=2591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:01.450000 audit: BPF prog-id=125 op=LOAD Dec 13 02:02:01.450000 audit[2591]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00031d0c8 items=0 ppid=2581 pid=2591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:01.450000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662323866393733633630373662323436373964666131336563366561 Dec 13 02:02:01.461804 env[1210]: time="2024-12-13T02:02:01.461755838Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-pvxbs,Uid:4f2daace-2e31-4ae5-9f7d-1f8fc2a65222,Namespace:calico-system,Attempt:0,} returns sandbox id \"fb28f973c6076b24679dfa13ec6eaf3cede5d9fe27fb922f8f3444c8f07e07e3\"" Dec 13 02:02:01.462390 kubelet[2064]: E1213 02:02:01.462371 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:02:01.791289 kubelet[2064]: E1213 02:02:01.791163 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m7k69" podUID="37bc7145-5a7a-456a-94e8-117913a4280c" Dec 13 02:02:02.854644 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3423417606.mount: Deactivated successfully. Dec 13 02:02:03.791531 kubelet[2064]: E1213 02:02:03.791465 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m7k69" podUID="37bc7145-5a7a-456a-94e8-117913a4280c" Dec 13 02:02:04.727316 env[1210]: time="2024-12-13T02:02:04.727259632Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:04.729756 env[1210]: time="2024-12-13T02:02:04.729718480Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:04.731721 env[1210]: time="2024-12-13T02:02:04.731674532Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:04.733426 env[1210]: time="2024-12-13T02:02:04.733397311Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:04.733894 env[1210]: time="2024-12-13T02:02:04.733836076Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 02:02:04.735607 env[1210]: time="2024-12-13T02:02:04.735580405Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 02:02:04.744022 env[1210]: time="2024-12-13T02:02:04.743979026Z" level=info msg="CreateContainer within sandbox \"2d107450e711ebedb9e5a312c07b4fe3824575771bf510b9cca7a07bf814cc0c\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 02:02:05.045226 env[1210]: time="2024-12-13T02:02:05.045093562Z" level=info msg="CreateContainer within sandbox \"2d107450e711ebedb9e5a312c07b4fe3824575771bf510b9cca7a07bf814cc0c\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"efb83500043658d0a5f0fab5fcff1793dd77c7614ba43f9b6e445b862adc2408\"" Dec 13 02:02:05.045880 env[1210]: time="2024-12-13T02:02:05.045851954Z" level=info msg="StartContainer for \"efb83500043658d0a5f0fab5fcff1793dd77c7614ba43f9b6e445b862adc2408\"" Dec 13 02:02:05.069650 systemd[1]: Started cri-containerd-efb83500043658d0a5f0fab5fcff1793dd77c7614ba43f9b6e445b862adc2408.scope. Dec 13 02:02:05.087090 kernel: kauditd_printk_skb: 179 callbacks suppressed Dec 13 02:02:05.087240 kernel: audit: type=1400 audit(1734055325.082:960): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.091306 kernel: audit: type=1400 audit(1734055325.082:961): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.094781 kernel: audit: type=1400 audit(1734055325.082:962): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.095261 kernel: audit: type=1400 audit(1734055325.082:963): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.102041 kernel: audit: type=1400 audit(1734055325.082:964): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.108447 kernel: audit: type=1400 audit(1734055325.082:965): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.108697 kernel: audit: type=1400 audit(1734055325.082:966): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.108737 kernel: audit: type=1400 audit(1734055325.082:967): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.111524 kernel: audit: type=1400 audit(1734055325.082:968): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.117418 kernel: audit: type=1400 audit(1734055325.082:969): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.082000 audit: BPF prog-id=126 op=LOAD Dec 13 02:02:05.086000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.086000 audit[2624]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2539 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:05.086000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566623833353030303433363538643061356630666162356663666631 Dec 13 02:02:05.086000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.086000 audit[2624]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2539 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:05.086000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566623833353030303433363538643061356630666162356663666631 Dec 13 02:02:05.086000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.086000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.086000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.086000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.086000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.086000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.086000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.086000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.086000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.086000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.086000 audit: BPF prog-id=127 op=LOAD Dec 13 02:02:05.086000 audit[2624]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00021b000 items=0 ppid=2539 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:05.086000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566623833353030303433363538643061356630666162356663666631 Dec 13 02:02:05.086000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.086000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.086000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.086000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.086000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.086000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.086000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.086000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.086000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.086000 audit: BPF prog-id=128 op=LOAD Dec 13 02:02:05.086000 audit[2624]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00021b048 items=0 ppid=2539 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:05.086000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566623833353030303433363538643061356630666162356663666631 Dec 13 02:02:05.097000 audit: BPF prog-id=128 op=UNLOAD Dec 13 02:02:05.097000 audit: BPF prog-id=127 op=UNLOAD Dec 13 02:02:05.097000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.097000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.097000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.097000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.097000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.097000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.097000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.097000 audit[2624]: AVC avc: denied { perfmon } for pid=2624 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.097000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.097000 audit[2624]: AVC avc: denied { bpf } for pid=2624 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:05.097000 audit: BPF prog-id=129 op=LOAD Dec 13 02:02:05.097000 audit[2624]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00021b458 items=0 ppid=2539 pid=2624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:05.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566623833353030303433363538643061356630666162356663666631 Dec 13 02:02:05.144188 env[1210]: time="2024-12-13T02:02:05.144137145Z" level=info msg="StartContainer for \"efb83500043658d0a5f0fab5fcff1793dd77c7614ba43f9b6e445b862adc2408\" returns successfully" Dec 13 02:02:05.740547 systemd[1]: run-containerd-runc-k8s.io-efb83500043658d0a5f0fab5fcff1793dd77c7614ba43f9b6e445b862adc2408-runc.Mh5R5S.mount: Deactivated successfully. Dec 13 02:02:05.792292 kubelet[2064]: E1213 02:02:05.792242 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m7k69" podUID="37bc7145-5a7a-456a-94e8-117913a4280c" Dec 13 02:02:05.922826 kubelet[2064]: E1213 02:02:05.922796 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:02:05.964987 kubelet[2064]: E1213 02:02:05.964927 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:05.964987 kubelet[2064]: W1213 02:02:05.964953 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:05.964987 kubelet[2064]: E1213 02:02:05.964974 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:05.965247 kubelet[2064]: E1213 02:02:05.965203 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:05.965247 kubelet[2064]: W1213 02:02:05.965209 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:05.965247 kubelet[2064]: E1213 02:02:05.965219 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:05.965401 kubelet[2064]: E1213 02:02:05.965378 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:05.965401 kubelet[2064]: W1213 02:02:05.965388 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:05.965401 kubelet[2064]: E1213 02:02:05.965397 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:05.965561 kubelet[2064]: E1213 02:02:05.965539 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:05.965561 kubelet[2064]: W1213 02:02:05.965549 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:05.965561 kubelet[2064]: E1213 02:02:05.965557 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:05.965728 kubelet[2064]: E1213 02:02:05.965706 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:05.965728 kubelet[2064]: W1213 02:02:05.965716 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:05.965728 kubelet[2064]: E1213 02:02:05.965724 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:05.965871 kubelet[2064]: E1213 02:02:05.965858 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:05.965871 kubelet[2064]: W1213 02:02:05.965867 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:05.965949 kubelet[2064]: E1213 02:02:05.965875 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:05.966073 kubelet[2064]: E1213 02:02:05.966026 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:05.966073 kubelet[2064]: W1213 02:02:05.966036 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:05.966073 kubelet[2064]: E1213 02:02:05.966044 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:05.966267 kubelet[2064]: E1213 02:02:05.966198 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:05.966267 kubelet[2064]: W1213 02:02:05.966205 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:05.966267 kubelet[2064]: E1213 02:02:05.966215 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:05.966377 kubelet[2064]: E1213 02:02:05.966359 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:05.966377 kubelet[2064]: W1213 02:02:05.966375 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:05.966443 kubelet[2064]: E1213 02:02:05.966385 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:05.966539 kubelet[2064]: E1213 02:02:05.966525 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:05.966539 kubelet[2064]: W1213 02:02:05.966533 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:05.966539 kubelet[2064]: E1213 02:02:05.966541 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:05.966692 kubelet[2064]: E1213 02:02:05.966679 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:05.966692 kubelet[2064]: W1213 02:02:05.966688 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:05.966692 kubelet[2064]: E1213 02:02:05.966696 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:05.966870 kubelet[2064]: E1213 02:02:05.966855 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:05.966870 kubelet[2064]: W1213 02:02:05.966865 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:05.966966 kubelet[2064]: E1213 02:02:05.966877 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:05.967110 kubelet[2064]: E1213 02:02:05.967094 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:05.967110 kubelet[2064]: W1213 02:02:05.967103 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:05.967110 kubelet[2064]: E1213 02:02:05.967112 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:05.967275 kubelet[2064]: E1213 02:02:05.967262 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:05.967275 kubelet[2064]: W1213 02:02:05.967270 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:05.967275 kubelet[2064]: E1213 02:02:05.967278 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:05.967443 kubelet[2064]: E1213 02:02:05.967429 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:05.967443 kubelet[2064]: W1213 02:02:05.967439 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:05.967443 kubelet[2064]: E1213 02:02:05.967447 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:05.984699 kubelet[2064]: E1213 02:02:05.982819 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:05.984699 kubelet[2064]: W1213 02:02:05.982839 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:05.984699 kubelet[2064]: E1213 02:02:05.982859 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:05.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.73:22-10.0.0.1:55544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:05.984645 systemd[1]: Started sshd@9-10.0.0.73:22-10.0.0.1:55544.service. Dec 13 02:02:05.985809 kubelet[2064]: E1213 02:02:05.985227 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:05.985809 kubelet[2064]: W1213 02:02:05.985243 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:05.985809 kubelet[2064]: E1213 02:02:05.985266 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:05.985809 kubelet[2064]: E1213 02:02:05.985461 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:05.985809 kubelet[2064]: W1213 02:02:05.985471 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:05.985809 kubelet[2064]: E1213 02:02:05.985485 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:05.985809 kubelet[2064]: E1213 02:02:05.985653 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:05.985809 kubelet[2064]: W1213 02:02:05.985663 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:05.985809 kubelet[2064]: E1213 02:02:05.985676 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:05.986151 kubelet[2064]: E1213 02:02:05.986131 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:05.986151 kubelet[2064]: W1213 02:02:05.986143 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:05.986151 kubelet[2064]: E1213 02:02:05.986158 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:05.986464 kubelet[2064]: E1213 02:02:05.986395 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:05.986464 kubelet[2064]: W1213 02:02:05.986401 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:05.986464 kubelet[2064]: E1213 02:02:05.986444 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:05.986646 kubelet[2064]: E1213 02:02:05.986629 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:05.986646 kubelet[2064]: W1213 02:02:05.986639 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:05.986737 kubelet[2064]: E1213 02:02:05.986701 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:05.986769 kubelet[2064]: E1213 02:02:05.986762 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:05.986769 kubelet[2064]: W1213 02:02:05.986768 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:05.986845 kubelet[2064]: E1213 02:02:05.986817 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:05.986942 kubelet[2064]: E1213 02:02:05.986926 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:05.986942 kubelet[2064]: W1213 02:02:05.986938 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:05.987013 kubelet[2064]: E1213 02:02:05.986956 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:05.987195 kubelet[2064]: E1213 02:02:05.987181 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:05.987195 kubelet[2064]: W1213 02:02:05.987191 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:05.987275 kubelet[2064]: E1213 02:02:05.987206 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:05.987421 kubelet[2064]: E1213 02:02:05.987399 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:05.987421 kubelet[2064]: W1213 02:02:05.987415 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:05.987509 kubelet[2064]: E1213 02:02:05.987449 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:05.987724 kubelet[2064]: E1213 02:02:05.987692 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:05.987724 kubelet[2064]: W1213 02:02:05.987706 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:05.987724 kubelet[2064]: E1213 02:02:05.987721 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:05.987888 kubelet[2064]: E1213 02:02:05.987872 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:05.987888 kubelet[2064]: W1213 02:02:05.987882 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:05.987973 kubelet[2064]: E1213 02:02:05.987894 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:05.988067 kubelet[2064]: E1213 02:02:05.988028 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:05.988067 kubelet[2064]: W1213 02:02:05.988039 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:05.988141 kubelet[2064]: E1213 02:02:05.988079 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:05.988253 kubelet[2064]: E1213 02:02:05.988227 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:05.988253 kubelet[2064]: W1213 02:02:05.988239 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:05.988326 kubelet[2064]: E1213 02:02:05.988257 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:05.988428 kubelet[2064]: E1213 02:02:05.988412 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:05.988428 kubelet[2064]: W1213 02:02:05.988425 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:05.988514 kubelet[2064]: E1213 02:02:05.988443 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:05.988596 kubelet[2064]: E1213 02:02:05.988580 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:05.988596 kubelet[2064]: W1213 02:02:05.988593 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:05.988676 kubelet[2064]: E1213 02:02:05.988605 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:05.989079 kubelet[2064]: E1213 02:02:05.989060 2064 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 02:02:05.989079 kubelet[2064]: W1213 02:02:05.989074 2064 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 02:02:05.989203 kubelet[2064]: E1213 02:02:05.989087 2064 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 02:02:06.017000 audit[2671]: USER_ACCT pid=2671 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:06.018920 sshd[2671]: Accepted publickey for core from 10.0.0.1 port 55544 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:02:06.018000 audit[2671]: CRED_ACQ pid=2671 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:06.018000 audit[2671]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc16906ff0 a2=3 a3=0 items=0 ppid=1 pid=2671 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:06.018000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:02:06.019921 sshd[2671]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:02:06.024185 systemd-logind[1189]: New session 10 of user core. Dec 13 02:02:06.025358 systemd[1]: Started session-10.scope. Dec 13 02:02:06.028000 audit[2671]: USER_START pid=2671 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:06.029000 audit[2689]: CRED_ACQ pid=2689 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:06.073147 kubelet[2064]: I1213 02:02:06.073110 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-9655bdc4c-qnb6n" podStartSLOduration=2.662016922 podStartE2EDuration="6.073063251s" podCreationTimestamp="2024-12-13 02:02:00 +0000 UTC" firstStartedPulling="2024-12-13 02:02:01.324019016 +0000 UTC m=+24.629337211" lastFinishedPulling="2024-12-13 02:02:04.735065345 +0000 UTC m=+28.040383540" observedRunningTime="2024-12-13 02:02:06.072076966 +0000 UTC m=+29.377395181" watchObservedRunningTime="2024-12-13 02:02:06.073063251 +0000 UTC m=+29.378381476" Dec 13 02:02:06.142999 sshd[2671]: pam_unix(sshd:session): session closed for user core Dec 13 02:02:06.142000 audit[2671]: USER_END pid=2671 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:06.143000 audit[2671]: CRED_DISP pid=2671 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:06.145151 systemd[1]: sshd@9-10.0.0.73:22-10.0.0.1:55544.service: Deactivated successfully. Dec 13 02:02:06.144000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.73:22-10.0.0.1:55544 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:06.145886 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 02:02:06.146348 systemd-logind[1189]: Session 10 logged out. Waiting for processes to exit. Dec 13 02:02:06.147017 systemd-logind[1189]: Removed session 10. Dec 13 02:02:06.607012 env[1210]: time="2024-12-13T02:02:06.606964319Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:06.609559 env[1210]: time="2024-12-13T02:02:06.609525018Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:06.611035 env[1210]: time="2024-12-13T02:02:06.611005052Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:06.612577 env[1210]: time="2024-12-13T02:02:06.612541874Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:06.613005 env[1210]: time="2024-12-13T02:02:06.612974276Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 02:02:06.614222 env[1210]: time="2024-12-13T02:02:06.614198183Z" level=info msg="CreateContainer within sandbox \"fb28f973c6076b24679dfa13ec6eaf3cede5d9fe27fb922f8f3444c8f07e07e3\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 02:02:06.627319 env[1210]: time="2024-12-13T02:02:06.627261380Z" level=info msg="CreateContainer within sandbox \"fb28f973c6076b24679dfa13ec6eaf3cede5d9fe27fb922f8f3444c8f07e07e3\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"9e0e7417aa3969b767da5fa65619c0ddf30c12253953a1b1c7631b0e70863d41\"" Dec 13 02:02:06.627673 env[1210]: time="2024-12-13T02:02:06.627650600Z" level=info msg="StartContainer for \"9e0e7417aa3969b767da5fa65619c0ddf30c12253953a1b1c7631b0e70863d41\"" Dec 13 02:02:06.648449 systemd[1]: Started cri-containerd-9e0e7417aa3969b767da5fa65619c0ddf30c12253953a1b1c7631b0e70863d41.scope. Dec 13 02:02:06.661000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:06.661000 audit[2706]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f6799e704d8 items=0 ppid=2581 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:06.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965306537343137616133393639623736376461356661363536313963 Dec 13 02:02:06.661000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:06.661000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:06.661000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:06.661000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:06.661000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:06.661000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:06.661000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:06.661000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:06.661000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:06.661000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:06.661000 audit: BPF prog-id=130 op=LOAD Dec 13 02:02:06.661000 audit[2706]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00023df58 items=0 ppid=2581 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:06.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965306537343137616133393639623736376461356661363536313963 Dec 13 02:02:06.661000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:06.661000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:06.661000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:06.661000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:06.661000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:06.661000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:06.661000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:06.661000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:06.661000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:06.661000 audit: BPF prog-id=131 op=LOAD Dec 13 02:02:06.661000 audit[2706]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00023dfa8 items=0 ppid=2581 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:06.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965306537343137616133393639623736376461356661363536313963 Dec 13 02:02:06.661000 audit: BPF prog-id=131 op=UNLOAD Dec 13 02:02:06.661000 audit: BPF prog-id=130 op=UNLOAD Dec 13 02:02:06.661000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:06.661000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:06.661000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:06.661000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:06.661000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:06.661000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:06.661000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:06.661000 audit[2706]: AVC avc: denied { perfmon } for pid=2706 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:06.661000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:06.661000 audit[2706]: AVC avc: denied { bpf } for pid=2706 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:06.661000 audit: BPF prog-id=132 op=LOAD Dec 13 02:02:06.661000 audit[2706]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000382038 items=0 ppid=2581 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:06.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965306537343137616133393639623736376461356661363536313963 Dec 13 02:02:06.682598 systemd[1]: cri-containerd-9e0e7417aa3969b767da5fa65619c0ddf30c12253953a1b1c7631b0e70863d41.scope: Deactivated successfully. Dec 13 02:02:06.687000 audit: BPF prog-id=132 op=UNLOAD Dec 13 02:02:06.740870 systemd[1]: run-containerd-runc-k8s.io-9e0e7417aa3969b767da5fa65619c0ddf30c12253953a1b1c7631b0e70863d41-runc.D5w03w.mount: Deactivated successfully. Dec 13 02:02:06.917023 env[1210]: time="2024-12-13T02:02:06.916973669Z" level=info msg="StartContainer for \"9e0e7417aa3969b767da5fa65619c0ddf30c12253953a1b1c7631b0e70863d41\" returns successfully" Dec 13 02:02:06.924200 kubelet[2064]: I1213 02:02:06.924165 2064 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:02:06.924688 kubelet[2064]: E1213 02:02:06.924673 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:02:06.925070 kubelet[2064]: E1213 02:02:06.925042 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:02:06.967398 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9e0e7417aa3969b767da5fa65619c0ddf30c12253953a1b1c7631b0e70863d41-rootfs.mount: Deactivated successfully. Dec 13 02:02:06.977407 env[1210]: time="2024-12-13T02:02:06.977349160Z" level=info msg="shim disconnected" id=9e0e7417aa3969b767da5fa65619c0ddf30c12253953a1b1c7631b0e70863d41 Dec 13 02:02:06.977407 env[1210]: time="2024-12-13T02:02:06.977399385Z" level=warning msg="cleaning up after shim disconnected" id=9e0e7417aa3969b767da5fa65619c0ddf30c12253953a1b1c7631b0e70863d41 namespace=k8s.io Dec 13 02:02:06.977407 env[1210]: time="2024-12-13T02:02:06.977408923Z" level=info msg="cleaning up dead shim" Dec 13 02:02:06.985193 env[1210]: time="2024-12-13T02:02:06.985157335Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:02:06Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2750 runtime=io.containerd.runc.v2\n" Dec 13 02:02:07.791652 kubelet[2064]: E1213 02:02:07.791613 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m7k69" podUID="37bc7145-5a7a-456a-94e8-117913a4280c" Dec 13 02:02:07.927420 kubelet[2064]: E1213 02:02:07.927392 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:02:07.928296 env[1210]: time="2024-12-13T02:02:07.928260637Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 02:02:09.791335 kubelet[2064]: E1213 02:02:09.791284 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m7k69" podUID="37bc7145-5a7a-456a-94e8-117913a4280c" Dec 13 02:02:11.146392 systemd[1]: Started sshd@10-10.0.0.73:22-10.0.0.1:49778.service. Dec 13 02:02:11.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.73:22-10.0.0.1:49778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:11.147667 kernel: kauditd_printk_skb: 102 callbacks suppressed Dec 13 02:02:11.147804 kernel: audit: type=1130 audit(1734055331.145:994): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.73:22-10.0.0.1:49778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:11.182000 audit[2764]: USER_ACCT pid=2764 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:11.184061 sshd[2764]: Accepted publickey for core from 10.0.0.1 port 49778 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:02:11.186433 sshd[2764]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:02:11.184000 audit[2764]: CRED_ACQ pid=2764 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:11.190264 systemd-logind[1189]: New session 11 of user core. Dec 13 02:02:11.190946 systemd[1]: Started session-11.scope. Dec 13 02:02:11.191808 kernel: audit: type=1101 audit(1734055331.182:995): pid=2764 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:11.191889 kernel: audit: type=1103 audit(1734055331.184:996): pid=2764 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:11.191915 kernel: audit: type=1006 audit(1734055331.185:997): pid=2764 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Dec 13 02:02:11.185000 audit[2764]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb9ec1da0 a2=3 a3=0 items=0 ppid=1 pid=2764 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:11.198331 kernel: audit: type=1300 audit(1734055331.185:997): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb9ec1da0 a2=3 a3=0 items=0 ppid=1 pid=2764 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:11.198398 kernel: audit: type=1327 audit(1734055331.185:997): proctitle=737368643A20636F7265205B707269765D Dec 13 02:02:11.185000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:02:11.193000 audit[2764]: USER_START pid=2764 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:11.204183 kernel: audit: type=1105 audit(1734055331.193:998): pid=2764 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:11.194000 audit[2766]: CRED_ACQ pid=2766 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:11.207708 kernel: audit: type=1103 audit(1734055331.194:999): pid=2766 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:11.301342 sshd[2764]: pam_unix(sshd:session): session closed for user core Dec 13 02:02:11.301000 audit[2764]: USER_END pid=2764 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:11.307130 systemd[1]: sshd@10-10.0.0.73:22-10.0.0.1:49778.service: Deactivated successfully. Dec 13 02:02:11.301000 audit[2764]: CRED_DISP pid=2764 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:11.307970 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 02:02:11.308674 systemd-logind[1189]: Session 11 logged out. Waiting for processes to exit. Dec 13 02:02:11.309443 systemd-logind[1189]: Removed session 11. Dec 13 02:02:11.311981 kernel: audit: type=1106 audit(1734055331.301:1000): pid=2764 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:11.312037 kernel: audit: type=1104 audit(1734055331.301:1001): pid=2764 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:11.306000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.73:22-10.0.0.1:49778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:11.791181 kubelet[2064]: E1213 02:02:11.791128 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m7k69" podUID="37bc7145-5a7a-456a-94e8-117913a4280c" Dec 13 02:02:13.791981 kubelet[2064]: E1213 02:02:13.791936 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m7k69" podUID="37bc7145-5a7a-456a-94e8-117913a4280c" Dec 13 02:02:15.791415 kubelet[2064]: E1213 02:02:15.791346 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m7k69" podUID="37bc7145-5a7a-456a-94e8-117913a4280c" Dec 13 02:02:16.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.73:22-10.0.0.1:51316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:16.305824 systemd[1]: Started sshd@11-10.0.0.73:22-10.0.0.1:51316.service. Dec 13 02:02:16.307085 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:02:16.307205 kernel: audit: type=1130 audit(1734055336.304:1003): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.73:22-10.0.0.1:51316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:16.598509 env[1210]: time="2024-12-13T02:02:16.598399566Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:16.600430 env[1210]: time="2024-12-13T02:02:16.600388636Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:16.602036 env[1210]: time="2024-12-13T02:02:16.601991976Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:16.603550 env[1210]: time="2024-12-13T02:02:16.603507238Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:16.604000 env[1210]: time="2024-12-13T02:02:16.603963494Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 02:02:16.605700 env[1210]: time="2024-12-13T02:02:16.605673816Z" level=info msg="CreateContainer within sandbox \"fb28f973c6076b24679dfa13ec6eaf3cede5d9fe27fb922f8f3444c8f07e07e3\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 02:02:16.614773 sshd[2778]: Accepted publickey for core from 10.0.0.1 port 51316 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:02:16.613000 audit[2778]: USER_ACCT pid=2778 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:16.617659 sshd[2778]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:02:16.629080 kernel: audit: type=1101 audit(1734055336.613:1004): pid=2778 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:16.629193 kernel: audit: type=1103 audit(1734055336.616:1005): pid=2778 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:16.629213 kernel: audit: type=1006 audit(1734055336.616:1006): pid=2778 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Dec 13 02:02:16.629234 kernel: audit: type=1300 audit(1734055336.616:1006): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcbd3097c0 a2=3 a3=0 items=0 ppid=1 pid=2778 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:16.616000 audit[2778]: CRED_ACQ pid=2778 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:16.616000 audit[2778]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcbd3097c0 a2=3 a3=0 items=0 ppid=1 pid=2778 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:16.622171 systemd[1]: Started session-12.scope. Dec 13 02:02:16.629513 env[1210]: time="2024-12-13T02:02:16.620024223Z" level=info msg="CreateContainer within sandbox \"fb28f973c6076b24679dfa13ec6eaf3cede5d9fe27fb922f8f3444c8f07e07e3\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"d65f8ef72ea68150b1c7a7fba4b03e0b08674759da6f53fb06fcdb510e5c11bc\"" Dec 13 02:02:16.629513 env[1210]: time="2024-12-13T02:02:16.622782882Z" level=info msg="StartContainer for \"d65f8ef72ea68150b1c7a7fba4b03e0b08674759da6f53fb06fcdb510e5c11bc\"" Dec 13 02:02:16.622457 systemd-logind[1189]: New session 12 of user core. Dec 13 02:02:16.616000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:02:16.635525 kernel: audit: type=1327 audit(1734055336.616:1006): proctitle=737368643A20636F7265205B707269765D Dec 13 02:02:16.635588 kernel: audit: type=1105 audit(1734055336.626:1007): pid=2778 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:16.626000 audit[2778]: USER_START pid=2778 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:16.627000 audit[2787]: CRED_ACQ pid=2787 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:16.644929 kernel: audit: type=1103 audit(1734055336.627:1008): pid=2787 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:16.649339 systemd[1]: Started cri-containerd-d65f8ef72ea68150b1c7a7fba4b03e0b08674759da6f53fb06fcdb510e5c11bc.scope. Dec 13 02:02:16.661000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:16.661000 audit[2788]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f66fd8ce0e8 items=0 ppid=2581 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:16.670607 kernel: audit: type=1400 audit(1734055336.661:1009): avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:16.670700 kernel: audit: type=1300 audit(1734055336.661:1009): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f66fd8ce0e8 items=0 ppid=2581 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:16.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436356638656637326561363831353062316337613766626134623033 Dec 13 02:02:16.661000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:16.661000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:16.661000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:16.661000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:16.661000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:16.661000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:16.661000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:16.661000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:16.661000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:16.661000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:16.661000 audit: BPF prog-id=133 op=LOAD Dec 13 02:02:16.661000 audit[2788]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c00022c9b8 items=0 ppid=2581 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:16.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436356638656637326561363831353062316337613766626134623033 Dec 13 02:02:16.664000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:16.664000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:16.664000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:16.664000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:16.664000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:16.664000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:16.664000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:16.664000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:16.664000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:16.664000 audit: BPF prog-id=134 op=LOAD Dec 13 02:02:16.664000 audit[2788]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c00022ca08 items=0 ppid=2581 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:16.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436356638656637326561363831353062316337613766626134623033 Dec 13 02:02:16.669000 audit: BPF prog-id=134 op=UNLOAD Dec 13 02:02:16.669000 audit: BPF prog-id=133 op=UNLOAD Dec 13 02:02:16.669000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:16.669000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:16.669000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:16.669000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:16.669000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:16.669000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:16.669000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:16.669000 audit[2788]: AVC avc: denied { perfmon } for pid=2788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:16.669000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:16.669000 audit[2788]: AVC avc: denied { bpf } for pid=2788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:16.669000 audit: BPF prog-id=135 op=LOAD Dec 13 02:02:16.669000 audit[2788]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c00022ca98 items=0 ppid=2581 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:16.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436356638656637326561363831353062316337613766626134623033 Dec 13 02:02:16.802871 env[1210]: time="2024-12-13T02:02:16.802811570Z" level=info msg="StartContainer for \"d65f8ef72ea68150b1c7a7fba4b03e0b08674759da6f53fb06fcdb510e5c11bc\" returns successfully" Dec 13 02:02:16.875411 sshd[2778]: pam_unix(sshd:session): session closed for user core Dec 13 02:02:16.875000 audit[2778]: USER_END pid=2778 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:16.875000 audit[2778]: CRED_DISP pid=2778 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:16.877957 systemd[1]: sshd@11-10.0.0.73:22-10.0.0.1:51316.service: Deactivated successfully. Dec 13 02:02:16.877000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.73:22-10.0.0.1:51316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:16.878678 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 02:02:16.879527 systemd-logind[1189]: Session 12 logged out. Waiting for processes to exit. Dec 13 02:02:16.880402 systemd-logind[1189]: Removed session 12. Dec 13 02:02:16.942615 kubelet[2064]: E1213 02:02:16.942590 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:02:17.791285 kubelet[2064]: E1213 02:02:17.791242 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-m7k69" podUID="37bc7145-5a7a-456a-94e8-117913a4280c" Dec 13 02:02:17.943803 kubelet[2064]: E1213 02:02:17.943772 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:02:18.345118 env[1210]: time="2024-12-13T02:02:18.345054626Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 02:02:18.346534 systemd[1]: cri-containerd-d65f8ef72ea68150b1c7a7fba4b03e0b08674759da6f53fb06fcdb510e5c11bc.scope: Deactivated successfully. Dec 13 02:02:18.352000 audit: BPF prog-id=135 op=UNLOAD Dec 13 02:02:18.355333 kubelet[2064]: I1213 02:02:18.355295 2064 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 02:02:18.368741 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d65f8ef72ea68150b1c7a7fba4b03e0b08674759da6f53fb06fcdb510e5c11bc-rootfs.mount: Deactivated successfully. Dec 13 02:02:18.373385 env[1210]: time="2024-12-13T02:02:18.373334310Z" level=info msg="shim disconnected" id=d65f8ef72ea68150b1c7a7fba4b03e0b08674759da6f53fb06fcdb510e5c11bc Dec 13 02:02:18.373385 env[1210]: time="2024-12-13T02:02:18.373378754Z" level=warning msg="cleaning up after shim disconnected" id=d65f8ef72ea68150b1c7a7fba4b03e0b08674759da6f53fb06fcdb510e5c11bc namespace=k8s.io Dec 13 02:02:18.373385 env[1210]: time="2024-12-13T02:02:18.373387230Z" level=info msg="cleaning up dead shim" Dec 13 02:02:18.374736 kubelet[2064]: I1213 02:02:18.374662 2064 topology_manager.go:215] "Topology Admit Handler" podUID="e29c8a77-070d-4285-9177-8eb0d1821236" podNamespace="kube-system" podName="coredns-76f75df574-x45b5" Dec 13 02:02:18.384237 kubelet[2064]: I1213 02:02:18.384188 2064 topology_manager.go:215] "Topology Admit Handler" podUID="04bdc1d0-7f7e-4114-a70c-e1aa18271a20" podNamespace="kube-system" podName="coredns-76f75df574-s84nw" Dec 13 02:02:18.384578 kubelet[2064]: I1213 02:02:18.384554 2064 topology_manager.go:215] "Topology Admit Handler" podUID="5d37fa34-73a1-48e6-a14e-66e002882c9f" podNamespace="calico-apiserver" podName="calico-apiserver-54d647d779-f9rwt" Dec 13 02:02:18.384742 kubelet[2064]: I1213 02:02:18.384645 2064 topology_manager.go:215] "Topology Admit Handler" podUID="cba04b4f-87cd-4943-903a-e92521128699" podNamespace="calico-apiserver" podName="calico-apiserver-54d647d779-nj76z" Dec 13 02:02:18.384781 kubelet[2064]: I1213 02:02:18.384751 2064 topology_manager.go:215] "Topology Admit Handler" podUID="29b270ea-60f5-4411-9e9f-50250a3fb95b" podNamespace="calico-system" podName="calico-kube-controllers-575994d967-g56ck" Dec 13 02:02:18.390101 env[1210]: time="2024-12-13T02:02:18.390064305Z" level=warning msg="cleanup warnings time=\"2024-12-13T02:02:18Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2845 runtime=io.containerd.runc.v2\n" Dec 13 02:02:18.392820 systemd[1]: Created slice kubepods-burstable-pode29c8a77_070d_4285_9177_8eb0d1821236.slice. Dec 13 02:02:18.397644 systemd[1]: Created slice kubepods-burstable-pod04bdc1d0_7f7e_4114_a70c_e1aa18271a20.slice. Dec 13 02:02:18.402923 systemd[1]: Created slice kubepods-besteffort-podcba04b4f_87cd_4943_903a_e92521128699.slice. Dec 13 02:02:18.409695 systemd[1]: Created slice kubepods-besteffort-pod5d37fa34_73a1_48e6_a14e_66e002882c9f.slice. Dec 13 02:02:18.413503 systemd[1]: Created slice kubepods-besteffort-pod29b270ea_60f5_4411_9e9f_50250a3fb95b.slice. Dec 13 02:02:18.473008 kubelet[2064]: I1213 02:02:18.472932 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/e29c8a77-070d-4285-9177-8eb0d1821236-config-volume\") pod \"coredns-76f75df574-x45b5\" (UID: \"e29c8a77-070d-4285-9177-8eb0d1821236\") " pod="kube-system/coredns-76f75df574-x45b5" Dec 13 02:02:18.473209 kubelet[2064]: I1213 02:02:18.473094 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/5d37fa34-73a1-48e6-a14e-66e002882c9f-calico-apiserver-certs\") pod \"calico-apiserver-54d647d779-f9rwt\" (UID: \"5d37fa34-73a1-48e6-a14e-66e002882c9f\") " pod="calico-apiserver/calico-apiserver-54d647d779-f9rwt" Dec 13 02:02:18.473209 kubelet[2064]: I1213 02:02:18.473148 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t6qtx\" (UniqueName: \"kubernetes.io/projected/e29c8a77-070d-4285-9177-8eb0d1821236-kube-api-access-t6qtx\") pod \"coredns-76f75df574-x45b5\" (UID: \"e29c8a77-070d-4285-9177-8eb0d1821236\") " pod="kube-system/coredns-76f75df574-x45b5" Dec 13 02:02:18.473209 kubelet[2064]: I1213 02:02:18.473205 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kd7t2\" (UniqueName: \"kubernetes.io/projected/cba04b4f-87cd-4943-903a-e92521128699-kube-api-access-kd7t2\") pod \"calico-apiserver-54d647d779-nj76z\" (UID: \"cba04b4f-87cd-4943-903a-e92521128699\") " pod="calico-apiserver/calico-apiserver-54d647d779-nj76z" Dec 13 02:02:18.473290 kubelet[2064]: I1213 02:02:18.473250 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-g9sg8\" (UniqueName: \"kubernetes.io/projected/29b270ea-60f5-4411-9e9f-50250a3fb95b-kube-api-access-g9sg8\") pod \"calico-kube-controllers-575994d967-g56ck\" (UID: \"29b270ea-60f5-4411-9e9f-50250a3fb95b\") " pod="calico-system/calico-kube-controllers-575994d967-g56ck" Dec 13 02:02:18.473290 kubelet[2064]: I1213 02:02:18.473275 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vrxbp\" (UniqueName: \"kubernetes.io/projected/5d37fa34-73a1-48e6-a14e-66e002882c9f-kube-api-access-vrxbp\") pod \"calico-apiserver-54d647d779-f9rwt\" (UID: \"5d37fa34-73a1-48e6-a14e-66e002882c9f\") " pod="calico-apiserver/calico-apiserver-54d647d779-f9rwt" Dec 13 02:02:18.473385 kubelet[2064]: I1213 02:02:18.473358 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/04bdc1d0-7f7e-4114-a70c-e1aa18271a20-config-volume\") pod \"coredns-76f75df574-s84nw\" (UID: \"04bdc1d0-7f7e-4114-a70c-e1aa18271a20\") " pod="kube-system/coredns-76f75df574-s84nw" Dec 13 02:02:18.473414 kubelet[2064]: I1213 02:02:18.473396 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xhhg4\" (UniqueName: \"kubernetes.io/projected/04bdc1d0-7f7e-4114-a70c-e1aa18271a20-kube-api-access-xhhg4\") pod \"coredns-76f75df574-s84nw\" (UID: \"04bdc1d0-7f7e-4114-a70c-e1aa18271a20\") " pod="kube-system/coredns-76f75df574-s84nw" Dec 13 02:02:18.473446 kubelet[2064]: I1213 02:02:18.473429 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/29b270ea-60f5-4411-9e9f-50250a3fb95b-tigera-ca-bundle\") pod \"calico-kube-controllers-575994d967-g56ck\" (UID: \"29b270ea-60f5-4411-9e9f-50250a3fb95b\") " pod="calico-system/calico-kube-controllers-575994d967-g56ck" Dec 13 02:02:18.473607 kubelet[2064]: I1213 02:02:18.473552 2064 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/cba04b4f-87cd-4943-903a-e92521128699-calico-apiserver-certs\") pod \"calico-apiserver-54d647d779-nj76z\" (UID: \"cba04b4f-87cd-4943-903a-e92521128699\") " pod="calico-apiserver/calico-apiserver-54d647d779-nj76z" Dec 13 02:02:18.696132 kubelet[2064]: E1213 02:02:18.696098 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:02:18.696759 env[1210]: time="2024-12-13T02:02:18.696728875Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-x45b5,Uid:e29c8a77-070d-4285-9177-8eb0d1821236,Namespace:kube-system,Attempt:0,}" Dec 13 02:02:18.700834 kubelet[2064]: E1213 02:02:18.700819 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:02:18.701118 env[1210]: time="2024-12-13T02:02:18.701076975Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-s84nw,Uid:04bdc1d0-7f7e-4114-a70c-e1aa18271a20,Namespace:kube-system,Attempt:0,}" Dec 13 02:02:18.708560 env[1210]: time="2024-12-13T02:02:18.708537895Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-54d647d779-nj76z,Uid:cba04b4f-87cd-4943-903a-e92521128699,Namespace:calico-apiserver,Attempt:0,}" Dec 13 02:02:18.711951 env[1210]: time="2024-12-13T02:02:18.711928881Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-54d647d779-f9rwt,Uid:5d37fa34-73a1-48e6-a14e-66e002882c9f,Namespace:calico-apiserver,Attempt:0,}" Dec 13 02:02:18.715523 env[1210]: time="2024-12-13T02:02:18.715484188Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-575994d967-g56ck,Uid:29b270ea-60f5-4411-9e9f-50250a3fb95b,Namespace:calico-system,Attempt:0,}" Dec 13 02:02:18.860115 env[1210]: time="2024-12-13T02:02:18.860018941Z" level=error msg="Failed to destroy network for sandbox \"fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:02:18.860433 env[1210]: time="2024-12-13T02:02:18.860395875Z" level=error msg="encountered an error cleaning up failed sandbox \"fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:02:18.860497 env[1210]: time="2024-12-13T02:02:18.860455929Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-x45b5,Uid:e29c8a77-070d-4285-9177-8eb0d1821236,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:02:18.860775 kubelet[2064]: E1213 02:02:18.860740 2064 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:02:18.860848 kubelet[2064]: E1213 02:02:18.860805 2064 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-x45b5" Dec 13 02:02:18.860848 kubelet[2064]: E1213 02:02:18.860824 2064 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-x45b5" Dec 13 02:02:18.860937 kubelet[2064]: E1213 02:02:18.860872 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-x45b5_kube-system(e29c8a77-070d-4285-9177-8eb0d1821236)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-x45b5_kube-system(e29c8a77-070d-4285-9177-8eb0d1821236)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-x45b5" podUID="e29c8a77-070d-4285-9177-8eb0d1821236" Dec 13 02:02:18.866611 env[1210]: time="2024-12-13T02:02:18.866422166Z" level=error msg="Failed to destroy network for sandbox \"8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:02:18.867228 env[1210]: time="2024-12-13T02:02:18.867193077Z" level=error msg="encountered an error cleaning up failed sandbox \"8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:02:18.867411 env[1210]: time="2024-12-13T02:02:18.867363590Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-54d647d779-f9rwt,Uid:5d37fa34-73a1-48e6-a14e-66e002882c9f,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:02:18.868685 kubelet[2064]: E1213 02:02:18.867801 2064 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:02:18.868685 kubelet[2064]: E1213 02:02:18.867907 2064 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-54d647d779-f9rwt" Dec 13 02:02:18.868685 kubelet[2064]: E1213 02:02:18.867941 2064 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-54d647d779-f9rwt" Dec 13 02:02:18.868870 kubelet[2064]: E1213 02:02:18.868011 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-54d647d779-f9rwt_calico-apiserver(5d37fa34-73a1-48e6-a14e-66e002882c9f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-54d647d779-f9rwt_calico-apiserver(5d37fa34-73a1-48e6-a14e-66e002882c9f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-54d647d779-f9rwt" podUID="5d37fa34-73a1-48e6-a14e-66e002882c9f" Dec 13 02:02:18.870208 env[1210]: time="2024-12-13T02:02:18.870155521Z" level=error msg="Failed to destroy network for sandbox \"3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:02:18.870570 env[1210]: time="2024-12-13T02:02:18.870527586Z" level=error msg="Failed to destroy network for sandbox \"09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:02:18.871017 env[1210]: time="2024-12-13T02:02:18.870562122Z" level=error msg="encountered an error cleaning up failed sandbox \"3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:02:18.871017 env[1210]: time="2024-12-13T02:02:18.870932764Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-575994d967-g56ck,Uid:29b270ea-60f5-4411-9e9f-50250a3fb95b,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:02:18.871505 kubelet[2064]: E1213 02:02:18.871243 2064 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:02:18.871505 kubelet[2064]: E1213 02:02:18.871296 2064 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-575994d967-g56ck" Dec 13 02:02:18.871505 kubelet[2064]: E1213 02:02:18.871332 2064 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-575994d967-g56ck" Dec 13 02:02:18.871754 kubelet[2064]: E1213 02:02:18.871712 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-575994d967-g56ck_calico-system(29b270ea-60f5-4411-9e9f-50250a3fb95b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-575994d967-g56ck_calico-system(29b270ea-60f5-4411-9e9f-50250a3fb95b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-575994d967-g56ck" podUID="29b270ea-60f5-4411-9e9f-50250a3fb95b" Dec 13 02:02:18.872627 env[1210]: time="2024-12-13T02:02:18.872584324Z" level=error msg="encountered an error cleaning up failed sandbox \"09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:02:18.872778 env[1210]: time="2024-12-13T02:02:18.872734599Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-s84nw,Uid:04bdc1d0-7f7e-4114-a70c-e1aa18271a20,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:02:18.872992 kubelet[2064]: E1213 02:02:18.872960 2064 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:02:18.873103 kubelet[2064]: E1213 02:02:18.873018 2064 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-s84nw" Dec 13 02:02:18.873103 kubelet[2064]: E1213 02:02:18.873039 2064 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-s84nw" Dec 13 02:02:18.873229 kubelet[2064]: E1213 02:02:18.873108 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-s84nw_kube-system(04bdc1d0-7f7e-4114-a70c-e1aa18271a20)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-s84nw_kube-system(04bdc1d0-7f7e-4114-a70c-e1aa18271a20)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-s84nw" podUID="04bdc1d0-7f7e-4114-a70c-e1aa18271a20" Dec 13 02:02:18.880003 env[1210]: time="2024-12-13T02:02:18.879949071Z" level=error msg="Failed to destroy network for sandbox \"9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:02:18.880297 env[1210]: time="2024-12-13T02:02:18.880253859Z" level=error msg="encountered an error cleaning up failed sandbox \"9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:02:18.880365 env[1210]: time="2024-12-13T02:02:18.880312821Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-54d647d779-nj76z,Uid:cba04b4f-87cd-4943-903a-e92521128699,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:02:18.880518 kubelet[2064]: E1213 02:02:18.880496 2064 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:02:18.880582 kubelet[2064]: E1213 02:02:18.880542 2064 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-54d647d779-nj76z" Dec 13 02:02:18.880582 kubelet[2064]: E1213 02:02:18.880561 2064 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-54d647d779-nj76z" Dec 13 02:02:18.880673 kubelet[2064]: E1213 02:02:18.880615 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-54d647d779-nj76z_calico-apiserver(cba04b4f-87cd-4943-903a-e92521128699)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-54d647d779-nj76z_calico-apiserver(cba04b4f-87cd-4943-903a-e92521128699)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-54d647d779-nj76z" podUID="cba04b4f-87cd-4943-903a-e92521128699" Dec 13 02:02:18.947500 kubelet[2064]: I1213 02:02:18.946408 2064 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2" Dec 13 02:02:18.947942 env[1210]: time="2024-12-13T02:02:18.947011264Z" level=info msg="StopPodSandbox for \"fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2\"" Dec 13 02:02:18.948669 kubelet[2064]: I1213 02:02:18.948616 2064 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b" Dec 13 02:02:18.949114 env[1210]: time="2024-12-13T02:02:18.949085745Z" level=info msg="StopPodSandbox for \"8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b\"" Dec 13 02:02:18.950077 kubelet[2064]: I1213 02:02:18.949976 2064 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" Dec 13 02:02:18.950432 env[1210]: time="2024-12-13T02:02:18.950401699Z" level=info msg="StopPodSandbox for \"3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97\"" Dec 13 02:02:18.952609 kubelet[2064]: E1213 02:02:18.952578 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:02:18.953332 env[1210]: time="2024-12-13T02:02:18.953290824Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 02:02:18.954963 kubelet[2064]: I1213 02:02:18.954482 2064 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea" Dec 13 02:02:18.955257 env[1210]: time="2024-12-13T02:02:18.955217405Z" level=info msg="StopPodSandbox for \"09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea\"" Dec 13 02:02:18.956932 kubelet[2064]: I1213 02:02:18.956916 2064 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" Dec 13 02:02:18.957513 env[1210]: time="2024-12-13T02:02:18.957463491Z" level=info msg="StopPodSandbox for \"9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87\"" Dec 13 02:02:18.979968 env[1210]: time="2024-12-13T02:02:18.979904640Z" level=error msg="StopPodSandbox for \"fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2\" failed" error="failed to destroy network for sandbox \"fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:02:18.980389 kubelet[2064]: E1213 02:02:18.980352 2064 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2" Dec 13 02:02:18.980450 kubelet[2064]: E1213 02:02:18.980424 2064 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2"} Dec 13 02:02:18.980495 kubelet[2064]: E1213 02:02:18.980456 2064 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e29c8a77-070d-4285-9177-8eb0d1821236\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:02:18.980495 kubelet[2064]: E1213 02:02:18.980484 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e29c8a77-070d-4285-9177-8eb0d1821236\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-x45b5" podUID="e29c8a77-070d-4285-9177-8eb0d1821236" Dec 13 02:02:18.985824 env[1210]: time="2024-12-13T02:02:18.985769394Z" level=error msg="StopPodSandbox for \"8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b\" failed" error="failed to destroy network for sandbox \"8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:02:18.986345 kubelet[2064]: E1213 02:02:18.986320 2064 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b" Dec 13 02:02:18.986430 kubelet[2064]: E1213 02:02:18.986365 2064 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b"} Dec 13 02:02:18.986430 kubelet[2064]: E1213 02:02:18.986396 2064 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5d37fa34-73a1-48e6-a14e-66e002882c9f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:02:18.986521 kubelet[2064]: E1213 02:02:18.986453 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5d37fa34-73a1-48e6-a14e-66e002882c9f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-54d647d779-f9rwt" podUID="5d37fa34-73a1-48e6-a14e-66e002882c9f" Dec 13 02:02:18.992204 env[1210]: time="2024-12-13T02:02:18.992135018Z" level=error msg="StopPodSandbox for \"3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97\" failed" error="failed to destroy network for sandbox \"3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:02:18.992743 kubelet[2064]: E1213 02:02:18.992711 2064 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" Dec 13 02:02:18.992830 kubelet[2064]: E1213 02:02:18.992759 2064 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97"} Dec 13 02:02:18.992830 kubelet[2064]: E1213 02:02:18.992794 2064 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"29b270ea-60f5-4411-9e9f-50250a3fb95b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:02:18.992830 kubelet[2064]: E1213 02:02:18.992821 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"29b270ea-60f5-4411-9e9f-50250a3fb95b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-575994d967-g56ck" podUID="29b270ea-60f5-4411-9e9f-50250a3fb95b" Dec 13 02:02:19.005620 env[1210]: time="2024-12-13T02:02:19.005551002Z" level=error msg="StopPodSandbox for \"09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea\" failed" error="failed to destroy network for sandbox \"09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:02:19.005853 kubelet[2064]: E1213 02:02:19.005823 2064 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea" Dec 13 02:02:19.005904 kubelet[2064]: E1213 02:02:19.005869 2064 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea"} Dec 13 02:02:19.005904 kubelet[2064]: E1213 02:02:19.005904 2064 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"04bdc1d0-7f7e-4114-a70c-e1aa18271a20\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:02:19.005992 kubelet[2064]: E1213 02:02:19.005937 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"04bdc1d0-7f7e-4114-a70c-e1aa18271a20\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-s84nw" podUID="04bdc1d0-7f7e-4114-a70c-e1aa18271a20" Dec 13 02:02:19.006360 env[1210]: time="2024-12-13T02:02:19.006322624Z" level=error msg="StopPodSandbox for \"9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87\" failed" error="failed to destroy network for sandbox \"9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:02:19.006800 kubelet[2064]: E1213 02:02:19.006744 2064 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" Dec 13 02:02:19.006800 kubelet[2064]: E1213 02:02:19.006781 2064 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87"} Dec 13 02:02:19.006916 kubelet[2064]: E1213 02:02:19.006815 2064 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cba04b4f-87cd-4943-903a-e92521128699\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:02:19.006916 kubelet[2064]: E1213 02:02:19.006845 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cba04b4f-87cd-4943-903a-e92521128699\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-54d647d779-nj76z" podUID="cba04b4f-87cd-4943-903a-e92521128699" Dec 13 02:02:19.369557 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2-shm.mount: Deactivated successfully. Dec 13 02:02:19.796102 systemd[1]: Created slice kubepods-besteffort-pod37bc7145_5a7a_456a_94e8_117913a4280c.slice. Dec 13 02:02:19.798033 env[1210]: time="2024-12-13T02:02:19.797995249Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-m7k69,Uid:37bc7145-5a7a-456a-94e8-117913a4280c,Namespace:calico-system,Attempt:0,}" Dec 13 02:02:19.855179 env[1210]: time="2024-12-13T02:02:19.855104199Z" level=error msg="Failed to destroy network for sandbox \"bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:02:19.855515 env[1210]: time="2024-12-13T02:02:19.855484389Z" level=error msg="encountered an error cleaning up failed sandbox \"bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:02:19.855566 env[1210]: time="2024-12-13T02:02:19.855532600Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-m7k69,Uid:37bc7145-5a7a-456a-94e8-117913a4280c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:02:19.855807 kubelet[2064]: E1213 02:02:19.855780 2064 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:02:19.855883 kubelet[2064]: E1213 02:02:19.855855 2064 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-m7k69" Dec 13 02:02:19.855911 kubelet[2064]: E1213 02:02:19.855885 2064 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-m7k69" Dec 13 02:02:19.855978 kubelet[2064]: E1213 02:02:19.855955 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-m7k69_calico-system(37bc7145-5a7a-456a-94e8-117913a4280c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-m7k69_calico-system(37bc7145-5a7a-456a-94e8-117913a4280c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-m7k69" podUID="37bc7145-5a7a-456a-94e8-117913a4280c" Dec 13 02:02:19.857182 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594-shm.mount: Deactivated successfully. Dec 13 02:02:19.959374 kubelet[2064]: I1213 02:02:19.959344 2064 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" Dec 13 02:02:19.961495 env[1210]: time="2024-12-13T02:02:19.959995638Z" level=info msg="StopPodSandbox for \"bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594\"" Dec 13 02:02:19.987305 env[1210]: time="2024-12-13T02:02:19.987231023Z" level=error msg="StopPodSandbox for \"bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594\" failed" error="failed to destroy network for sandbox \"bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:02:19.987580 kubelet[2064]: E1213 02:02:19.987555 2064 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" Dec 13 02:02:19.987638 kubelet[2064]: E1213 02:02:19.987599 2064 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594"} Dec 13 02:02:19.987638 kubelet[2064]: E1213 02:02:19.987631 2064 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"37bc7145-5a7a-456a-94e8-117913a4280c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:02:19.987733 kubelet[2064]: E1213 02:02:19.987656 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"37bc7145-5a7a-456a-94e8-117913a4280c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-m7k69" podUID="37bc7145-5a7a-456a-94e8-117913a4280c" Dec 13 02:02:21.877779 systemd[1]: Started sshd@12-10.0.0.73:22-10.0.0.1:51326.service. Dec 13 02:02:21.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.73:22-10.0.0.1:51326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:21.878844 kernel: kauditd_printk_skb: 45 callbacks suppressed Dec 13 02:02:21.878924 kernel: audit: type=1130 audit(1734055341.876:1019): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.73:22-10.0.0.1:51326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:21.912000 audit[3250]: USER_ACCT pid=3250 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:21.913705 sshd[3250]: Accepted publickey for core from 10.0.0.1 port 51326 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:02:21.915593 sshd[3250]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:02:21.914000 audit[3250]: CRED_ACQ pid=3250 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:21.919294 systemd-logind[1189]: New session 13 of user core. Dec 13 02:02:21.920083 systemd[1]: Started session-13.scope. Dec 13 02:02:21.922105 kernel: audit: type=1101 audit(1734055341.912:1020): pid=3250 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:21.922168 kernel: audit: type=1103 audit(1734055341.914:1021): pid=3250 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:21.922192 kernel: audit: type=1006 audit(1734055341.914:1022): pid=3250 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Dec 13 02:02:21.914000 audit[3250]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa76fffa0 a2=3 a3=0 items=0 ppid=1 pid=3250 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:21.929044 kernel: audit: type=1300 audit(1734055341.914:1022): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa76fffa0 a2=3 a3=0 items=0 ppid=1 pid=3250 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:21.929114 kernel: audit: type=1327 audit(1734055341.914:1022): proctitle=737368643A20636F7265205B707269765D Dec 13 02:02:21.914000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:02:21.930400 kernel: audit: type=1105 audit(1734055341.923:1023): pid=3250 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:21.923000 audit[3250]: USER_START pid=3250 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:21.924000 audit[3252]: CRED_ACQ pid=3252 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:21.938196 kernel: audit: type=1103 audit(1734055341.924:1024): pid=3252 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:22.027619 sshd[3250]: pam_unix(sshd:session): session closed for user core Dec 13 02:02:22.028000 audit[3250]: USER_END pid=3250 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:22.028000 audit[3250]: CRED_DISP pid=3250 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:22.030655 systemd[1]: sshd@12-10.0.0.73:22-10.0.0.1:51326.service: Deactivated successfully. Dec 13 02:02:22.031159 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 02:02:22.031971 systemd-logind[1189]: Session 13 logged out. Waiting for processes to exit. Dec 13 02:02:22.033176 systemd[1]: Started sshd@13-10.0.0.73:22-10.0.0.1:51336.service. Dec 13 02:02:22.037864 kernel: audit: type=1106 audit(1734055342.028:1025): pid=3250 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:22.037918 kernel: audit: type=1104 audit(1734055342.028:1026): pid=3250 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:22.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.73:22-10.0.0.1:51326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:22.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.73:22-10.0.0.1:51336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:22.038139 systemd-logind[1189]: Removed session 13. Dec 13 02:02:22.064000 audit[3264]: USER_ACCT pid=3264 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:22.065573 sshd[3264]: Accepted publickey for core from 10.0.0.1 port 51336 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:02:22.065000 audit[3264]: CRED_ACQ pid=3264 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:22.065000 audit[3264]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3e87ee60 a2=3 a3=0 items=0 ppid=1 pid=3264 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:22.065000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:02:22.066465 sshd[3264]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:02:22.070133 systemd-logind[1189]: New session 14 of user core. Dec 13 02:02:22.070866 kubelet[2064]: I1213 02:02:22.070840 2064 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:02:22.070986 systemd[1]: Started session-14.scope. Dec 13 02:02:22.072002 kubelet[2064]: E1213 02:02:22.071512 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:02:22.075000 audit[3264]: USER_START pid=3264 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:22.077000 audit[3266]: CRED_ACQ pid=3266 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:22.239000 audit[3274]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=3274 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:02:22.239000 audit[3274]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe8fff7330 a2=0 a3=7ffe8fff731c items=0 ppid=2244 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:22.239000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:02:22.244000 audit[3274]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3274 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:02:22.244000 audit[3274]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe8fff7330 a2=0 a3=7ffe8fff731c items=0 ppid=2244 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:22.244000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:02:22.250429 sshd[3264]: pam_unix(sshd:session): session closed for user core Dec 13 02:02:22.250000 audit[3264]: USER_END pid=3264 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:22.250000 audit[3264]: CRED_DISP pid=3264 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:22.252949 systemd[1]: sshd@13-10.0.0.73:22-10.0.0.1:51336.service: Deactivated successfully. Dec 13 02:02:22.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.73:22-10.0.0.1:51336 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:22.253469 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 02:02:22.253952 systemd-logind[1189]: Session 14 logged out. Waiting for processes to exit. Dec 13 02:02:22.254852 systemd[1]: Started sshd@14-10.0.0.73:22-10.0.0.1:51338.service. Dec 13 02:02:22.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.73:22-10.0.0.1:51338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:22.255777 systemd-logind[1189]: Removed session 14. Dec 13 02:02:22.285000 audit[3277]: USER_ACCT pid=3277 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:22.286655 sshd[3277]: Accepted publickey for core from 10.0.0.1 port 51338 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:02:22.286000 audit[3277]: CRED_ACQ pid=3277 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:22.286000 audit[3277]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe45c9c290 a2=3 a3=0 items=0 ppid=1 pid=3277 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:22.286000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:02:22.287869 sshd[3277]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:02:22.291253 systemd-logind[1189]: New session 15 of user core. Dec 13 02:02:22.292118 systemd[1]: Started session-15.scope. Dec 13 02:02:22.297000 audit[3277]: USER_START pid=3277 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:22.298000 audit[3279]: CRED_ACQ pid=3279 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:22.468328 sshd[3277]: pam_unix(sshd:session): session closed for user core Dec 13 02:02:22.468000 audit[3277]: USER_END pid=3277 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:22.468000 audit[3277]: CRED_DISP pid=3277 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:22.470618 systemd[1]: sshd@14-10.0.0.73:22-10.0.0.1:51338.service: Deactivated successfully. Dec 13 02:02:22.471310 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 02:02:22.469000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.73:22-10.0.0.1:51338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:22.472001 systemd-logind[1189]: Session 15 logged out. Waiting for processes to exit. Dec 13 02:02:22.472745 systemd-logind[1189]: Removed session 15. Dec 13 02:02:22.968024 kubelet[2064]: E1213 02:02:22.967993 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:02:27.473203 systemd[1]: Started sshd@15-10.0.0.73:22-10.0.0.1:32780.service. Dec 13 02:02:27.478806 kernel: kauditd_printk_skb: 29 callbacks suppressed Dec 13 02:02:27.478846 kernel: audit: type=1130 audit(1734055347.472:1048): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.73:22-10.0.0.1:32780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:27.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.73:22-10.0.0.1:32780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:27.509000 audit[3293]: USER_ACCT pid=3293 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:27.528212 kernel: audit: type=1101 audit(1734055347.509:1049): pid=3293 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:27.528272 kernel: audit: type=1103 audit(1734055347.513:1050): pid=3293 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:27.528309 kernel: audit: type=1006 audit(1734055347.513:1051): pid=3293 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 02:02:27.528332 kernel: audit: type=1300 audit(1734055347.513:1051): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdc23a350 a2=3 a3=0 items=0 ppid=1 pid=3293 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:27.528357 kernel: audit: type=1327 audit(1734055347.513:1051): proctitle=737368643A20636F7265205B707269765D Dec 13 02:02:27.528431 kernel: audit: type=1105 audit(1734055347.524:1052): pid=3293 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:27.513000 audit[3293]: CRED_ACQ pid=3293 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:27.513000 audit[3293]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffdc23a350 a2=3 a3=0 items=0 ppid=1 pid=3293 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:27.513000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:02:27.524000 audit[3293]: USER_START pid=3293 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:27.528819 sshd[3293]: Accepted publickey for core from 10.0.0.1 port 32780 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:02:27.514896 sshd[3293]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:02:27.519972 systemd[1]: Started session-16.scope. Dec 13 02:02:27.521340 systemd-logind[1189]: New session 16 of user core. Dec 13 02:02:27.526000 audit[3295]: CRED_ACQ pid=3295 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:27.536646 kernel: audit: type=1103 audit(1734055347.526:1053): pid=3295 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:27.656203 sshd[3293]: pam_unix(sshd:session): session closed for user core Dec 13 02:02:27.656000 audit[3293]: USER_END pid=3293 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:27.659565 systemd[1]: sshd@15-10.0.0.73:22-10.0.0.1:32780.service: Deactivated successfully. Dec 13 02:02:27.660291 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 02:02:27.662093 systemd-logind[1189]: Session 16 logged out. Waiting for processes to exit. Dec 13 02:02:27.663489 systemd-logind[1189]: Removed session 16. Dec 13 02:02:27.656000 audit[3293]: CRED_DISP pid=3293 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:27.668452 kernel: audit: type=1106 audit(1734055347.656:1054): pid=3293 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:27.668531 kernel: audit: type=1104 audit(1734055347.656:1055): pid=3293 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:27.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.73:22-10.0.0.1:32780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:29.512354 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3863884968.mount: Deactivated successfully. Dec 13 02:02:29.793092 env[1210]: time="2024-12-13T02:02:29.792306744Z" level=info msg="StopPodSandbox for \"09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea\"" Dec 13 02:02:29.793475 env[1210]: time="2024-12-13T02:02:29.792525619Z" level=info msg="StopPodSandbox for \"8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b\"" Dec 13 02:02:30.792370 env[1210]: time="2024-12-13T02:02:30.792324413Z" level=info msg="StopPodSandbox for \"fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2\"" Dec 13 02:02:30.962825 env[1210]: time="2024-12-13T02:02:30.962748828Z" level=error msg="StopPodSandbox for \"8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b\" failed" error="failed to destroy network for sandbox \"8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:02:30.963162 kubelet[2064]: E1213 02:02:30.962995 2064 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b" Dec 13 02:02:30.963162 kubelet[2064]: E1213 02:02:30.963036 2064 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b"} Dec 13 02:02:30.963162 kubelet[2064]: E1213 02:02:30.963111 2064 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5d37fa34-73a1-48e6-a14e-66e002882c9f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:02:30.963162 kubelet[2064]: E1213 02:02:30.963144 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5d37fa34-73a1-48e6-a14e-66e002882c9f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-54d647d779-f9rwt" podUID="5d37fa34-73a1-48e6-a14e-66e002882c9f" Dec 13 02:02:30.964787 env[1210]: time="2024-12-13T02:02:30.964715109Z" level=error msg="StopPodSandbox for \"fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2\" failed" error="failed to destroy network for sandbox \"fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:02:30.964985 kubelet[2064]: E1213 02:02:30.964965 2064 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2" Dec 13 02:02:30.965063 kubelet[2064]: E1213 02:02:30.965014 2064 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2"} Dec 13 02:02:30.965095 kubelet[2064]: E1213 02:02:30.965065 2064 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e29c8a77-070d-4285-9177-8eb0d1821236\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:02:30.965142 kubelet[2064]: E1213 02:02:30.965098 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e29c8a77-070d-4285-9177-8eb0d1821236\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-x45b5" podUID="e29c8a77-070d-4285-9177-8eb0d1821236" Dec 13 02:02:30.988452 env[1210]: time="2024-12-13T02:02:30.988387434Z" level=error msg="StopPodSandbox for \"09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea\" failed" error="failed to destroy network for sandbox \"09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 02:02:30.988633 kubelet[2064]: E1213 02:02:30.988602 2064 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea" Dec 13 02:02:30.988694 kubelet[2064]: E1213 02:02:30.988639 2064 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea"} Dec 13 02:02:30.988694 kubelet[2064]: E1213 02:02:30.988675 2064 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"04bdc1d0-7f7e-4114-a70c-e1aa18271a20\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 02:02:30.988877 kubelet[2064]: E1213 02:02:30.988703 2064 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"04bdc1d0-7f7e-4114-a70c-e1aa18271a20\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-s84nw" podUID="04bdc1d0-7f7e-4114-a70c-e1aa18271a20" Dec 13 02:02:31.024088 env[1210]: time="2024-12-13T02:02:31.024025459Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:31.036755 env[1210]: time="2024-12-13T02:02:31.036707976Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:31.050495 env[1210]: time="2024-12-13T02:02:31.050412457Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:31.073795 env[1210]: time="2024-12-13T02:02:31.073738744Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:31.074287 env[1210]: time="2024-12-13T02:02:31.074252406Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 02:02:31.086499 env[1210]: time="2024-12-13T02:02:31.086451849Z" level=info msg="CreateContainer within sandbox \"fb28f973c6076b24679dfa13ec6eaf3cede5d9fe27fb922f8f3444c8f07e07e3\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 02:02:31.111934 env[1210]: time="2024-12-13T02:02:31.111877458Z" level=info msg="CreateContainer within sandbox \"fb28f973c6076b24679dfa13ec6eaf3cede5d9fe27fb922f8f3444c8f07e07e3\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"4b024e439c51188e564104b99d24a78e6acb69ff4195b3975a0d560fef987764\"" Dec 13 02:02:31.112474 env[1210]: time="2024-12-13T02:02:31.112451254Z" level=info msg="StartContainer for \"4b024e439c51188e564104b99d24a78e6acb69ff4195b3975a0d560fef987764\"" Dec 13 02:02:31.135609 systemd[1]: Started cri-containerd-4b024e439c51188e564104b99d24a78e6acb69ff4195b3975a0d560fef987764.scope. Dec 13 02:02:31.149000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:31.149000 audit[3389]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f0ab159f2c0 items=0 ppid=2581 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:31.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462303234653433396335313138386535363431303462393964323461 Dec 13 02:02:31.149000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:31.149000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:31.149000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:31.149000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:31.149000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:31.149000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:31.149000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:31.149000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:31.149000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:31.149000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:31.149000 audit: BPF prog-id=136 op=LOAD Dec 13 02:02:31.149000 audit[3389]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00039e8d8 items=0 ppid=2581 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:31.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462303234653433396335313138386535363431303462393964323461 Dec 13 02:02:31.149000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:31.149000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:31.149000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:31.149000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:31.149000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:31.149000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:31.149000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:31.149000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:31.149000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:31.149000 audit: BPF prog-id=137 op=LOAD Dec 13 02:02:31.149000 audit[3389]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00039e928 items=0 ppid=2581 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:31.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462303234653433396335313138386535363431303462393964323461 Dec 13 02:02:31.149000 audit: BPF prog-id=137 op=UNLOAD Dec 13 02:02:31.149000 audit: BPF prog-id=136 op=UNLOAD Dec 13 02:02:31.149000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:31.149000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:31.149000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:31.149000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:31.149000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:31.149000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:31.149000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:31.149000 audit[3389]: AVC avc: denied { perfmon } for pid=3389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:31.149000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:31.149000 audit[3389]: AVC avc: denied { bpf } for pid=3389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:31.149000 audit: BPF prog-id=138 op=LOAD Dec 13 02:02:31.149000 audit[3389]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00039e9b8 items=0 ppid=2581 pid=3389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:31.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462303234653433396335313138386535363431303462393964323461 Dec 13 02:02:31.162383 env[1210]: time="2024-12-13T02:02:31.161332324Z" level=info msg="StartContainer for \"4b024e439c51188e564104b99d24a78e6acb69ff4195b3975a0d560fef987764\" returns successfully" Dec 13 02:02:31.222983 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 02:02:31.223223 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 02:02:31.984424 kubelet[2064]: E1213 02:02:31.984376 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:02:31.999658 kubelet[2064]: I1213 02:02:31.999615 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-pvxbs" podStartSLOduration=2.387425734 podStartE2EDuration="31.999578083s" podCreationTimestamp="2024-12-13 02:02:00 +0000 UTC" firstStartedPulling="2024-12-13 02:02:01.462971384 +0000 UTC m=+24.768289590" lastFinishedPulling="2024-12-13 02:02:31.075123744 +0000 UTC m=+54.380441939" observedRunningTime="2024-12-13 02:02:31.999068999 +0000 UTC m=+55.304387194" watchObservedRunningTime="2024-12-13 02:02:31.999578083 +0000 UTC m=+55.304896268" Dec 13 02:02:32.408000 audit[3534]: AVC avc: denied { write } for pid=3534 comm="tee" name="fd" dev="proc" ino=26805 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:02:32.408000 audit[3534]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc6d43fa27 a2=241 a3=1b6 items=1 ppid=3483 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.408000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 02:02:32.408000 audit: PATH item=0 name="/dev/fd/63" inode=25339 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:32.408000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:02:32.411000 audit[3522]: AVC avc: denied { write } for pid=3522 comm="tee" name="fd" dev="proc" ino=24501 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:02:32.411000 audit[3522]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc465cea16 a2=241 a3=1b6 items=1 ppid=3486 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.411000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 02:02:32.411000 audit: PATH item=0 name="/dev/fd/63" inode=25790 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:32.411000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:02:32.421000 audit[3552]: AVC avc: denied { write } for pid=3552 comm="tee" name="fd" dev="proc" ino=26813 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:02:32.421000 audit[3552]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffee240ba28 a2=241 a3=1b6 items=1 ppid=3488 pid=3552 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.421000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 02:02:32.421000 audit: PATH item=0 name="/dev/fd/63" inode=25348 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:32.421000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:02:32.423000 audit[3549]: AVC avc: denied { write } for pid=3549 comm="tee" name="fd" dev="proc" ino=26817 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:02:32.423000 audit[3549]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe184fca26 a2=241 a3=1b6 items=1 ppid=3496 pid=3549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.423000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 02:02:32.423000 audit: PATH item=0 name="/dev/fd/63" inode=25347 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:32.423000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:02:32.433000 audit[3540]: AVC avc: denied { write } for pid=3540 comm="tee" name="fd" dev="proc" ino=26821 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:02:32.433000 audit[3540]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdb8c04a17 a2=241 a3=1b6 items=1 ppid=3487 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.433000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 02:02:32.433000 audit: PATH item=0 name="/dev/fd/63" inode=24498 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:32.433000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:02:32.456000 audit[3547]: AVC avc: denied { write } for pid=3547 comm="tee" name="fd" dev="proc" ino=25795 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:02:32.456000 audit[3547]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffed78a4a26 a2=241 a3=1b6 items=1 ppid=3492 pid=3547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.456000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 02:02:32.456000 audit: PATH item=0 name="/dev/fd/63" inode=25346 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:32.456000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:02:32.459000 audit[3561]: AVC avc: denied { write } for pid=3561 comm="tee" name="fd" dev="proc" ino=26836 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 02:02:32.459000 audit[3561]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe3b44ea26 a2=241 a3=1b6 items=1 ppid=3493 pid=3561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.459000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 02:02:32.459000 audit: PATH item=0 name="/dev/fd/63" inode=24504 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 02:02:32.459000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 02:02:32.549000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.551780 kernel: kauditd_printk_skb: 79 callbacks suppressed Dec 13 02:02:32.551838 kernel: audit: type=1400 audit(1734055352.549:1070): avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.549000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.557726 kernel: audit: type=1400 audit(1734055352.549:1070): avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.557796 kernel: audit: type=1400 audit(1734055352.549:1070): avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.549000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.560716 kernel: audit: type=1400 audit(1734055352.549:1070): avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.549000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.567398 kernel: audit: type=1400 audit(1734055352.549:1070): avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.567528 kernel: audit: type=1400 audit(1734055352.549:1070): avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.549000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.549000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.549000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.573944 kernel: audit: type=1400 audit(1734055352.549:1070): avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.574262 kernel: audit: type=1400 audit(1734055352.549:1070): avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.549000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.549000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.581074 kernel: audit: type=1400 audit(1734055352.549:1070): avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.581133 kernel: audit: type=1334 audit(1734055352.549:1070): prog-id=139 op=LOAD Dec 13 02:02:32.549000 audit: BPF prog-id=139 op=LOAD Dec 13 02:02:32.549000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcc99a3160 a2=98 a3=3 items=0 ppid=3497 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.549000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:02:32.553000 audit: BPF prog-id=139 op=UNLOAD Dec 13 02:02:32.553000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.553000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.553000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.553000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.553000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.553000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.553000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.553000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.553000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.553000 audit: BPF prog-id=140 op=LOAD Dec 13 02:02:32.553000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcc99a2f40 a2=74 a3=540051 items=0 ppid=3497 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.553000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:02:32.556000 audit: BPF prog-id=140 op=UNLOAD Dec 13 02:02:32.556000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.556000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.556000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.556000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.556000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.556000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.556000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.556000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.556000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.556000 audit: BPF prog-id=141 op=LOAD Dec 13 02:02:32.556000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcc99a2f70 a2=94 a3=2 items=0 ppid=3497 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.556000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:02:32.559000 audit: BPF prog-id=141 op=UNLOAD Dec 13 02:02:32.660868 systemd[1]: Started sshd@16-10.0.0.73:22-10.0.0.1:32792.service. Dec 13 02:02:32.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.73:22-10.0.0.1:32792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:32.672000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.672000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.672000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.672000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.672000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.672000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.672000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.672000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.672000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.672000 audit: BPF prog-id=142 op=LOAD Dec 13 02:02:32.672000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcc99a2e30 a2=40 a3=1 items=0 ppid=3497 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.672000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:02:32.672000 audit: BPF prog-id=142 op=UNLOAD Dec 13 02:02:32.672000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.672000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcc99a2f00 a2=50 a3=7ffcc99a2fe0 items=0 ppid=3497 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.672000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:02:32.680000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.680000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcc99a2e40 a2=28 a3=0 items=0 ppid=3497 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.680000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:02:32.680000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.680000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcc99a2e70 a2=28 a3=0 items=0 ppid=3497 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.680000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:02:32.680000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.680000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcc99a2d80 a2=28 a3=0 items=0 ppid=3497 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.680000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:02:32.680000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.680000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcc99a2e90 a2=28 a3=0 items=0 ppid=3497 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.680000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:02:32.680000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.680000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcc99a2e70 a2=28 a3=0 items=0 ppid=3497 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.680000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:02:32.680000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.680000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcc99a2e60 a2=28 a3=0 items=0 ppid=3497 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.680000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:02:32.680000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.680000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcc99a2e90 a2=28 a3=0 items=0 ppid=3497 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.680000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:02:32.680000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.680000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcc99a2e70 a2=28 a3=0 items=0 ppid=3497 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.680000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:02:32.680000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.680000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcc99a2e90 a2=28 a3=0 items=0 ppid=3497 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.680000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:02:32.680000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.680000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcc99a2e60 a2=28 a3=0 items=0 ppid=3497 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.680000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:02:32.680000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.680000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcc99a2ed0 a2=28 a3=0 items=0 ppid=3497 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.680000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:02:32.680000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.680000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcc99a2c80 a2=50 a3=1 items=0 ppid=3497 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.680000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:02:32.680000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.680000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.680000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.680000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.680000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.680000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.680000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.680000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.680000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.680000 audit: BPF prog-id=143 op=LOAD Dec 13 02:02:32.680000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcc99a2c80 a2=94 a3=5 items=0 ppid=3497 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.680000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:02:32.680000 audit: BPF prog-id=143 op=UNLOAD Dec 13 02:02:32.680000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.680000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffcc99a2d30 a2=50 a3=1 items=0 ppid=3497 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.680000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:02:32.680000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.680000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffcc99a2e50 a2=4 a3=38 items=0 ppid=3497 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.680000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:02:32.680000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.680000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.680000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.680000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.680000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.680000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.680000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.680000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.680000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.680000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.680000 audit[3600]: AVC avc: denied { confidentiality } for pid=3600 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:02:32.680000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcc99a2ea0 a2=94 a3=6 items=0 ppid=3497 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.680000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:02:32.681000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.681000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.681000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.681000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.681000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.681000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.681000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.681000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.681000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.681000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.681000 audit[3600]: AVC avc: denied { confidentiality } for pid=3600 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:02:32.681000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcc99a2650 a2=94 a3=83 items=0 ppid=3497 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.681000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:02:32.681000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.681000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.681000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.681000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.681000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.681000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.681000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.681000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.681000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.681000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.681000 audit[3600]: AVC avc: denied { confidentiality } for pid=3600 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:02:32.681000 audit[3600]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffcc99a2650 a2=94 a3=83 items=0 ppid=3497 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.681000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 02:02:32.688000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.688000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.688000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.688000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.688000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.688000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.688000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.688000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.688000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.688000 audit: BPF prog-id=144 op=LOAD Dec 13 02:02:32.688000 audit[3606]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd938f3f40 a2=98 a3=1999999999999999 items=0 ppid=3497 pid=3606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.688000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:02:32.689000 audit: BPF prog-id=144 op=UNLOAD Dec 13 02:02:32.689000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.689000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.689000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.689000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.689000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.689000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.689000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.689000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.689000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.689000 audit: BPF prog-id=145 op=LOAD Dec 13 02:02:32.689000 audit[3606]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd938f3e20 a2=74 a3=ffff items=0 ppid=3497 pid=3606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.689000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:02:32.689000 audit: BPF prog-id=145 op=UNLOAD Dec 13 02:02:32.689000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.689000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.689000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.689000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.689000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.689000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.689000 audit[3606]: AVC avc: denied { perfmon } for pid=3606 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.689000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.689000 audit[3606]: AVC avc: denied { bpf } for pid=3606 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.689000 audit: BPF prog-id=146 op=LOAD Dec 13 02:02:32.689000 audit[3606]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd938f3e60 a2=40 a3=7ffd938f4040 items=0 ppid=3497 pid=3606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.689000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 02:02:32.689000 audit: BPF prog-id=146 op=UNLOAD Dec 13 02:02:32.699863 sshd[3602]: Accepted publickey for core from 10.0.0.1 port 32792 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:02:32.700321 sshd[3602]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:02:32.697000 audit[3602]: USER_ACCT pid=3602 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:32.698000 audit[3602]: CRED_ACQ pid=3602 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:32.698000 audit[3602]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8ebf1b10 a2=3 a3=0 items=0 ppid=1 pid=3602 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.698000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:02:32.705619 systemd[1]: Started session-17.scope. Dec 13 02:02:32.706731 systemd-logind[1189]: New session 17 of user core. Dec 13 02:02:32.710000 audit[3602]: USER_START pid=3602 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:32.712000 audit[3617]: CRED_ACQ pid=3617 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:32.737242 systemd-networkd[1030]: vxlan.calico: Link UP Dec 13 02:02:32.737249 systemd-networkd[1030]: vxlan.calico: Gained carrier Dec 13 02:02:32.792194 env[1210]: time="2024-12-13T02:02:32.792143414Z" level=info msg="StopPodSandbox for \"3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97\"" Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit: BPF prog-id=147 op=LOAD Dec 13 02:02:32.909000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffebb8264d0 a2=98 a3=ffffffff items=0 ppid=3497 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.909000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:02:32.909000 audit: BPF prog-id=147 op=UNLOAD Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit: BPF prog-id=148 op=LOAD Dec 13 02:02:32.909000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffebb8262e0 a2=74 a3=540051 items=0 ppid=3497 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.909000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:02:32.909000 audit: BPF prog-id=148 op=UNLOAD Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit: BPF prog-id=149 op=LOAD Dec 13 02:02:32.909000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffebb826310 a2=94 a3=2 items=0 ppid=3497 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.909000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:02:32.909000 audit: BPF prog-id=149 op=UNLOAD Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffebb8261e0 a2=28 a3=0 items=0 ppid=3497 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.909000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffebb826210 a2=28 a3=0 items=0 ppid=3497 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.909000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffebb826120 a2=28 a3=0 items=0 ppid=3497 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.909000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffebb826230 a2=28 a3=0 items=0 ppid=3497 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.909000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffebb826210 a2=28 a3=0 items=0 ppid=3497 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.909000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffebb826200 a2=28 a3=0 items=0 ppid=3497 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.909000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffebb826230 a2=28 a3=0 items=0 ppid=3497 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.909000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffebb826210 a2=28 a3=0 items=0 ppid=3497 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.909000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffebb826230 a2=28 a3=0 items=0 ppid=3497 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.909000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffebb826200 a2=28 a3=0 items=0 ppid=3497 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.909000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffebb826270 a2=28 a3=0 items=0 ppid=3497 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.909000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.909000 audit: BPF prog-id=150 op=LOAD Dec 13 02:02:32.909000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffebb8260e0 a2=40 a3=0 items=0 ppid=3497 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.909000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:02:32.909000 audit: BPF prog-id=150 op=UNLOAD Dec 13 02:02:32.910000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.910000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffebb8260d0 a2=50 a3=2800 items=0 ppid=3497 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.910000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:02:32.910000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.910000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffebb8260d0 a2=50 a3=2800 items=0 ppid=3497 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.910000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:02:32.910000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.910000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.910000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.910000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.910000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.910000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.910000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.910000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.910000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.910000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.910000 audit: BPF prog-id=151 op=LOAD Dec 13 02:02:32.910000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffebb8258f0 a2=94 a3=2 items=0 ppid=3497 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.910000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:02:32.910000 audit: BPF prog-id=151 op=UNLOAD Dec 13 02:02:32.910000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.910000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.910000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.910000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.910000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.910000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.910000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.910000 audit[3662]: AVC avc: denied { perfmon } for pid=3662 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.910000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.910000 audit[3662]: AVC avc: denied { bpf } for pid=3662 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.910000 audit: BPF prog-id=152 op=LOAD Dec 13 02:02:32.910000 audit[3662]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffebb8259f0 a2=94 a3=2d items=0 ppid=3497 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.910000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 02:02:32.912000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.912000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.912000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.912000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.912000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.912000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.912000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.912000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.912000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.912000 audit: BPF prog-id=153 op=LOAD Dec 13 02:02:32.912000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe91eba320 a2=98 a3=0 items=0 ppid=3497 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.912000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:02:32.912000 audit: BPF prog-id=153 op=UNLOAD Dec 13 02:02:32.912000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.912000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.912000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.912000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.912000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.912000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.912000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.912000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.912000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.912000 audit: BPF prog-id=154 op=LOAD Dec 13 02:02:32.912000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe91eba100 a2=74 a3=540051 items=0 ppid=3497 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.912000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:02:32.912000 audit: BPF prog-id=154 op=UNLOAD Dec 13 02:02:32.912000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.912000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.912000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.912000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.912000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.912000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.912000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.912000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.912000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:32.912000 audit: BPF prog-id=155 op=LOAD Dec 13 02:02:32.912000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe91eba130 a2=94 a3=2 items=0 ppid=3497 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:32.912000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:02:32.912000 audit: BPF prog-id=155 op=UNLOAD Dec 13 02:02:32.985329 kubelet[2064]: E1213 02:02:32.985283 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:02:33.002062 systemd[1]: run-containerd-runc-k8s.io-4b024e439c51188e564104b99d24a78e6acb69ff4195b3975a0d560fef987764-runc.hzYXEw.mount: Deactivated successfully. Dec 13 02:02:33.024000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.024000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.024000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.024000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.024000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.024000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.024000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.024000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.024000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.024000 audit: BPF prog-id=156 op=LOAD Dec 13 02:02:33.024000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe91eb9ff0 a2=40 a3=1 items=0 ppid=3497 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:33.024000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:02:33.024000 audit: BPF prog-id=156 op=UNLOAD Dec 13 02:02:33.024000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.024000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe91eba0c0 a2=50 a3=7ffe91eba1a0 items=0 ppid=3497 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:33.024000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:02:33.029017 sshd[3602]: pam_unix(sshd:session): session closed for user core Dec 13 02:02:33.028000 audit[3602]: USER_END pid=3602 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:33.029000 audit[3602]: CRED_DISP pid=3602 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:33.030000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.73:22-10.0.0.1:32792 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:33.031491 systemd[1]: sshd@16-10.0.0.73:22-10.0.0.1:32792.service: Deactivated successfully. Dec 13 02:02:33.032154 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 02:02:33.033406 systemd-logind[1189]: Session 17 logged out. Waiting for processes to exit. Dec 13 02:02:33.034122 systemd-logind[1189]: Removed session 17. Dec 13 02:02:33.034000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.034000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe91eba000 a2=28 a3=0 items=0 ppid=3497 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:33.034000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe91eba030 a2=28 a3=0 items=0 ppid=3497 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:33.035000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe91eb9f40 a2=28 a3=0 items=0 ppid=3497 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:33.035000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe91eba050 a2=28 a3=0 items=0 ppid=3497 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:33.035000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe91eba030 a2=28 a3=0 items=0 ppid=3497 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:33.035000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe91eba020 a2=28 a3=0 items=0 ppid=3497 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:33.035000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe91eba050 a2=28 a3=0 items=0 ppid=3497 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:33.035000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe91eba030 a2=28 a3=0 items=0 ppid=3497 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:33.035000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe91eba050 a2=28 a3=0 items=0 ppid=3497 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:33.035000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe91eba020 a2=28 a3=0 items=0 ppid=3497 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:33.035000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe91eba090 a2=28 a3=0 items=0 ppid=3497 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:33.035000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe91eb9e40 a2=50 a3=1 items=0 ppid=3497 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:33.035000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit: BPF prog-id=157 op=LOAD Dec 13 02:02:33.035000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe91eb9e40 a2=94 a3=5 items=0 ppid=3497 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:33.035000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:02:33.035000 audit: BPF prog-id=157 op=UNLOAD Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe91eb9ef0 a2=50 a3=1 items=0 ppid=3497 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:33.035000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe91eba010 a2=4 a3=38 items=0 ppid=3497 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:33.035000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { confidentiality } for pid=3665 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:02:33.035000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe91eba060 a2=94 a3=6 items=0 ppid=3497 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:33.035000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.035000 audit[3665]: AVC avc: denied { confidentiality } for pid=3665 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:02:33.035000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe91eb9810 a2=94 a3=83 items=0 ppid=3497 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:33.035000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:02:33.036000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.036000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.036000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.036000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.036000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.036000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.036000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.036000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.036000 audit[3665]: AVC avc: denied { perfmon } for pid=3665 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.036000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.036000 audit[3665]: AVC avc: denied { confidentiality } for pid=3665 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 02:02:33.036000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe91eb9810 a2=94 a3=83 items=0 ppid=3497 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:33.036000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:02:33.036000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.036000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe91ebb250 a2=10 a3=208 items=0 ppid=3497 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:33.036000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:02:33.037000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.037000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe91ebb0f0 a2=10 a3=3 items=0 ppid=3497 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:33.037000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:02:33.037000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.037000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe91ebb090 a2=10 a3=3 items=0 ppid=3497 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:33.037000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:02:33.037000 audit[3665]: AVC avc: denied { bpf } for pid=3665 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.037000 audit[3665]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe91ebb090 a2=10 a3=7 items=0 ppid=3497 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:33.037000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 02:02:33.048000 audit: BPF prog-id=152 op=UNLOAD Dec 13 02:02:33.093000 audit[3728]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3728 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:02:33.093000 audit[3728]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc800260d0 a2=0 a3=7ffc800260bc items=0 ppid=3497 pid=3728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:33.093000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:02:33.097000 audit[3727]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=3727 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:02:33.097000 audit[3727]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffec0f60250 a2=0 a3=7ffec0f6023c items=0 ppid=3497 pid=3727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:33.097000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:02:33.099000 audit[3731]: NETFILTER_CFG table=filter:99 family=2 entries=39 op=nft_register_chain pid=3731 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:02:33.099000 audit[3731]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffceb4a6970 a2=0 a3=7ffceb4a695c items=0 ppid=3497 pid=3731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:33.099000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:02:33.100000 audit[3726]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=3726 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:02:33.100000 audit[3726]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffcba2f0b90 a2=0 a3=7ffcba2f0b7c items=0 ppid=3497 pid=3726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:33.100000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:02:33.192850 env[1210]: 2024-12-13 02:02:33.025 [INFO][3650] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" Dec 13 02:02:33.192850 env[1210]: 2024-12-13 02:02:33.026 [INFO][3650] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" iface="eth0" netns="/var/run/netns/cni-3321667d-2540-7723-f386-2fbf5cf5a98d" Dec 13 02:02:33.192850 env[1210]: 2024-12-13 02:02:33.026 [INFO][3650] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" iface="eth0" netns="/var/run/netns/cni-3321667d-2540-7723-f386-2fbf5cf5a98d" Dec 13 02:02:33.192850 env[1210]: 2024-12-13 02:02:33.026 [INFO][3650] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" iface="eth0" netns="/var/run/netns/cni-3321667d-2540-7723-f386-2fbf5cf5a98d" Dec 13 02:02:33.192850 env[1210]: 2024-12-13 02:02:33.026 [INFO][3650] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" Dec 13 02:02:33.192850 env[1210]: 2024-12-13 02:02:33.026 [INFO][3650] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" Dec 13 02:02:33.192850 env[1210]: 2024-12-13 02:02:33.083 [INFO][3696] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" HandleID="k8s-pod-network.3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" Workload="localhost-k8s-calico--kube--controllers--575994d967--g56ck-eth0" Dec 13 02:02:33.192850 env[1210]: 2024-12-13 02:02:33.084 [INFO][3696] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:02:33.192850 env[1210]: 2024-12-13 02:02:33.084 [INFO][3696] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:02:33.192850 env[1210]: 2024-12-13 02:02:33.187 [WARNING][3696] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" HandleID="k8s-pod-network.3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" Workload="localhost-k8s-calico--kube--controllers--575994d967--g56ck-eth0" Dec 13 02:02:33.192850 env[1210]: 2024-12-13 02:02:33.187 [INFO][3696] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" HandleID="k8s-pod-network.3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" Workload="localhost-k8s-calico--kube--controllers--575994d967--g56ck-eth0" Dec 13 02:02:33.192850 env[1210]: 2024-12-13 02:02:33.190 [INFO][3696] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:02:33.192850 env[1210]: 2024-12-13 02:02:33.191 [INFO][3650] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" Dec 13 02:02:33.195524 env[1210]: time="2024-12-13T02:02:33.195485405Z" level=info msg="TearDown network for sandbox \"3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97\" successfully" Dec 13 02:02:33.195598 env[1210]: time="2024-12-13T02:02:33.195523527Z" level=info msg="StopPodSandbox for \"3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97\" returns successfully" Dec 13 02:02:33.196252 env[1210]: time="2024-12-13T02:02:33.196225235Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-575994d967-g56ck,Uid:29b270ea-60f5-4411-9e9f-50250a3fb95b,Namespace:calico-system,Attempt:1,}" Dec 13 02:02:33.197711 systemd[1]: run-netns-cni\x2d3321667d\x2d2540\x2d7723\x2df386\x2d2fbf5cf5a98d.mount: Deactivated successfully. Dec 13 02:02:33.342703 systemd-networkd[1030]: caliad806896af8: Link UP Dec 13 02:02:33.344410 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliad806896af8: link becomes ready Dec 13 02:02:33.344118 systemd-networkd[1030]: caliad806896af8: Gained carrier Dec 13 02:02:33.357533 env[1210]: 2024-12-13 02:02:33.283 [INFO][3736] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--575994d967--g56ck-eth0 calico-kube-controllers-575994d967- calico-system 29b270ea-60f5-4411-9e9f-50250a3fb95b 907 0 2024-12-13 02:02:00 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:575994d967 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-575994d967-g56ck eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] caliad806896af8 [] []}} ContainerID="8ebec7edfd35aea3a1f95bedb42f7281ca1d514a74d565bb7c219acc09224093" Namespace="calico-system" Pod="calico-kube-controllers-575994d967-g56ck" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--575994d967--g56ck-" Dec 13 02:02:33.357533 env[1210]: 2024-12-13 02:02:33.284 [INFO][3736] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="8ebec7edfd35aea3a1f95bedb42f7281ca1d514a74d565bb7c219acc09224093" Namespace="calico-system" Pod="calico-kube-controllers-575994d967-g56ck" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--575994d967--g56ck-eth0" Dec 13 02:02:33.357533 env[1210]: 2024-12-13 02:02:33.307 [INFO][3748] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8ebec7edfd35aea3a1f95bedb42f7281ca1d514a74d565bb7c219acc09224093" HandleID="k8s-pod-network.8ebec7edfd35aea3a1f95bedb42f7281ca1d514a74d565bb7c219acc09224093" Workload="localhost-k8s-calico--kube--controllers--575994d967--g56ck-eth0" Dec 13 02:02:33.357533 env[1210]: 2024-12-13 02:02:33.313 [INFO][3748] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8ebec7edfd35aea3a1f95bedb42f7281ca1d514a74d565bb7c219acc09224093" HandleID="k8s-pod-network.8ebec7edfd35aea3a1f95bedb42f7281ca1d514a74d565bb7c219acc09224093" Workload="localhost-k8s-calico--kube--controllers--575994d967--g56ck-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003ab370), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-575994d967-g56ck", "timestamp":"2024-12-13 02:02:33.307433306 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:02:33.357533 env[1210]: 2024-12-13 02:02:33.313 [INFO][3748] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:02:33.357533 env[1210]: 2024-12-13 02:02:33.313 [INFO][3748] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:02:33.357533 env[1210]: 2024-12-13 02:02:33.313 [INFO][3748] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 02:02:33.357533 env[1210]: 2024-12-13 02:02:33.315 [INFO][3748] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8ebec7edfd35aea3a1f95bedb42f7281ca1d514a74d565bb7c219acc09224093" host="localhost" Dec 13 02:02:33.357533 env[1210]: 2024-12-13 02:02:33.318 [INFO][3748] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 02:02:33.357533 env[1210]: 2024-12-13 02:02:33.322 [INFO][3748] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 02:02:33.357533 env[1210]: 2024-12-13 02:02:33.323 [INFO][3748] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 02:02:33.357533 env[1210]: 2024-12-13 02:02:33.324 [INFO][3748] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 02:02:33.357533 env[1210]: 2024-12-13 02:02:33.324 [INFO][3748] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.8ebec7edfd35aea3a1f95bedb42f7281ca1d514a74d565bb7c219acc09224093" host="localhost" Dec 13 02:02:33.357533 env[1210]: 2024-12-13 02:02:33.325 [INFO][3748] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.8ebec7edfd35aea3a1f95bedb42f7281ca1d514a74d565bb7c219acc09224093 Dec 13 02:02:33.357533 env[1210]: 2024-12-13 02:02:33.330 [INFO][3748] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.8ebec7edfd35aea3a1f95bedb42f7281ca1d514a74d565bb7c219acc09224093" host="localhost" Dec 13 02:02:33.357533 env[1210]: 2024-12-13 02:02:33.335 [INFO][3748] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.8ebec7edfd35aea3a1f95bedb42f7281ca1d514a74d565bb7c219acc09224093" host="localhost" Dec 13 02:02:33.357533 env[1210]: 2024-12-13 02:02:33.335 [INFO][3748] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.8ebec7edfd35aea3a1f95bedb42f7281ca1d514a74d565bb7c219acc09224093" host="localhost" Dec 13 02:02:33.357533 env[1210]: 2024-12-13 02:02:33.335 [INFO][3748] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:02:33.357533 env[1210]: 2024-12-13 02:02:33.335 [INFO][3748] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="8ebec7edfd35aea3a1f95bedb42f7281ca1d514a74d565bb7c219acc09224093" HandleID="k8s-pod-network.8ebec7edfd35aea3a1f95bedb42f7281ca1d514a74d565bb7c219acc09224093" Workload="localhost-k8s-calico--kube--controllers--575994d967--g56ck-eth0" Dec 13 02:02:33.358567 env[1210]: 2024-12-13 02:02:33.338 [INFO][3736] cni-plugin/k8s.go 386: Populated endpoint ContainerID="8ebec7edfd35aea3a1f95bedb42f7281ca1d514a74d565bb7c219acc09224093" Namespace="calico-system" Pod="calico-kube-controllers-575994d967-g56ck" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--575994d967--g56ck-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--575994d967--g56ck-eth0", GenerateName:"calico-kube-controllers-575994d967-", Namespace:"calico-system", SelfLink:"", UID:"29b270ea-60f5-4411-9e9f-50250a3fb95b", ResourceVersion:"907", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 2, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"575994d967", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-575994d967-g56ck", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliad806896af8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:02:33.358567 env[1210]: 2024-12-13 02:02:33.338 [INFO][3736] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="8ebec7edfd35aea3a1f95bedb42f7281ca1d514a74d565bb7c219acc09224093" Namespace="calico-system" Pod="calico-kube-controllers-575994d967-g56ck" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--575994d967--g56ck-eth0" Dec 13 02:02:33.358567 env[1210]: 2024-12-13 02:02:33.338 [INFO][3736] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliad806896af8 ContainerID="8ebec7edfd35aea3a1f95bedb42f7281ca1d514a74d565bb7c219acc09224093" Namespace="calico-system" Pod="calico-kube-controllers-575994d967-g56ck" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--575994d967--g56ck-eth0" Dec 13 02:02:33.358567 env[1210]: 2024-12-13 02:02:33.345 [INFO][3736] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8ebec7edfd35aea3a1f95bedb42f7281ca1d514a74d565bb7c219acc09224093" Namespace="calico-system" Pod="calico-kube-controllers-575994d967-g56ck" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--575994d967--g56ck-eth0" Dec 13 02:02:33.358567 env[1210]: 2024-12-13 02:02:33.345 [INFO][3736] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="8ebec7edfd35aea3a1f95bedb42f7281ca1d514a74d565bb7c219acc09224093" Namespace="calico-system" Pod="calico-kube-controllers-575994d967-g56ck" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--575994d967--g56ck-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--575994d967--g56ck-eth0", GenerateName:"calico-kube-controllers-575994d967-", Namespace:"calico-system", SelfLink:"", UID:"29b270ea-60f5-4411-9e9f-50250a3fb95b", ResourceVersion:"907", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 2, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"575994d967", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8ebec7edfd35aea3a1f95bedb42f7281ca1d514a74d565bb7c219acc09224093", Pod:"calico-kube-controllers-575994d967-g56ck", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliad806896af8", MAC:"82:de:f5:c5:d1:fc", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:02:33.358567 env[1210]: 2024-12-13 02:02:33.352 [INFO][3736] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="8ebec7edfd35aea3a1f95bedb42f7281ca1d514a74d565bb7c219acc09224093" Namespace="calico-system" Pod="calico-kube-controllers-575994d967-g56ck" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--575994d967--g56ck-eth0" Dec 13 02:02:33.361000 audit[3767]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=3767 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:02:33.361000 audit[3767]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffee897cab0 a2=0 a3=7ffee897ca9c items=0 ppid=3497 pid=3767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:33.361000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:02:33.369286 env[1210]: time="2024-12-13T02:02:33.369229217Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:02:33.369286 env[1210]: time="2024-12-13T02:02:33.369264664Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:02:33.369286 env[1210]: time="2024-12-13T02:02:33.369273671Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:02:33.369466 env[1210]: time="2024-12-13T02:02:33.369401122Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8ebec7edfd35aea3a1f95bedb42f7281ca1d514a74d565bb7c219acc09224093 pid=3780 runtime=io.containerd.runc.v2 Dec 13 02:02:33.383465 systemd[1]: Started cri-containerd-8ebec7edfd35aea3a1f95bedb42f7281ca1d514a74d565bb7c219acc09224093.scope. Dec 13 02:02:33.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.395000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.395000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.395000 audit: BPF prog-id=158 op=LOAD Dec 13 02:02:33.396000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.396000 audit[3788]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3780 pid=3788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:33.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865626563376564666433356165613361316639356265646234326637 Dec 13 02:02:33.396000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.396000 audit[3788]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3780 pid=3788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:33.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865626563376564666433356165613361316639356265646234326637 Dec 13 02:02:33.396000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.396000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.396000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.396000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.396000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.396000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.396000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.396000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.396000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.396000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.396000 audit: BPF prog-id=159 op=LOAD Dec 13 02:02:33.396000 audit[3788]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028e870 items=0 ppid=3780 pid=3788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:33.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865626563376564666433356165613361316639356265646234326637 Dec 13 02:02:33.396000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.396000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.396000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.396000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.396000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.396000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.396000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.396000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.396000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.396000 audit: BPF prog-id=160 op=LOAD Dec 13 02:02:33.396000 audit[3788]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028e8b8 items=0 ppid=3780 pid=3788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:33.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865626563376564666433356165613361316639356265646234326637 Dec 13 02:02:33.396000 audit: BPF prog-id=160 op=UNLOAD Dec 13 02:02:33.396000 audit: BPF prog-id=159 op=UNLOAD Dec 13 02:02:33.396000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.396000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.396000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.396000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.396000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.396000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.396000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.396000 audit[3788]: AVC avc: denied { perfmon } for pid=3788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.396000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.396000 audit[3788]: AVC avc: denied { bpf } for pid=3788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:33.396000 audit: BPF prog-id=161 op=LOAD Dec 13 02:02:33.396000 audit[3788]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028ecc8 items=0 ppid=3780 pid=3788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:33.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865626563376564666433356165613361316639356265646234326637 Dec 13 02:02:33.398000 systemd-resolved[1146]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:02:33.418575 env[1210]: time="2024-12-13T02:02:33.418504670Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-575994d967-g56ck,Uid:29b270ea-60f5-4411-9e9f-50250a3fb95b,Namespace:calico-system,Attempt:1,} returns sandbox id \"8ebec7edfd35aea3a1f95bedb42f7281ca1d514a74d565bb7c219acc09224093\"" Dec 13 02:02:33.419902 env[1210]: time="2024-12-13T02:02:33.419883910Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 02:02:33.609000 audit[1926]: AVC avc: denied { watch } for pid=1926 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8232 scontext=system_u:system_r:svirt_lxc_net_t:s0:c220,c693 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:02:33.609000 audit[1926]: AVC avc: denied { watch } for pid=1926 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8228 scontext=system_u:system_r:svirt_lxc_net_t:s0:c220,c693 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:02:33.609000 audit[1926]: AVC avc: denied { watch } for pid=1926 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c220,c693 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:02:33.609000 audit[1926]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00e3b4600 a2=fc6 a3=0 items=0 ppid=1780 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c220,c693 key=(null) Dec 13 02:02:33.609000 audit[1926]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00e997060 a2=fc6 a3=0 items=0 ppid=1780 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c220,c693 key=(null) Dec 13 02:02:33.609000 audit[1926]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c008d4e6c0 a2=fc6 a3=0 items=0 ppid=1780 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c220,c693 key=(null) Dec 13 02:02:33.609000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:02:33.609000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:02:33.609000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:02:33.621000 audit[1926]: AVC avc: denied { watch } for pid=1926 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8234 scontext=system_u:system_r:svirt_lxc_net_t:s0:c220,c693 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:02:33.621000 audit[1926]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00e3b4630 a2=fc6 a3=0 items=0 ppid=1780 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c220,c693 key=(null) Dec 13 02:02:33.621000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:02:33.635000 audit[1926]: AVC avc: denied { watch } for pid=1926 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8232 scontext=system_u:system_r:svirt_lxc_net_t:s0:c220,c693 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:02:33.635000 audit[1926]: AVC avc: denied { watch } for pid=1926 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c220,c693 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:02:33.635000 audit[1926]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00def2c40 a2=fc6 a3=0 items=0 ppid=1780 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c220,c693 key=(null) Dec 13 02:02:33.635000 audit[1926]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00ce7daa0 a2=fc6 a3=0 items=0 ppid=1780 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c220,c693 key=(null) Dec 13 02:02:33.635000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:02:33.635000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3733002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Dec 13 02:02:33.792725 env[1210]: time="2024-12-13T02:02:33.792673085Z" level=info msg="StopPodSandbox for \"9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87\"" Dec 13 02:02:33.856795 env[1210]: 2024-12-13 02:02:33.826 [INFO][3857] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" Dec 13 02:02:33.856795 env[1210]: 2024-12-13 02:02:33.826 [INFO][3857] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" iface="eth0" netns="/var/run/netns/cni-ca244238-279c-3ef6-e79c-0483e66d9780" Dec 13 02:02:33.856795 env[1210]: 2024-12-13 02:02:33.827 [INFO][3857] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" iface="eth0" netns="/var/run/netns/cni-ca244238-279c-3ef6-e79c-0483e66d9780" Dec 13 02:02:33.856795 env[1210]: 2024-12-13 02:02:33.827 [INFO][3857] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" iface="eth0" netns="/var/run/netns/cni-ca244238-279c-3ef6-e79c-0483e66d9780" Dec 13 02:02:33.856795 env[1210]: 2024-12-13 02:02:33.827 [INFO][3857] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" Dec 13 02:02:33.856795 env[1210]: 2024-12-13 02:02:33.827 [INFO][3857] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" Dec 13 02:02:33.856795 env[1210]: 2024-12-13 02:02:33.847 [INFO][3864] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" HandleID="k8s-pod-network.9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" Workload="localhost-k8s-calico--apiserver--54d647d779--nj76z-eth0" Dec 13 02:02:33.856795 env[1210]: 2024-12-13 02:02:33.847 [INFO][3864] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:02:33.856795 env[1210]: 2024-12-13 02:02:33.847 [INFO][3864] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:02:33.856795 env[1210]: 2024-12-13 02:02:33.852 [WARNING][3864] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" HandleID="k8s-pod-network.9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" Workload="localhost-k8s-calico--apiserver--54d647d779--nj76z-eth0" Dec 13 02:02:33.856795 env[1210]: 2024-12-13 02:02:33.852 [INFO][3864] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" HandleID="k8s-pod-network.9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" Workload="localhost-k8s-calico--apiserver--54d647d779--nj76z-eth0" Dec 13 02:02:33.856795 env[1210]: 2024-12-13 02:02:33.853 [INFO][3864] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:02:33.856795 env[1210]: 2024-12-13 02:02:33.855 [INFO][3857] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" Dec 13 02:02:33.857276 env[1210]: time="2024-12-13T02:02:33.856908955Z" level=info msg="TearDown network for sandbox \"9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87\" successfully" Dec 13 02:02:33.857276 env[1210]: time="2024-12-13T02:02:33.856942519Z" level=info msg="StopPodSandbox for \"9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87\" returns successfully" Dec 13 02:02:33.857637 env[1210]: time="2024-12-13T02:02:33.857596168Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-54d647d779-nj76z,Uid:cba04b4f-87cd-4943-903a-e92521128699,Namespace:calico-apiserver,Attempt:1,}" Dec 13 02:02:33.868000 audit[1902]: AVC avc: denied { watch } for pid=1902 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8232 scontext=system_u:system_r:svirt_lxc_net_t:s0:c385,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:02:33.868000 audit[1902]: AVC avc: denied { watch } for pid=1902 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c385,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:02:33.868000 audit[1902]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00107d880 a2=fc6 a3=0 items=0 ppid=1760 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c385,c612 key=(null) Dec 13 02:02:33.868000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:02:33.868000 audit[1902]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001c61e90 a2=fc6 a3=0 items=0 ppid=1760 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c385,c612 key=(null) Dec 13 02:02:33.868000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:02:33.881197 systemd-networkd[1030]: vxlan.calico: Gained IPv6LL Dec 13 02:02:33.960544 systemd-networkd[1030]: calif4534d296f3: Link UP Dec 13 02:02:33.962714 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:02:33.962774 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif4534d296f3: link becomes ready Dec 13 02:02:33.962993 systemd-networkd[1030]: calif4534d296f3: Gained carrier Dec 13 02:02:33.973608 env[1210]: 2024-12-13 02:02:33.902 [INFO][3872] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--54d647d779--nj76z-eth0 calico-apiserver-54d647d779- calico-apiserver cba04b4f-87cd-4943-903a-e92521128699 923 0 2024-12-13 02:02:00 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:54d647d779 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-54d647d779-nj76z eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calif4534d296f3 [] []}} ContainerID="5e74d8991bc8be7630648260709c44be3bd2e28b49c3b3792cb922a72b80fb91" Namespace="calico-apiserver" Pod="calico-apiserver-54d647d779-nj76z" WorkloadEndpoint="localhost-k8s-calico--apiserver--54d647d779--nj76z-" Dec 13 02:02:33.973608 env[1210]: 2024-12-13 02:02:33.902 [INFO][3872] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="5e74d8991bc8be7630648260709c44be3bd2e28b49c3b3792cb922a72b80fb91" Namespace="calico-apiserver" Pod="calico-apiserver-54d647d779-nj76z" WorkloadEndpoint="localhost-k8s-calico--apiserver--54d647d779--nj76z-eth0" Dec 13 02:02:33.973608 env[1210]: 2024-12-13 02:02:33.925 [INFO][3885] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5e74d8991bc8be7630648260709c44be3bd2e28b49c3b3792cb922a72b80fb91" HandleID="k8s-pod-network.5e74d8991bc8be7630648260709c44be3bd2e28b49c3b3792cb922a72b80fb91" Workload="localhost-k8s-calico--apiserver--54d647d779--nj76z-eth0" Dec 13 02:02:33.973608 env[1210]: 2024-12-13 02:02:33.932 [INFO][3885] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5e74d8991bc8be7630648260709c44be3bd2e28b49c3b3792cb922a72b80fb91" HandleID="k8s-pod-network.5e74d8991bc8be7630648260709c44be3bd2e28b49c3b3792cb922a72b80fb91" Workload="localhost-k8s-calico--apiserver--54d647d779--nj76z-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f4fc0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-54d647d779-nj76z", "timestamp":"2024-12-13 02:02:33.925544603 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:02:33.973608 env[1210]: 2024-12-13 02:02:33.932 [INFO][3885] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:02:33.973608 env[1210]: 2024-12-13 02:02:33.932 [INFO][3885] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:02:33.973608 env[1210]: 2024-12-13 02:02:33.932 [INFO][3885] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 02:02:33.973608 env[1210]: 2024-12-13 02:02:33.933 [INFO][3885] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5e74d8991bc8be7630648260709c44be3bd2e28b49c3b3792cb922a72b80fb91" host="localhost" Dec 13 02:02:33.973608 env[1210]: 2024-12-13 02:02:33.936 [INFO][3885] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 02:02:33.973608 env[1210]: 2024-12-13 02:02:33.939 [INFO][3885] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 02:02:33.973608 env[1210]: 2024-12-13 02:02:33.941 [INFO][3885] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 02:02:33.973608 env[1210]: 2024-12-13 02:02:33.942 [INFO][3885] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 02:02:33.973608 env[1210]: 2024-12-13 02:02:33.943 [INFO][3885] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.5e74d8991bc8be7630648260709c44be3bd2e28b49c3b3792cb922a72b80fb91" host="localhost" Dec 13 02:02:33.973608 env[1210]: 2024-12-13 02:02:33.944 [INFO][3885] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.5e74d8991bc8be7630648260709c44be3bd2e28b49c3b3792cb922a72b80fb91 Dec 13 02:02:33.973608 env[1210]: 2024-12-13 02:02:33.947 [INFO][3885] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.5e74d8991bc8be7630648260709c44be3bd2e28b49c3b3792cb922a72b80fb91" host="localhost" Dec 13 02:02:33.973608 env[1210]: 2024-12-13 02:02:33.954 [INFO][3885] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.5e74d8991bc8be7630648260709c44be3bd2e28b49c3b3792cb922a72b80fb91" host="localhost" Dec 13 02:02:33.973608 env[1210]: 2024-12-13 02:02:33.954 [INFO][3885] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.5e74d8991bc8be7630648260709c44be3bd2e28b49c3b3792cb922a72b80fb91" host="localhost" Dec 13 02:02:33.973608 env[1210]: 2024-12-13 02:02:33.954 [INFO][3885] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:02:33.973608 env[1210]: 2024-12-13 02:02:33.954 [INFO][3885] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="5e74d8991bc8be7630648260709c44be3bd2e28b49c3b3792cb922a72b80fb91" HandleID="k8s-pod-network.5e74d8991bc8be7630648260709c44be3bd2e28b49c3b3792cb922a72b80fb91" Workload="localhost-k8s-calico--apiserver--54d647d779--nj76z-eth0" Dec 13 02:02:33.974447 env[1210]: 2024-12-13 02:02:33.956 [INFO][3872] cni-plugin/k8s.go 386: Populated endpoint ContainerID="5e74d8991bc8be7630648260709c44be3bd2e28b49c3b3792cb922a72b80fb91" Namespace="calico-apiserver" Pod="calico-apiserver-54d647d779-nj76z" WorkloadEndpoint="localhost-k8s-calico--apiserver--54d647d779--nj76z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--54d647d779--nj76z-eth0", GenerateName:"calico-apiserver-54d647d779-", Namespace:"calico-apiserver", SelfLink:"", UID:"cba04b4f-87cd-4943-903a-e92521128699", ResourceVersion:"923", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 2, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"54d647d779", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-54d647d779-nj76z", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif4534d296f3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:02:33.974447 env[1210]: 2024-12-13 02:02:33.956 [INFO][3872] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="5e74d8991bc8be7630648260709c44be3bd2e28b49c3b3792cb922a72b80fb91" Namespace="calico-apiserver" Pod="calico-apiserver-54d647d779-nj76z" WorkloadEndpoint="localhost-k8s-calico--apiserver--54d647d779--nj76z-eth0" Dec 13 02:02:33.974447 env[1210]: 2024-12-13 02:02:33.956 [INFO][3872] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif4534d296f3 ContainerID="5e74d8991bc8be7630648260709c44be3bd2e28b49c3b3792cb922a72b80fb91" Namespace="calico-apiserver" Pod="calico-apiserver-54d647d779-nj76z" WorkloadEndpoint="localhost-k8s-calico--apiserver--54d647d779--nj76z-eth0" Dec 13 02:02:33.974447 env[1210]: 2024-12-13 02:02:33.962 [INFO][3872] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5e74d8991bc8be7630648260709c44be3bd2e28b49c3b3792cb922a72b80fb91" Namespace="calico-apiserver" Pod="calico-apiserver-54d647d779-nj76z" WorkloadEndpoint="localhost-k8s-calico--apiserver--54d647d779--nj76z-eth0" Dec 13 02:02:33.974447 env[1210]: 2024-12-13 02:02:33.963 [INFO][3872] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="5e74d8991bc8be7630648260709c44be3bd2e28b49c3b3792cb922a72b80fb91" Namespace="calico-apiserver" Pod="calico-apiserver-54d647d779-nj76z" WorkloadEndpoint="localhost-k8s-calico--apiserver--54d647d779--nj76z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--54d647d779--nj76z-eth0", GenerateName:"calico-apiserver-54d647d779-", Namespace:"calico-apiserver", SelfLink:"", UID:"cba04b4f-87cd-4943-903a-e92521128699", ResourceVersion:"923", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 2, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"54d647d779", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5e74d8991bc8be7630648260709c44be3bd2e28b49c3b3792cb922a72b80fb91", Pod:"calico-apiserver-54d647d779-nj76z", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif4534d296f3", MAC:"2e:a9:8a:49:2f:b0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:02:33.974447 env[1210]: 2024-12-13 02:02:33.971 [INFO][3872] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="5e74d8991bc8be7630648260709c44be3bd2e28b49c3b3792cb922a72b80fb91" Namespace="calico-apiserver" Pod="calico-apiserver-54d647d779-nj76z" WorkloadEndpoint="localhost-k8s-calico--apiserver--54d647d779--nj76z-eth0" Dec 13 02:02:33.980000 audit[3909]: NETFILTER_CFG table=filter:102 family=2 entries=44 op=nft_register_chain pid=3909 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:02:33.980000 audit[3909]: SYSCALL arch=c000003e syscall=46 success=yes exit=24680 a0=3 a1=7ffed2c2e680 a2=0 a3=7ffed2c2e66c items=0 ppid=3497 pid=3909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:33.980000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:02:33.984630 env[1210]: time="2024-12-13T02:02:33.984578185Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:02:33.984630 env[1210]: time="2024-12-13T02:02:33.984609844Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:02:33.984630 env[1210]: time="2024-12-13T02:02:33.984619192Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:02:33.985452 env[1210]: time="2024-12-13T02:02:33.985412635Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5e74d8991bc8be7630648260709c44be3bd2e28b49c3b3792cb922a72b80fb91 pid=3915 runtime=io.containerd.runc.v2 Dec 13 02:02:33.997000 systemd[1]: Started cri-containerd-5e74d8991bc8be7630648260709c44be3bd2e28b49c3b3792cb922a72b80fb91.scope. Dec 13 02:02:34.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.007000 audit: BPF prog-id=162 op=LOAD Dec 13 02:02:34.007000 audit[3926]: AVC avc: denied { bpf } for pid=3926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.007000 audit[3926]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3915 pid=3926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:34.007000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565373464383939316263386265373633303634383236303730396334 Dec 13 02:02:34.007000 audit[3926]: AVC avc: denied { perfmon } for pid=3926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.007000 audit[3926]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3915 pid=3926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:34.007000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565373464383939316263386265373633303634383236303730396334 Dec 13 02:02:34.007000 audit[3926]: AVC avc: denied { bpf } for pid=3926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.007000 audit[3926]: AVC avc: denied { bpf } for pid=3926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.007000 audit[3926]: AVC avc: denied { bpf } for pid=3926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.007000 audit[3926]: AVC avc: denied { perfmon } for pid=3926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.007000 audit[3926]: AVC avc: denied { perfmon } for pid=3926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.007000 audit[3926]: AVC avc: denied { perfmon } for pid=3926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.007000 audit[3926]: AVC avc: denied { perfmon } for pid=3926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.007000 audit[3926]: AVC avc: denied { perfmon } for pid=3926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.007000 audit[3926]: AVC avc: denied { bpf } for pid=3926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.007000 audit[3926]: AVC avc: denied { bpf } for pid=3926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.007000 audit: BPF prog-id=163 op=LOAD Dec 13 02:02:34.007000 audit[3926]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000269ce0 items=0 ppid=3915 pid=3926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:34.007000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565373464383939316263386265373633303634383236303730396334 Dec 13 02:02:34.008000 audit[3926]: AVC avc: denied { bpf } for pid=3926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.008000 audit[3926]: AVC avc: denied { bpf } for pid=3926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.008000 audit[3926]: AVC avc: denied { perfmon } for pid=3926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.008000 audit[3926]: AVC avc: denied { perfmon } for pid=3926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.008000 audit[3926]: AVC avc: denied { perfmon } for pid=3926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.008000 audit[3926]: AVC avc: denied { perfmon } for pid=3926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.008000 audit[3926]: AVC avc: denied { perfmon } for pid=3926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.008000 audit[3926]: AVC avc: denied { bpf } for pid=3926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.008000 audit[3926]: AVC avc: denied { bpf } for pid=3926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.008000 audit: BPF prog-id=164 op=LOAD Dec 13 02:02:34.008000 audit[3926]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000269d28 items=0 ppid=3915 pid=3926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:34.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565373464383939316263386265373633303634383236303730396334 Dec 13 02:02:34.008000 audit: BPF prog-id=164 op=UNLOAD Dec 13 02:02:34.008000 audit: BPF prog-id=163 op=UNLOAD Dec 13 02:02:34.008000 audit[3926]: AVC avc: denied { bpf } for pid=3926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.008000 audit[3926]: AVC avc: denied { bpf } for pid=3926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.008000 audit[3926]: AVC avc: denied { bpf } for pid=3926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.008000 audit[3926]: AVC avc: denied { perfmon } for pid=3926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.008000 audit[3926]: AVC avc: denied { perfmon } for pid=3926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.008000 audit[3926]: AVC avc: denied { perfmon } for pid=3926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.008000 audit[3926]: AVC avc: denied { perfmon } for pid=3926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.008000 audit[3926]: AVC avc: denied { perfmon } for pid=3926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.008000 audit[3926]: AVC avc: denied { bpf } for pid=3926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.008000 audit[3926]: AVC avc: denied { bpf } for pid=3926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:34.008000 audit: BPF prog-id=165 op=LOAD Dec 13 02:02:34.008000 audit[3926]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003ec138 items=0 ppid=3915 pid=3926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:34.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565373464383939316263386265373633303634383236303730396334 Dec 13 02:02:34.009819 systemd-resolved[1146]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:02:34.030556 env[1210]: time="2024-12-13T02:02:34.030510357Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-54d647d779-nj76z,Uid:cba04b4f-87cd-4943-903a-e92521128699,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"5e74d8991bc8be7630648260709c44be3bd2e28b49c3b3792cb922a72b80fb91\"" Dec 13 02:02:34.198878 systemd[1]: run-netns-cni\x2dca244238\x2d279c\x2d3ef6\x2de79c\x2d0483e66d9780.mount: Deactivated successfully. Dec 13 02:02:34.777212 systemd-networkd[1030]: caliad806896af8: Gained IPv6LL Dec 13 02:02:35.097244 systemd-networkd[1030]: calif4534d296f3: Gained IPv6LL Dec 13 02:02:35.560296 env[1210]: time="2024-12-13T02:02:35.560234142Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:35.562274 env[1210]: time="2024-12-13T02:02:35.562233176Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:35.563821 env[1210]: time="2024-12-13T02:02:35.563776956Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:35.565122 env[1210]: time="2024-12-13T02:02:35.565093250Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:35.565555 env[1210]: time="2024-12-13T02:02:35.565529046Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 02:02:35.566111 env[1210]: time="2024-12-13T02:02:35.566084511Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 02:02:35.575848 env[1210]: time="2024-12-13T02:02:35.575811905Z" level=info msg="CreateContainer within sandbox \"8ebec7edfd35aea3a1f95bedb42f7281ca1d514a74d565bb7c219acc09224093\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 02:02:35.590439 env[1210]: time="2024-12-13T02:02:35.590393787Z" level=info msg="CreateContainer within sandbox \"8ebec7edfd35aea3a1f95bedb42f7281ca1d514a74d565bb7c219acc09224093\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"3d7c0988a8cf30d051e5d4b44ef54121eb34c3a17b636ce1232f20627f983474\"" Dec 13 02:02:35.591064 env[1210]: time="2024-12-13T02:02:35.590999248Z" level=info msg="StartContainer for \"3d7c0988a8cf30d051e5d4b44ef54121eb34c3a17b636ce1232f20627f983474\"" Dec 13 02:02:35.605892 systemd[1]: Started cri-containerd-3d7c0988a8cf30d051e5d4b44ef54121eb34c3a17b636ce1232f20627f983474.scope. Dec 13 02:02:35.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.621000 audit: BPF prog-id=166 op=LOAD Dec 13 02:02:35.621000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.621000 audit[3958]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3780 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:35.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364376330393838613863663330643035316535643462343465663534 Dec 13 02:02:35.621000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.621000 audit[3958]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3780 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:35.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364376330393838613863663330643035316535643462343465663534 Dec 13 02:02:35.621000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.621000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.621000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.621000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.621000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.621000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.621000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.621000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.621000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.621000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.621000 audit: BPF prog-id=167 op=LOAD Dec 13 02:02:35.621000 audit[3958]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c12f0 items=0 ppid=3780 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:35.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364376330393838613863663330643035316535643462343465663534 Dec 13 02:02:35.621000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.621000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.621000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.621000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.621000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.621000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.621000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.621000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.621000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.621000 audit: BPF prog-id=168 op=LOAD Dec 13 02:02:35.621000 audit[3958]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c1338 items=0 ppid=3780 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:35.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364376330393838613863663330643035316535643462343465663534 Dec 13 02:02:35.621000 audit: BPF prog-id=168 op=UNLOAD Dec 13 02:02:35.621000 audit: BPF prog-id=167 op=UNLOAD Dec 13 02:02:35.621000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.621000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.621000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.621000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.621000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.621000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.621000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.621000 audit[3958]: AVC avc: denied { perfmon } for pid=3958 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.621000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.621000 audit[3958]: AVC avc: denied { bpf } for pid=3958 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:35.621000 audit: BPF prog-id=169 op=LOAD Dec 13 02:02:35.621000 audit[3958]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c1748 items=0 ppid=3780 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:35.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364376330393838613863663330643035316535643462343465663534 Dec 13 02:02:35.647141 env[1210]: time="2024-12-13T02:02:35.647096311Z" level=info msg="StartContainer for \"3d7c0988a8cf30d051e5d4b44ef54121eb34c3a17b636ce1232f20627f983474\" returns successfully" Dec 13 02:02:35.792684 env[1210]: time="2024-12-13T02:02:35.792620952Z" level=info msg="StopPodSandbox for \"bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594\"" Dec 13 02:02:35.865308 env[1210]: 2024-12-13 02:02:35.832 [INFO][4001] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" Dec 13 02:02:35.865308 env[1210]: 2024-12-13 02:02:35.833 [INFO][4001] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" iface="eth0" netns="/var/run/netns/cni-8c8ba055-a80d-41ee-8364-96472d7b1e3d" Dec 13 02:02:35.865308 env[1210]: 2024-12-13 02:02:35.833 [INFO][4001] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" iface="eth0" netns="/var/run/netns/cni-8c8ba055-a80d-41ee-8364-96472d7b1e3d" Dec 13 02:02:35.865308 env[1210]: 2024-12-13 02:02:35.833 [INFO][4001] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" iface="eth0" netns="/var/run/netns/cni-8c8ba055-a80d-41ee-8364-96472d7b1e3d" Dec 13 02:02:35.865308 env[1210]: 2024-12-13 02:02:35.833 [INFO][4001] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" Dec 13 02:02:35.865308 env[1210]: 2024-12-13 02:02:35.833 [INFO][4001] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" Dec 13 02:02:35.865308 env[1210]: 2024-12-13 02:02:35.855 [INFO][4010] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" HandleID="k8s-pod-network.bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" Workload="localhost-k8s-csi--node--driver--m7k69-eth0" Dec 13 02:02:35.865308 env[1210]: 2024-12-13 02:02:35.856 [INFO][4010] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:02:35.865308 env[1210]: 2024-12-13 02:02:35.856 [INFO][4010] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:02:35.865308 env[1210]: 2024-12-13 02:02:35.861 [WARNING][4010] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" HandleID="k8s-pod-network.bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" Workload="localhost-k8s-csi--node--driver--m7k69-eth0" Dec 13 02:02:35.865308 env[1210]: 2024-12-13 02:02:35.861 [INFO][4010] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" HandleID="k8s-pod-network.bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" Workload="localhost-k8s-csi--node--driver--m7k69-eth0" Dec 13 02:02:35.865308 env[1210]: 2024-12-13 02:02:35.862 [INFO][4010] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:02:35.865308 env[1210]: 2024-12-13 02:02:35.863 [INFO][4001] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" Dec 13 02:02:35.865713 env[1210]: time="2024-12-13T02:02:35.865344127Z" level=info msg="TearDown network for sandbox \"bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594\" successfully" Dec 13 02:02:35.865713 env[1210]: time="2024-12-13T02:02:35.865381439Z" level=info msg="StopPodSandbox for \"bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594\" returns successfully" Dec 13 02:02:35.866845 env[1210]: time="2024-12-13T02:02:35.866809747Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-m7k69,Uid:37bc7145-5a7a-456a-94e8-117913a4280c,Namespace:calico-system,Attempt:1,}" Dec 13 02:02:35.964256 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:02:35.964369 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie7d9ad02d70: link becomes ready Dec 13 02:02:35.961660 systemd-networkd[1030]: calie7d9ad02d70: Link UP Dec 13 02:02:35.964794 systemd-networkd[1030]: calie7d9ad02d70: Gained carrier Dec 13 02:02:35.977741 env[1210]: 2024-12-13 02:02:35.907 [INFO][4019] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--m7k69-eth0 csi-node-driver- calico-system 37bc7145-5a7a-456a-94e8-117913a4280c 951 0 2024-12-13 02:02:00 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-m7k69 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calie7d9ad02d70 [] []}} ContainerID="6aa5a7273c6fde45a2688f03c9f39d78b8154f3aeb0a349cf16713df60cdfa26" Namespace="calico-system" Pod="csi-node-driver-m7k69" WorkloadEndpoint="localhost-k8s-csi--node--driver--m7k69-" Dec 13 02:02:35.977741 env[1210]: 2024-12-13 02:02:35.907 [INFO][4019] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="6aa5a7273c6fde45a2688f03c9f39d78b8154f3aeb0a349cf16713df60cdfa26" Namespace="calico-system" Pod="csi-node-driver-m7k69" WorkloadEndpoint="localhost-k8s-csi--node--driver--m7k69-eth0" Dec 13 02:02:35.977741 env[1210]: 2024-12-13 02:02:35.932 [INFO][4032] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6aa5a7273c6fde45a2688f03c9f39d78b8154f3aeb0a349cf16713df60cdfa26" HandleID="k8s-pod-network.6aa5a7273c6fde45a2688f03c9f39d78b8154f3aeb0a349cf16713df60cdfa26" Workload="localhost-k8s-csi--node--driver--m7k69-eth0" Dec 13 02:02:35.977741 env[1210]: 2024-12-13 02:02:35.938 [INFO][4032] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="6aa5a7273c6fde45a2688f03c9f39d78b8154f3aeb0a349cf16713df60cdfa26" HandleID="k8s-pod-network.6aa5a7273c6fde45a2688f03c9f39d78b8154f3aeb0a349cf16713df60cdfa26" Workload="localhost-k8s-csi--node--driver--m7k69-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f5cb0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-m7k69", "timestamp":"2024-12-13 02:02:35.9320061 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:02:35.977741 env[1210]: 2024-12-13 02:02:35.939 [INFO][4032] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:02:35.977741 env[1210]: 2024-12-13 02:02:35.939 [INFO][4032] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:02:35.977741 env[1210]: 2024-12-13 02:02:35.939 [INFO][4032] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 02:02:35.977741 env[1210]: 2024-12-13 02:02:35.940 [INFO][4032] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6aa5a7273c6fde45a2688f03c9f39d78b8154f3aeb0a349cf16713df60cdfa26" host="localhost" Dec 13 02:02:35.977741 env[1210]: 2024-12-13 02:02:35.943 [INFO][4032] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 02:02:35.977741 env[1210]: 2024-12-13 02:02:35.946 [INFO][4032] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 02:02:35.977741 env[1210]: 2024-12-13 02:02:35.947 [INFO][4032] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 02:02:35.977741 env[1210]: 2024-12-13 02:02:35.948 [INFO][4032] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 02:02:35.977741 env[1210]: 2024-12-13 02:02:35.949 [INFO][4032] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.6aa5a7273c6fde45a2688f03c9f39d78b8154f3aeb0a349cf16713df60cdfa26" host="localhost" Dec 13 02:02:35.977741 env[1210]: 2024-12-13 02:02:35.950 [INFO][4032] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.6aa5a7273c6fde45a2688f03c9f39d78b8154f3aeb0a349cf16713df60cdfa26 Dec 13 02:02:35.977741 env[1210]: 2024-12-13 02:02:35.953 [INFO][4032] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.6aa5a7273c6fde45a2688f03c9f39d78b8154f3aeb0a349cf16713df60cdfa26" host="localhost" Dec 13 02:02:35.977741 env[1210]: 2024-12-13 02:02:35.958 [INFO][4032] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.6aa5a7273c6fde45a2688f03c9f39d78b8154f3aeb0a349cf16713df60cdfa26" host="localhost" Dec 13 02:02:35.977741 env[1210]: 2024-12-13 02:02:35.958 [INFO][4032] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.6aa5a7273c6fde45a2688f03c9f39d78b8154f3aeb0a349cf16713df60cdfa26" host="localhost" Dec 13 02:02:35.977741 env[1210]: 2024-12-13 02:02:35.958 [INFO][4032] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:02:35.977741 env[1210]: 2024-12-13 02:02:35.958 [INFO][4032] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="6aa5a7273c6fde45a2688f03c9f39d78b8154f3aeb0a349cf16713df60cdfa26" HandleID="k8s-pod-network.6aa5a7273c6fde45a2688f03c9f39d78b8154f3aeb0a349cf16713df60cdfa26" Workload="localhost-k8s-csi--node--driver--m7k69-eth0" Dec 13 02:02:35.978722 env[1210]: 2024-12-13 02:02:35.960 [INFO][4019] cni-plugin/k8s.go 386: Populated endpoint ContainerID="6aa5a7273c6fde45a2688f03c9f39d78b8154f3aeb0a349cf16713df60cdfa26" Namespace="calico-system" Pod="csi-node-driver-m7k69" WorkloadEndpoint="localhost-k8s-csi--node--driver--m7k69-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--m7k69-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"37bc7145-5a7a-456a-94e8-117913a4280c", ResourceVersion:"951", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 2, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-m7k69", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calie7d9ad02d70", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:02:35.978722 env[1210]: 2024-12-13 02:02:35.960 [INFO][4019] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="6aa5a7273c6fde45a2688f03c9f39d78b8154f3aeb0a349cf16713df60cdfa26" Namespace="calico-system" Pod="csi-node-driver-m7k69" WorkloadEndpoint="localhost-k8s-csi--node--driver--m7k69-eth0" Dec 13 02:02:35.978722 env[1210]: 2024-12-13 02:02:35.960 [INFO][4019] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie7d9ad02d70 ContainerID="6aa5a7273c6fde45a2688f03c9f39d78b8154f3aeb0a349cf16713df60cdfa26" Namespace="calico-system" Pod="csi-node-driver-m7k69" WorkloadEndpoint="localhost-k8s-csi--node--driver--m7k69-eth0" Dec 13 02:02:35.978722 env[1210]: 2024-12-13 02:02:35.964 [INFO][4019] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6aa5a7273c6fde45a2688f03c9f39d78b8154f3aeb0a349cf16713df60cdfa26" Namespace="calico-system" Pod="csi-node-driver-m7k69" WorkloadEndpoint="localhost-k8s-csi--node--driver--m7k69-eth0" Dec 13 02:02:35.978722 env[1210]: 2024-12-13 02:02:35.964 [INFO][4019] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="6aa5a7273c6fde45a2688f03c9f39d78b8154f3aeb0a349cf16713df60cdfa26" Namespace="calico-system" Pod="csi-node-driver-m7k69" WorkloadEndpoint="localhost-k8s-csi--node--driver--m7k69-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--m7k69-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"37bc7145-5a7a-456a-94e8-117913a4280c", ResourceVersion:"951", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 2, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"6aa5a7273c6fde45a2688f03c9f39d78b8154f3aeb0a349cf16713df60cdfa26", Pod:"csi-node-driver-m7k69", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calie7d9ad02d70", MAC:"76:de:38:a9:ac:56", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:02:35.978722 env[1210]: 2024-12-13 02:02:35.974 [INFO][4019] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="6aa5a7273c6fde45a2688f03c9f39d78b8154f3aeb0a349cf16713df60cdfa26" Namespace="calico-system" Pod="csi-node-driver-m7k69" WorkloadEndpoint="localhost-k8s-csi--node--driver--m7k69-eth0" Dec 13 02:02:35.985000 audit[4054]: NETFILTER_CFG table=filter:103 family=2 entries=38 op=nft_register_chain pid=4054 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:02:35.985000 audit[4054]: SYSCALL arch=c000003e syscall=46 success=yes exit=19828 a0=3 a1=7ffc33eace90 a2=0 a3=7ffc33eace7c items=0 ppid=3497 pid=4054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:35.985000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:02:35.991879 env[1210]: time="2024-12-13T02:02:35.991408390Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:02:35.991879 env[1210]: time="2024-12-13T02:02:35.991446433Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:02:35.991879 env[1210]: time="2024-12-13T02:02:35.991457545Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:02:35.991879 env[1210]: time="2024-12-13T02:02:35.991590188Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6aa5a7273c6fde45a2688f03c9f39d78b8154f3aeb0a349cf16713df60cdfa26 pid=4062 runtime=io.containerd.runc.v2 Dec 13 02:02:36.005229 kubelet[2064]: I1213 02:02:36.005196 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-575994d967-g56ck" podStartSLOduration=33.858812493 podStartE2EDuration="36.005144548s" podCreationTimestamp="2024-12-13 02:02:00 +0000 UTC" firstStartedPulling="2024-12-13 02:02:33.41951431 +0000 UTC m=+56.724832505" lastFinishedPulling="2024-12-13 02:02:35.565846364 +0000 UTC m=+58.871164560" observedRunningTime="2024-12-13 02:02:36.004679416 +0000 UTC m=+59.309997621" watchObservedRunningTime="2024-12-13 02:02:36.005144548 +0000 UTC m=+59.310462733" Dec 13 02:02:36.009949 systemd[1]: Started cri-containerd-6aa5a7273c6fde45a2688f03c9f39d78b8154f3aeb0a349cf16713df60cdfa26.scope. Dec 13 02:02:36.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.019000 audit: BPF prog-id=170 op=LOAD Dec 13 02:02:36.019000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.019000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=4062 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:36.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661613561373237336336666465343561323638386630336339663339 Dec 13 02:02:36.019000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.019000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=4062 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:36.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661613561373237336336666465343561323638386630336339663339 Dec 13 02:02:36.019000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.019000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.019000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.019000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.019000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.019000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.019000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.019000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.019000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.019000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.019000 audit: BPF prog-id=171 op=LOAD Dec 13 02:02:36.019000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c0000a12a0 items=0 ppid=4062 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:36.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661613561373237336336666465343561323638386630336339663339 Dec 13 02:02:36.019000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.019000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.019000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.019000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.019000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.019000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.019000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.019000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.019000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.019000 audit: BPF prog-id=172 op=LOAD Dec 13 02:02:36.019000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c0000a12e8 items=0 ppid=4062 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:36.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661613561373237336336666465343561323638386630336339663339 Dec 13 02:02:36.020000 audit: BPF prog-id=172 op=UNLOAD Dec 13 02:02:36.020000 audit: BPF prog-id=171 op=UNLOAD Dec 13 02:02:36.020000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.020000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.020000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.020000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.020000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.020000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.020000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.020000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.020000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.020000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:36.020000 audit: BPF prog-id=173 op=LOAD Dec 13 02:02:36.020000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c0000a16f8 items=0 ppid=4062 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:36.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661613561373237336336666465343561323638386630336339663339 Dec 13 02:02:36.021725 systemd-resolved[1146]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:02:36.031368 env[1210]: time="2024-12-13T02:02:36.031297979Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-m7k69,Uid:37bc7145-5a7a-456a-94e8-117913a4280c,Namespace:calico-system,Attempt:1,} returns sandbox id \"6aa5a7273c6fde45a2688f03c9f39d78b8154f3aeb0a349cf16713df60cdfa26\"" Dec 13 02:02:36.571938 systemd[1]: run-netns-cni\x2d8c8ba055\x2da80d\x2d41ee\x2d8364\x2d96472d7b1e3d.mount: Deactivated successfully. Dec 13 02:02:36.774659 env[1210]: time="2024-12-13T02:02:36.774613034Z" level=info msg="StopPodSandbox for \"bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594\"" Dec 13 02:02:36.848226 env[1210]: 2024-12-13 02:02:36.813 [WARNING][4130] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--m7k69-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"37bc7145-5a7a-456a-94e8-117913a4280c", ResourceVersion:"954", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 2, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"6aa5a7273c6fde45a2688f03c9f39d78b8154f3aeb0a349cf16713df60cdfa26", Pod:"csi-node-driver-m7k69", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calie7d9ad02d70", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:02:36.848226 env[1210]: 2024-12-13 02:02:36.813 [INFO][4130] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" Dec 13 02:02:36.848226 env[1210]: 2024-12-13 02:02:36.813 [INFO][4130] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" iface="eth0" netns="" Dec 13 02:02:36.848226 env[1210]: 2024-12-13 02:02:36.813 [INFO][4130] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" Dec 13 02:02:36.848226 env[1210]: 2024-12-13 02:02:36.813 [INFO][4130] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" Dec 13 02:02:36.848226 env[1210]: 2024-12-13 02:02:36.834 [INFO][4139] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" HandleID="k8s-pod-network.bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" Workload="localhost-k8s-csi--node--driver--m7k69-eth0" Dec 13 02:02:36.848226 env[1210]: 2024-12-13 02:02:36.834 [INFO][4139] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:02:36.848226 env[1210]: 2024-12-13 02:02:36.835 [INFO][4139] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:02:36.848226 env[1210]: 2024-12-13 02:02:36.840 [WARNING][4139] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" HandleID="k8s-pod-network.bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" Workload="localhost-k8s-csi--node--driver--m7k69-eth0" Dec 13 02:02:36.848226 env[1210]: 2024-12-13 02:02:36.840 [INFO][4139] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" HandleID="k8s-pod-network.bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" Workload="localhost-k8s-csi--node--driver--m7k69-eth0" Dec 13 02:02:36.848226 env[1210]: 2024-12-13 02:02:36.845 [INFO][4139] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:02:36.848226 env[1210]: 2024-12-13 02:02:36.846 [INFO][4130] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" Dec 13 02:02:36.848226 env[1210]: time="2024-12-13T02:02:36.848010195Z" level=info msg="TearDown network for sandbox \"bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594\" successfully" Dec 13 02:02:36.848226 env[1210]: time="2024-12-13T02:02:36.848041526Z" level=info msg="StopPodSandbox for \"bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594\" returns successfully" Dec 13 02:02:36.849164 env[1210]: time="2024-12-13T02:02:36.848654360Z" level=info msg="RemovePodSandbox for \"bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594\"" Dec 13 02:02:36.851360 env[1210]: time="2024-12-13T02:02:36.848742459Z" level=info msg="Forcibly stopping sandbox \"bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594\"" Dec 13 02:02:37.004377 env[1210]: 2024-12-13 02:02:36.904 [WARNING][4161] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--m7k69-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"37bc7145-5a7a-456a-94e8-117913a4280c", ResourceVersion:"954", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 2, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"6aa5a7273c6fde45a2688f03c9f39d78b8154f3aeb0a349cf16713df60cdfa26", Pod:"csi-node-driver-m7k69", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calie7d9ad02d70", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:02:37.004377 env[1210]: 2024-12-13 02:02:36.904 [INFO][4161] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" Dec 13 02:02:37.004377 env[1210]: 2024-12-13 02:02:36.904 [INFO][4161] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" iface="eth0" netns="" Dec 13 02:02:37.004377 env[1210]: 2024-12-13 02:02:36.904 [INFO][4161] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" Dec 13 02:02:37.004377 env[1210]: 2024-12-13 02:02:36.904 [INFO][4161] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" Dec 13 02:02:37.004377 env[1210]: 2024-12-13 02:02:36.994 [INFO][4169] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" HandleID="k8s-pod-network.bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" Workload="localhost-k8s-csi--node--driver--m7k69-eth0" Dec 13 02:02:37.004377 env[1210]: 2024-12-13 02:02:36.994 [INFO][4169] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:02:37.004377 env[1210]: 2024-12-13 02:02:36.994 [INFO][4169] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:02:37.004377 env[1210]: 2024-12-13 02:02:37.000 [WARNING][4169] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" HandleID="k8s-pod-network.bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" Workload="localhost-k8s-csi--node--driver--m7k69-eth0" Dec 13 02:02:37.004377 env[1210]: 2024-12-13 02:02:37.000 [INFO][4169] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" HandleID="k8s-pod-network.bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" Workload="localhost-k8s-csi--node--driver--m7k69-eth0" Dec 13 02:02:37.004377 env[1210]: 2024-12-13 02:02:37.001 [INFO][4169] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:02:37.004377 env[1210]: 2024-12-13 02:02:37.003 [INFO][4161] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594" Dec 13 02:02:37.005040 env[1210]: time="2024-12-13T02:02:37.004976844Z" level=info msg="TearDown network for sandbox \"bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594\" successfully" Dec 13 02:02:37.337799 env[1210]: time="2024-12-13T02:02:37.337729934Z" level=info msg="RemovePodSandbox \"bead4705e46536ddb2e2d12f9d95ed12ffd066986920d57ebc8fd6b7b25f4594\" returns successfully" Dec 13 02:02:37.338316 env[1210]: time="2024-12-13T02:02:37.338292462Z" level=info msg="StopPodSandbox for \"9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87\"" Dec 13 02:02:37.407089 env[1210]: 2024-12-13 02:02:37.372 [WARNING][4193] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--54d647d779--nj76z-eth0", GenerateName:"calico-apiserver-54d647d779-", Namespace:"calico-apiserver", SelfLink:"", UID:"cba04b4f-87cd-4943-903a-e92521128699", ResourceVersion:"926", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 2, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"54d647d779", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5e74d8991bc8be7630648260709c44be3bd2e28b49c3b3792cb922a72b80fb91", Pod:"calico-apiserver-54d647d779-nj76z", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif4534d296f3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:02:37.407089 env[1210]: 2024-12-13 02:02:37.373 [INFO][4193] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" Dec 13 02:02:37.407089 env[1210]: 2024-12-13 02:02:37.373 [INFO][4193] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" iface="eth0" netns="" Dec 13 02:02:37.407089 env[1210]: 2024-12-13 02:02:37.373 [INFO][4193] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" Dec 13 02:02:37.407089 env[1210]: 2024-12-13 02:02:37.373 [INFO][4193] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" Dec 13 02:02:37.407089 env[1210]: 2024-12-13 02:02:37.396 [INFO][4200] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" HandleID="k8s-pod-network.9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" Workload="localhost-k8s-calico--apiserver--54d647d779--nj76z-eth0" Dec 13 02:02:37.407089 env[1210]: 2024-12-13 02:02:37.396 [INFO][4200] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:02:37.407089 env[1210]: 2024-12-13 02:02:37.396 [INFO][4200] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:02:37.407089 env[1210]: 2024-12-13 02:02:37.402 [WARNING][4200] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" HandleID="k8s-pod-network.9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" Workload="localhost-k8s-calico--apiserver--54d647d779--nj76z-eth0" Dec 13 02:02:37.407089 env[1210]: 2024-12-13 02:02:37.402 [INFO][4200] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" HandleID="k8s-pod-network.9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" Workload="localhost-k8s-calico--apiserver--54d647d779--nj76z-eth0" Dec 13 02:02:37.407089 env[1210]: 2024-12-13 02:02:37.404 [INFO][4200] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:02:37.407089 env[1210]: 2024-12-13 02:02:37.405 [INFO][4193] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" Dec 13 02:02:37.407602 env[1210]: time="2024-12-13T02:02:37.407119482Z" level=info msg="TearDown network for sandbox \"9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87\" successfully" Dec 13 02:02:37.407602 env[1210]: time="2024-12-13T02:02:37.407157335Z" level=info msg="StopPodSandbox for \"9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87\" returns successfully" Dec 13 02:02:37.407730 env[1210]: time="2024-12-13T02:02:37.407695005Z" level=info msg="RemovePodSandbox for \"9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87\"" Dec 13 02:02:37.407900 env[1210]: time="2024-12-13T02:02:37.407744190Z" level=info msg="Forcibly stopping sandbox \"9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87\"" Dec 13 02:02:37.469773 env[1210]: 2024-12-13 02:02:37.439 [WARNING][4222] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--54d647d779--nj76z-eth0", GenerateName:"calico-apiserver-54d647d779-", Namespace:"calico-apiserver", SelfLink:"", UID:"cba04b4f-87cd-4943-903a-e92521128699", ResourceVersion:"926", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 2, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"54d647d779", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5e74d8991bc8be7630648260709c44be3bd2e28b49c3b3792cb922a72b80fb91", Pod:"calico-apiserver-54d647d779-nj76z", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif4534d296f3", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:02:37.469773 env[1210]: 2024-12-13 02:02:37.440 [INFO][4222] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" Dec 13 02:02:37.469773 env[1210]: 2024-12-13 02:02:37.440 [INFO][4222] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" iface="eth0" netns="" Dec 13 02:02:37.469773 env[1210]: 2024-12-13 02:02:37.440 [INFO][4222] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" Dec 13 02:02:37.469773 env[1210]: 2024-12-13 02:02:37.440 [INFO][4222] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" Dec 13 02:02:37.469773 env[1210]: 2024-12-13 02:02:37.459 [INFO][4229] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" HandleID="k8s-pod-network.9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" Workload="localhost-k8s-calico--apiserver--54d647d779--nj76z-eth0" Dec 13 02:02:37.469773 env[1210]: 2024-12-13 02:02:37.459 [INFO][4229] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:02:37.469773 env[1210]: 2024-12-13 02:02:37.459 [INFO][4229] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:02:37.469773 env[1210]: 2024-12-13 02:02:37.465 [WARNING][4229] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" HandleID="k8s-pod-network.9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" Workload="localhost-k8s-calico--apiserver--54d647d779--nj76z-eth0" Dec 13 02:02:37.469773 env[1210]: 2024-12-13 02:02:37.465 [INFO][4229] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" HandleID="k8s-pod-network.9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" Workload="localhost-k8s-calico--apiserver--54d647d779--nj76z-eth0" Dec 13 02:02:37.469773 env[1210]: 2024-12-13 02:02:37.466 [INFO][4229] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:02:37.469773 env[1210]: 2024-12-13 02:02:37.468 [INFO][4222] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87" Dec 13 02:02:37.470379 env[1210]: time="2024-12-13T02:02:37.469803773Z" level=info msg="TearDown network for sandbox \"9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87\" successfully" Dec 13 02:02:37.474154 env[1210]: time="2024-12-13T02:02:37.474033216Z" level=info msg="RemovePodSandbox \"9cb6124d443fa2aa6d634414d8e917398d83c71b3d3ee3bd4492ed38b3e2cc87\" returns successfully" Dec 13 02:02:37.474793 env[1210]: time="2024-12-13T02:02:37.474750632Z" level=info msg="StopPodSandbox for \"3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97\"" Dec 13 02:02:37.545827 env[1210]: 2024-12-13 02:02:37.515 [WARNING][4253] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--575994d967--g56ck-eth0", GenerateName:"calico-kube-controllers-575994d967-", Namespace:"calico-system", SelfLink:"", UID:"29b270ea-60f5-4411-9e9f-50250a3fb95b", ResourceVersion:"957", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 2, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"575994d967", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8ebec7edfd35aea3a1f95bedb42f7281ca1d514a74d565bb7c219acc09224093", Pod:"calico-kube-controllers-575994d967-g56ck", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliad806896af8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:02:37.545827 env[1210]: 2024-12-13 02:02:37.515 [INFO][4253] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" Dec 13 02:02:37.545827 env[1210]: 2024-12-13 02:02:37.515 [INFO][4253] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" iface="eth0" netns="" Dec 13 02:02:37.545827 env[1210]: 2024-12-13 02:02:37.515 [INFO][4253] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" Dec 13 02:02:37.545827 env[1210]: 2024-12-13 02:02:37.515 [INFO][4253] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" Dec 13 02:02:37.545827 env[1210]: 2024-12-13 02:02:37.535 [INFO][4262] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" HandleID="k8s-pod-network.3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" Workload="localhost-k8s-calico--kube--controllers--575994d967--g56ck-eth0" Dec 13 02:02:37.545827 env[1210]: 2024-12-13 02:02:37.535 [INFO][4262] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:02:37.545827 env[1210]: 2024-12-13 02:02:37.535 [INFO][4262] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:02:37.545827 env[1210]: 2024-12-13 02:02:37.541 [WARNING][4262] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" HandleID="k8s-pod-network.3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" Workload="localhost-k8s-calico--kube--controllers--575994d967--g56ck-eth0" Dec 13 02:02:37.545827 env[1210]: 2024-12-13 02:02:37.541 [INFO][4262] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" HandleID="k8s-pod-network.3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" Workload="localhost-k8s-calico--kube--controllers--575994d967--g56ck-eth0" Dec 13 02:02:37.545827 env[1210]: 2024-12-13 02:02:37.542 [INFO][4262] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:02:37.545827 env[1210]: 2024-12-13 02:02:37.544 [INFO][4253] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" Dec 13 02:02:37.546336 env[1210]: time="2024-12-13T02:02:37.545850636Z" level=info msg="TearDown network for sandbox \"3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97\" successfully" Dec 13 02:02:37.546336 env[1210]: time="2024-12-13T02:02:37.545881696Z" level=info msg="StopPodSandbox for \"3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97\" returns successfully" Dec 13 02:02:37.546639 env[1210]: time="2024-12-13T02:02:37.546585735Z" level=info msg="RemovePodSandbox for \"3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97\"" Dec 13 02:02:37.546639 env[1210]: time="2024-12-13T02:02:37.546627805Z" level=info msg="Forcibly stopping sandbox \"3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97\"" Dec 13 02:02:37.611857 env[1210]: 2024-12-13 02:02:37.578 [WARNING][4285] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--575994d967--g56ck-eth0", GenerateName:"calico-kube-controllers-575994d967-", Namespace:"calico-system", SelfLink:"", UID:"29b270ea-60f5-4411-9e9f-50250a3fb95b", ResourceVersion:"957", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 2, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"575994d967", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8ebec7edfd35aea3a1f95bedb42f7281ca1d514a74d565bb7c219acc09224093", Pod:"calico-kube-controllers-575994d967-g56ck", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliad806896af8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:02:37.611857 env[1210]: 2024-12-13 02:02:37.579 [INFO][4285] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" Dec 13 02:02:37.611857 env[1210]: 2024-12-13 02:02:37.579 [INFO][4285] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" iface="eth0" netns="" Dec 13 02:02:37.611857 env[1210]: 2024-12-13 02:02:37.579 [INFO][4285] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" Dec 13 02:02:37.611857 env[1210]: 2024-12-13 02:02:37.579 [INFO][4285] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" Dec 13 02:02:37.611857 env[1210]: 2024-12-13 02:02:37.601 [INFO][4292] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" HandleID="k8s-pod-network.3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" Workload="localhost-k8s-calico--kube--controllers--575994d967--g56ck-eth0" Dec 13 02:02:37.611857 env[1210]: 2024-12-13 02:02:37.601 [INFO][4292] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:02:37.611857 env[1210]: 2024-12-13 02:02:37.601 [INFO][4292] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:02:37.611857 env[1210]: 2024-12-13 02:02:37.606 [WARNING][4292] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" HandleID="k8s-pod-network.3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" Workload="localhost-k8s-calico--kube--controllers--575994d967--g56ck-eth0" Dec 13 02:02:37.611857 env[1210]: 2024-12-13 02:02:37.606 [INFO][4292] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" HandleID="k8s-pod-network.3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" Workload="localhost-k8s-calico--kube--controllers--575994d967--g56ck-eth0" Dec 13 02:02:37.611857 env[1210]: 2024-12-13 02:02:37.607 [INFO][4292] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:02:37.611857 env[1210]: 2024-12-13 02:02:37.609 [INFO][4285] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97" Dec 13 02:02:37.611857 env[1210]: time="2024-12-13T02:02:37.610812571Z" level=info msg="TearDown network for sandbox \"3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97\" successfully" Dec 13 02:02:37.614526 env[1210]: time="2024-12-13T02:02:37.614484397Z" level=info msg="RemovePodSandbox \"3289f4cf8dfe59ccbf6fcae0fd17e1df7eb6954e4892a310367767db213fdc97\" returns successfully" Dec 13 02:02:37.977193 systemd-networkd[1030]: calie7d9ad02d70: Gained IPv6LL Dec 13 02:02:38.041042 kernel: kauditd_printk_skb: 742 callbacks suppressed Dec 13 02:02:38.041195 kernel: audit: type=1130 audit(1734055358.033:1257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.73:22-10.0.0.1:37284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:38.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.73:22-10.0.0.1:37284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:38.034347 systemd[1]: Started sshd@17-10.0.0.73:22-10.0.0.1:37284.service. Dec 13 02:02:38.073000 audit[4300]: USER_ACCT pid=4300 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:38.077000 audit[4300]: CRED_ACQ pid=4300 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:38.078923 sshd[4300]: Accepted publickey for core from 10.0.0.1 port 37284 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:02:38.079202 kernel: audit: type=1101 audit(1734055358.073:1258): pid=4300 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:38.079242 kernel: audit: type=1103 audit(1734055358.077:1259): pid=4300 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:38.079036 sshd[4300]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:02:38.084818 kernel: audit: type=1006 audit(1734055358.077:1260): pid=4300 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Dec 13 02:02:38.084859 kernel: audit: type=1300 audit(1734055358.077:1260): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee8f05110 a2=3 a3=0 items=0 ppid=1 pid=4300 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:38.077000 audit[4300]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee8f05110 a2=3 a3=0 items=0 ppid=1 pid=4300 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:38.088713 kernel: audit: type=1327 audit(1734055358.077:1260): proctitle=737368643A20636F7265205B707269765D Dec 13 02:02:38.077000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:02:38.093944 systemd-logind[1189]: New session 18 of user core. Dec 13 02:02:38.094710 systemd[1]: Started session-18.scope. Dec 13 02:02:38.100000 audit[4300]: USER_START pid=4300 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:38.102000 audit[4304]: CRED_ACQ pid=4304 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:38.110309 kernel: audit: type=1105 audit(1734055358.100:1261): pid=4300 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:38.110376 kernel: audit: type=1103 audit(1734055358.102:1262): pid=4304 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:38.216346 sshd[4300]: pam_unix(sshd:session): session closed for user core Dec 13 02:02:38.216000 audit[4300]: USER_END pid=4300 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:38.219106 systemd[1]: sshd@17-10.0.0.73:22-10.0.0.1:37284.service: Deactivated successfully. Dec 13 02:02:38.219882 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 02:02:38.220650 systemd-logind[1189]: Session 18 logged out. Waiting for processes to exit. Dec 13 02:02:38.221536 systemd-logind[1189]: Removed session 18. Dec 13 02:02:38.216000 audit[4300]: CRED_DISP pid=4300 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:38.225464 kernel: audit: type=1106 audit(1734055358.216:1263): pid=4300 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:38.225523 kernel: audit: type=1104 audit(1734055358.216:1264): pid=4300 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:38.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.73:22-10.0.0.1:37284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:38.341000 audit[1902]: AVC avc: denied { watch } for pid=1902 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c385,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:02:38.341000 audit[1902]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002a7c5e0 a2=fc6 a3=0 items=0 ppid=1760 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c385,c612 key=(null) Dec 13 02:02:38.341000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:02:38.341000 audit[1902]: AVC avc: denied { watch } for pid=1902 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c385,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:02:38.341000 audit[1902]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002ae1000 a2=fc6 a3=0 items=0 ppid=1760 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c385,c612 key=(null) Dec 13 02:02:38.341000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:02:38.341000 audit[1902]: AVC avc: denied { watch } for pid=1902 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c385,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:02:38.341000 audit[1902]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002a7c600 a2=fc6 a3=0 items=0 ppid=1760 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c385,c612 key=(null) Dec 13 02:02:38.341000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:02:38.343000 audit[1902]: AVC avc: denied { watch } for pid=1902 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c385,c612 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 02:02:38.343000 audit[1902]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002a7c620 a2=fc6 a3=0 items=0 ppid=1760 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c385,c612 key=(null) Dec 13 02:02:38.343000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 02:02:38.520182 env[1210]: time="2024-12-13T02:02:38.520106121Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:38.522671 env[1210]: time="2024-12-13T02:02:38.522619746Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:38.528344 env[1210]: time="2024-12-13T02:02:38.528301188Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:38.530413 env[1210]: time="2024-12-13T02:02:38.530361063Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:38.530865 env[1210]: time="2024-12-13T02:02:38.530826274Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 02:02:38.531598 env[1210]: time="2024-12-13T02:02:38.531570139Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 02:02:38.532697 env[1210]: time="2024-12-13T02:02:38.532654215Z" level=info msg="CreateContainer within sandbox \"5e74d8991bc8be7630648260709c44be3bd2e28b49c3b3792cb922a72b80fb91\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 02:02:38.546874 env[1210]: time="2024-12-13T02:02:38.546799219Z" level=info msg="CreateContainer within sandbox \"5e74d8991bc8be7630648260709c44be3bd2e28b49c3b3792cb922a72b80fb91\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"027d8e1721c44eaf5e77407fe9310ea34b61b6d6cc3d31870792954cfaba2da2\"" Dec 13 02:02:38.547564 env[1210]: time="2024-12-13T02:02:38.547515821Z" level=info msg="StartContainer for \"027d8e1721c44eaf5e77407fe9310ea34b61b6d6cc3d31870792954cfaba2da2\"" Dec 13 02:02:38.569229 systemd[1]: Started cri-containerd-027d8e1721c44eaf5e77407fe9310ea34b61b6d6cc3d31870792954cfaba2da2.scope. Dec 13 02:02:38.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.578000 audit: BPF prog-id=174 op=LOAD Dec 13 02:02:38.579000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.579000 audit[4326]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3915 pid=4326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:38.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032376438653137323163343465616635653737343037666539333130 Dec 13 02:02:38.579000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.579000 audit[4326]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3915 pid=4326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:38.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032376438653137323163343465616635653737343037666539333130 Dec 13 02:02:38.579000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.579000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.579000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.579000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.579000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.579000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.579000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.579000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.579000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.579000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.579000 audit: BPF prog-id=175 op=LOAD Dec 13 02:02:38.579000 audit[4326]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000325960 items=0 ppid=3915 pid=4326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:38.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032376438653137323163343465616635653737343037666539333130 Dec 13 02:02:38.579000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.579000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.579000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.579000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.579000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.579000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.579000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.579000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.579000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.579000 audit: BPF prog-id=176 op=LOAD Dec 13 02:02:38.579000 audit[4326]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003259a8 items=0 ppid=3915 pid=4326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:38.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032376438653137323163343465616635653737343037666539333130 Dec 13 02:02:38.579000 audit: BPF prog-id=176 op=UNLOAD Dec 13 02:02:38.579000 audit: BPF prog-id=175 op=UNLOAD Dec 13 02:02:38.579000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.579000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.579000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.579000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.579000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.579000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.579000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.579000 audit[4326]: AVC avc: denied { perfmon } for pid=4326 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.579000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.579000 audit[4326]: AVC avc: denied { bpf } for pid=4326 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:38.579000 audit: BPF prog-id=177 op=LOAD Dec 13 02:02:38.579000 audit[4326]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000325db8 items=0 ppid=3915 pid=4326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:38.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032376438653137323163343465616635653737343037666539333130 Dec 13 02:02:38.607399 env[1210]: time="2024-12-13T02:02:38.607256327Z" level=info msg="StartContainer for \"027d8e1721c44eaf5e77407fe9310ea34b61b6d6cc3d31870792954cfaba2da2\" returns successfully" Dec 13 02:02:39.028000 audit[4356]: NETFILTER_CFG table=filter:104 family=2 entries=16 op=nft_register_rule pid=4356 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:02:39.028000 audit[4356]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fffe2186350 a2=0 a3=7fffe218633c items=0 ppid=2244 pid=4356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:39.028000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:02:39.033000 audit[4356]: NETFILTER_CFG table=nat:105 family=2 entries=14 op=nft_register_rule pid=4356 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:02:39.033000 audit[4356]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fffe2186350 a2=0 a3=0 items=0 ppid=2244 pid=4356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:39.033000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:02:39.388000 audit[4336]: AVC avc: denied { watch } for pid=4336 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_02_18.2787096300/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c97,c186 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c97,c186 tclass=file permissive=0 Dec 13 02:02:39.388000 audit[4336]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0009e10e0 a2=fc6 a3=0 items=0 ppid=3915 pid=4336 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c97,c186 key=(null) Dec 13 02:02:39.388000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:02:40.006253 kubelet[2064]: I1213 02:02:40.006216 2064 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 02:02:40.226710 env[1210]: time="2024-12-13T02:02:40.226650405Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:40.229325 env[1210]: time="2024-12-13T02:02:40.229280790Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:40.230926 env[1210]: time="2024-12-13T02:02:40.230886313Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:40.232416 env[1210]: time="2024-12-13T02:02:40.232376686Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:40.232879 env[1210]: time="2024-12-13T02:02:40.232848138Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 02:02:40.234495 env[1210]: time="2024-12-13T02:02:40.234465183Z" level=info msg="CreateContainer within sandbox \"6aa5a7273c6fde45a2688f03c9f39d78b8154f3aeb0a349cf16713df60cdfa26\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 02:02:40.259906 env[1210]: time="2024-12-13T02:02:40.259807548Z" level=info msg="CreateContainer within sandbox \"6aa5a7273c6fde45a2688f03c9f39d78b8154f3aeb0a349cf16713df60cdfa26\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"30240bed62c270404d7cf06af5721182d8ca8720c987423f75786eeee642c18a\"" Dec 13 02:02:40.261121 env[1210]: time="2024-12-13T02:02:40.261092698Z" level=info msg="StartContainer for \"30240bed62c270404d7cf06af5721182d8ca8720c987423f75786eeee642c18a\"" Dec 13 02:02:40.281039 systemd[1]: Started cri-containerd-30240bed62c270404d7cf06af5721182d8ca8720c987423f75786eeee642c18a.scope. Dec 13 02:02:40.291000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:40.291000 audit[4365]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f555e77e4d8 items=0 ppid=4062 pid=4365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:40.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330323430626564363263323730343034643763663036616635373231 Dec 13 02:02:40.291000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:40.291000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:40.291000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:40.291000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:40.291000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:40.291000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:40.291000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:40.291000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:40.291000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:40.291000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:40.291000 audit: BPF prog-id=178 op=LOAD Dec 13 02:02:40.291000 audit[4365]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00021e6a8 items=0 ppid=4062 pid=4365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:40.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330323430626564363263323730343034643763663036616635373231 Dec 13 02:02:40.291000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:40.291000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:40.291000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:40.291000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:40.291000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:40.291000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:40.291000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:40.291000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:40.291000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:40.291000 audit: BPF prog-id=179 op=LOAD Dec 13 02:02:40.291000 audit[4365]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00021e6f8 items=0 ppid=4062 pid=4365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:40.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330323430626564363263323730343034643763663036616635373231 Dec 13 02:02:40.292000 audit: BPF prog-id=179 op=UNLOAD Dec 13 02:02:40.292000 audit: BPF prog-id=178 op=UNLOAD Dec 13 02:02:40.292000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:40.292000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:40.292000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:40.292000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:40.292000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:40.292000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:40.292000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:40.292000 audit[4365]: AVC avc: denied { perfmon } for pid=4365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:40.292000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:40.292000 audit[4365]: AVC avc: denied { bpf } for pid=4365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:40.292000 audit: BPF prog-id=180 op=LOAD Dec 13 02:02:40.292000 audit[4365]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00021e788 items=0 ppid=4062 pid=4365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:40.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330323430626564363263323730343034643763663036616635373231 Dec 13 02:02:40.304785 env[1210]: time="2024-12-13T02:02:40.304741483Z" level=info msg="StartContainer for \"30240bed62c270404d7cf06af5721182d8ca8720c987423f75786eeee642c18a\" returns successfully" Dec 13 02:02:40.306559 env[1210]: time="2024-12-13T02:02:40.306534024Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 02:02:41.032749 kubelet[2064]: I1213 02:02:41.032700 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-54d647d779-nj76z" podStartSLOduration=36.532987315 podStartE2EDuration="41.032654076s" podCreationTimestamp="2024-12-13 02:02:00 +0000 UTC" firstStartedPulling="2024-12-13 02:02:34.03162764 +0000 UTC m=+57.336945835" lastFinishedPulling="2024-12-13 02:02:38.531294381 +0000 UTC m=+61.836612596" observedRunningTime="2024-12-13 02:02:39.015989349 +0000 UTC m=+62.321307544" watchObservedRunningTime="2024-12-13 02:02:41.032654076 +0000 UTC m=+64.337972271" Dec 13 02:02:41.045000 audit[4397]: NETFILTER_CFG table=filter:106 family=2 entries=15 op=nft_register_rule pid=4397 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:02:41.045000 audit[4397]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffeea1c6270 a2=0 a3=7ffeea1c625c items=0 ppid=2244 pid=4397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:41.045000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:02:41.050000 audit[4397]: NETFILTER_CFG table=nat:107 family=2 entries=21 op=nft_register_chain pid=4397 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:02:41.050000 audit[4397]: SYSCALL arch=c000003e syscall=46 success=yes exit=7044 a0=3 a1=7ffeea1c6270 a2=0 a3=7ffeea1c625c items=0 ppid=2244 pid=4397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:41.050000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:02:41.794480 env[1210]: time="2024-12-13T02:02:41.794430447Z" level=info msg="StopPodSandbox for \"fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2\"" Dec 13 02:02:41.871354 env[1210]: 2024-12-13 02:02:41.837 [INFO][4415] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2" Dec 13 02:02:41.871354 env[1210]: 2024-12-13 02:02:41.838 [INFO][4415] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2" iface="eth0" netns="/var/run/netns/cni-caf69f93-e400-ae5b-fb11-08664bd1c9a3" Dec 13 02:02:41.871354 env[1210]: 2024-12-13 02:02:41.838 [INFO][4415] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2" iface="eth0" netns="/var/run/netns/cni-caf69f93-e400-ae5b-fb11-08664bd1c9a3" Dec 13 02:02:41.871354 env[1210]: 2024-12-13 02:02:41.838 [INFO][4415] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2" iface="eth0" netns="/var/run/netns/cni-caf69f93-e400-ae5b-fb11-08664bd1c9a3" Dec 13 02:02:41.871354 env[1210]: 2024-12-13 02:02:41.838 [INFO][4415] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2" Dec 13 02:02:41.871354 env[1210]: 2024-12-13 02:02:41.838 [INFO][4415] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2" Dec 13 02:02:41.871354 env[1210]: 2024-12-13 02:02:41.860 [INFO][4423] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2" HandleID="k8s-pod-network.fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2" Workload="localhost-k8s-coredns--76f75df574--x45b5-eth0" Dec 13 02:02:41.871354 env[1210]: 2024-12-13 02:02:41.860 [INFO][4423] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:02:41.871354 env[1210]: 2024-12-13 02:02:41.860 [INFO][4423] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:02:41.871354 env[1210]: 2024-12-13 02:02:41.866 [WARNING][4423] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2" HandleID="k8s-pod-network.fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2" Workload="localhost-k8s-coredns--76f75df574--x45b5-eth0" Dec 13 02:02:41.871354 env[1210]: 2024-12-13 02:02:41.866 [INFO][4423] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2" HandleID="k8s-pod-network.fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2" Workload="localhost-k8s-coredns--76f75df574--x45b5-eth0" Dec 13 02:02:41.871354 env[1210]: 2024-12-13 02:02:41.868 [INFO][4423] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:02:41.871354 env[1210]: 2024-12-13 02:02:41.869 [INFO][4415] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2" Dec 13 02:02:41.872479 env[1210]: time="2024-12-13T02:02:41.872438264Z" level=info msg="TearDown network for sandbox \"fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2\" successfully" Dec 13 02:02:41.872582 env[1210]: time="2024-12-13T02:02:41.872557553Z" level=info msg="StopPodSandbox for \"fa83d9a2f22cf99c024d1b3370b2e97a096f412a671c6d5a34b7eb2e87d16cf2\" returns successfully" Dec 13 02:02:41.873003 kubelet[2064]: E1213 02:02:41.872971 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:02:41.874203 env[1210]: time="2024-12-13T02:02:41.873671644Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-x45b5,Uid:e29c8a77-070d-4285-9177-8eb0d1821236,Namespace:kube-system,Attempt:1,}" Dec 13 02:02:41.875341 systemd[1]: run-netns-cni\x2dcaf69f93\x2de400\x2dae5b\x2dfb11\x2d08664bd1c9a3.mount: Deactivated successfully. Dec 13 02:02:42.466611 systemd-networkd[1030]: calib3b94f80c90: Link UP Dec 13 02:02:42.469643 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 02:02:42.469729 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib3b94f80c90: link becomes ready Dec 13 02:02:42.469838 systemd-networkd[1030]: calib3b94f80c90: Gained carrier Dec 13 02:02:42.483196 env[1210]: 2024-12-13 02:02:42.334 [INFO][4431] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--76f75df574--x45b5-eth0 coredns-76f75df574- kube-system e29c8a77-070d-4285-9177-8eb0d1821236 1000 0 2024-12-13 02:01:52 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-76f75df574-x45b5 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calib3b94f80c90 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="8e7bd804f61e4674a6143cfa07519cc6589bfc10fa24f14f5c2da0254c22528c" Namespace="kube-system" Pod="coredns-76f75df574-x45b5" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--x45b5-" Dec 13 02:02:42.483196 env[1210]: 2024-12-13 02:02:42.334 [INFO][4431] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="8e7bd804f61e4674a6143cfa07519cc6589bfc10fa24f14f5c2da0254c22528c" Namespace="kube-system" Pod="coredns-76f75df574-x45b5" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--x45b5-eth0" Dec 13 02:02:42.483196 env[1210]: 2024-12-13 02:02:42.358 [INFO][4444] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8e7bd804f61e4674a6143cfa07519cc6589bfc10fa24f14f5c2da0254c22528c" HandleID="k8s-pod-network.8e7bd804f61e4674a6143cfa07519cc6589bfc10fa24f14f5c2da0254c22528c" Workload="localhost-k8s-coredns--76f75df574--x45b5-eth0" Dec 13 02:02:42.483196 env[1210]: 2024-12-13 02:02:42.364 [INFO][4444] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8e7bd804f61e4674a6143cfa07519cc6589bfc10fa24f14f5c2da0254c22528c" HandleID="k8s-pod-network.8e7bd804f61e4674a6143cfa07519cc6589bfc10fa24f14f5c2da0254c22528c" Workload="localhost-k8s-coredns--76f75df574--x45b5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000600090), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-76f75df574-x45b5", "timestamp":"2024-12-13 02:02:42.358035921 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:02:42.483196 env[1210]: 2024-12-13 02:02:42.364 [INFO][4444] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:02:42.483196 env[1210]: 2024-12-13 02:02:42.364 [INFO][4444] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:02:42.483196 env[1210]: 2024-12-13 02:02:42.364 [INFO][4444] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 02:02:42.483196 env[1210]: 2024-12-13 02:02:42.365 [INFO][4444] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8e7bd804f61e4674a6143cfa07519cc6589bfc10fa24f14f5c2da0254c22528c" host="localhost" Dec 13 02:02:42.483196 env[1210]: 2024-12-13 02:02:42.368 [INFO][4444] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 02:02:42.483196 env[1210]: 2024-12-13 02:02:42.372 [INFO][4444] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 02:02:42.483196 env[1210]: 2024-12-13 02:02:42.373 [INFO][4444] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 02:02:42.483196 env[1210]: 2024-12-13 02:02:42.375 [INFO][4444] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 02:02:42.483196 env[1210]: 2024-12-13 02:02:42.375 [INFO][4444] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.8e7bd804f61e4674a6143cfa07519cc6589bfc10fa24f14f5c2da0254c22528c" host="localhost" Dec 13 02:02:42.483196 env[1210]: 2024-12-13 02:02:42.376 [INFO][4444] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.8e7bd804f61e4674a6143cfa07519cc6589bfc10fa24f14f5c2da0254c22528c Dec 13 02:02:42.483196 env[1210]: 2024-12-13 02:02:42.442 [INFO][4444] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.8e7bd804f61e4674a6143cfa07519cc6589bfc10fa24f14f5c2da0254c22528c" host="localhost" Dec 13 02:02:42.483196 env[1210]: 2024-12-13 02:02:42.462 [INFO][4444] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.8e7bd804f61e4674a6143cfa07519cc6589bfc10fa24f14f5c2da0254c22528c" host="localhost" Dec 13 02:02:42.483196 env[1210]: 2024-12-13 02:02:42.462 [INFO][4444] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.8e7bd804f61e4674a6143cfa07519cc6589bfc10fa24f14f5c2da0254c22528c" host="localhost" Dec 13 02:02:42.483196 env[1210]: 2024-12-13 02:02:42.462 [INFO][4444] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:02:42.483196 env[1210]: 2024-12-13 02:02:42.462 [INFO][4444] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="8e7bd804f61e4674a6143cfa07519cc6589bfc10fa24f14f5c2da0254c22528c" HandleID="k8s-pod-network.8e7bd804f61e4674a6143cfa07519cc6589bfc10fa24f14f5c2da0254c22528c" Workload="localhost-k8s-coredns--76f75df574--x45b5-eth0" Dec 13 02:02:42.484554 env[1210]: 2024-12-13 02:02:42.464 [INFO][4431] cni-plugin/k8s.go 386: Populated endpoint ContainerID="8e7bd804f61e4674a6143cfa07519cc6589bfc10fa24f14f5c2da0254c22528c" Namespace="kube-system" Pod="coredns-76f75df574-x45b5" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--x45b5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--x45b5-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"e29c8a77-070d-4285-9177-8eb0d1821236", ResourceVersion:"1000", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 1, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-76f75df574-x45b5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib3b94f80c90", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:02:42.484554 env[1210]: 2024-12-13 02:02:42.464 [INFO][4431] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="8e7bd804f61e4674a6143cfa07519cc6589bfc10fa24f14f5c2da0254c22528c" Namespace="kube-system" Pod="coredns-76f75df574-x45b5" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--x45b5-eth0" Dec 13 02:02:42.484554 env[1210]: 2024-12-13 02:02:42.464 [INFO][4431] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib3b94f80c90 ContainerID="8e7bd804f61e4674a6143cfa07519cc6589bfc10fa24f14f5c2da0254c22528c" Namespace="kube-system" Pod="coredns-76f75df574-x45b5" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--x45b5-eth0" Dec 13 02:02:42.484554 env[1210]: 2024-12-13 02:02:42.470 [INFO][4431] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8e7bd804f61e4674a6143cfa07519cc6589bfc10fa24f14f5c2da0254c22528c" Namespace="kube-system" Pod="coredns-76f75df574-x45b5" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--x45b5-eth0" Dec 13 02:02:42.484554 env[1210]: 2024-12-13 02:02:42.470 [INFO][4431] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="8e7bd804f61e4674a6143cfa07519cc6589bfc10fa24f14f5c2da0254c22528c" Namespace="kube-system" Pod="coredns-76f75df574-x45b5" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--x45b5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--x45b5-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"e29c8a77-070d-4285-9177-8eb0d1821236", ResourceVersion:"1000", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 1, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8e7bd804f61e4674a6143cfa07519cc6589bfc10fa24f14f5c2da0254c22528c", Pod:"coredns-76f75df574-x45b5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib3b94f80c90", MAC:"e2:31:88:44:97:5b", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:02:42.484554 env[1210]: 2024-12-13 02:02:42.480 [INFO][4431] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="8e7bd804f61e4674a6143cfa07519cc6589bfc10fa24f14f5c2da0254c22528c" Namespace="kube-system" Pod="coredns-76f75df574-x45b5" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--x45b5-eth0" Dec 13 02:02:42.489000 audit[4462]: NETFILTER_CFG table=filter:108 family=2 entries=46 op=nft_register_chain pid=4462 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:02:42.489000 audit[4462]: SYSCALL arch=c000003e syscall=46 success=yes exit=22712 a0=3 a1=7ffe87a21f90 a2=0 a3=7ffe87a21f7c items=0 ppid=3497 pid=4462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:42.489000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:02:42.500475 env[1210]: time="2024-12-13T02:02:42.500423789Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:02:42.500475 env[1210]: time="2024-12-13T02:02:42.500456513Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:02:42.500475 env[1210]: time="2024-12-13T02:02:42.500466341Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:02:42.500709 env[1210]: time="2024-12-13T02:02:42.500563978Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8e7bd804f61e4674a6143cfa07519cc6589bfc10fa24f14f5c2da0254c22528c pid=4476 runtime=io.containerd.runc.v2 Dec 13 02:02:42.511341 env[1210]: time="2024-12-13T02:02:42.511303169Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:42.511840 systemd[1]: Started cri-containerd-8e7bd804f61e4674a6143cfa07519cc6589bfc10fa24f14f5c2da0254c22528c.scope. Dec 13 02:02:42.514947 env[1210]: time="2024-12-13T02:02:42.514907213Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:42.517897 env[1210]: time="2024-12-13T02:02:42.517875701Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:42.519824 env[1210]: time="2024-12-13T02:02:42.519806073Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 02:02:42.520539 env[1210]: time="2024-12-13T02:02:42.520256364Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 02:02:42.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.520000 audit: BPF prog-id=181 op=LOAD Dec 13 02:02:42.521000 audit[4485]: AVC avc: denied { bpf } for pid=4485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.521000 audit[4485]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4476 pid=4485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:42.521000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865376264383034663631653436373461363134336366613037353139 Dec 13 02:02:42.521000 audit[4485]: AVC avc: denied { perfmon } for pid=4485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.521000 audit[4485]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4476 pid=4485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:42.521000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865376264383034663631653436373461363134336366613037353139 Dec 13 02:02:42.522000 audit[4485]: AVC avc: denied { bpf } for pid=4485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.522000 audit[4485]: AVC avc: denied { bpf } for pid=4485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.522000 audit[4485]: AVC avc: denied { bpf } for pid=4485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.522000 audit[4485]: AVC avc: denied { perfmon } for pid=4485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.522000 audit[4485]: AVC avc: denied { perfmon } for pid=4485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.522000 audit[4485]: AVC avc: denied { perfmon } for pid=4485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.522000 audit[4485]: AVC avc: denied { perfmon } for pid=4485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.522000 audit[4485]: AVC avc: denied { perfmon } for pid=4485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.522000 audit[4485]: AVC avc: denied { bpf } for pid=4485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.523460 env[1210]: time="2024-12-13T02:02:42.523317428Z" level=info msg="CreateContainer within sandbox \"6aa5a7273c6fde45a2688f03c9f39d78b8154f3aeb0a349cf16713df60cdfa26\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 02:02:42.522000 audit[4485]: AVC avc: denied { bpf } for pid=4485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.522000 audit: BPF prog-id=182 op=LOAD Dec 13 02:02:42.522000 audit[4485]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000024390 items=0 ppid=4476 pid=4485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:42.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865376264383034663631653436373461363134336366613037353139 Dec 13 02:02:42.522000 audit[4485]: AVC avc: denied { bpf } for pid=4485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.522000 audit[4485]: AVC avc: denied { bpf } for pid=4485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.522000 audit[4485]: AVC avc: denied { perfmon } for pid=4485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.522000 audit[4485]: AVC avc: denied { perfmon } for pid=4485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.522000 audit[4485]: AVC avc: denied { perfmon } for pid=4485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.522000 audit[4485]: AVC avc: denied { perfmon } for pid=4485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.522000 audit[4485]: AVC avc: denied { perfmon } for pid=4485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.522000 audit[4485]: AVC avc: denied { bpf } for pid=4485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.522000 audit[4485]: AVC avc: denied { bpf } for pid=4485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.522000 audit: BPF prog-id=183 op=LOAD Dec 13 02:02:42.522000 audit[4485]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000243d8 items=0 ppid=4476 pid=4485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:42.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865376264383034663631653436373461363134336366613037353139 Dec 13 02:02:42.523000 audit: BPF prog-id=183 op=UNLOAD Dec 13 02:02:42.523000 audit: BPF prog-id=182 op=UNLOAD Dec 13 02:02:42.523000 audit[4485]: AVC avc: denied { bpf } for pid=4485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.523000 audit[4485]: AVC avc: denied { bpf } for pid=4485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.523000 audit[4485]: AVC avc: denied { bpf } for pid=4485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.523000 audit[4485]: AVC avc: denied { perfmon } for pid=4485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.523000 audit[4485]: AVC avc: denied { perfmon } for pid=4485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.523000 audit[4485]: AVC avc: denied { perfmon } for pid=4485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.523000 audit[4485]: AVC avc: denied { perfmon } for pid=4485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.523000 audit[4485]: AVC avc: denied { perfmon } for pid=4485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.523000 audit[4485]: AVC avc: denied { bpf } for pid=4485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.523000 audit[4485]: AVC avc: denied { bpf } for pid=4485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.523000 audit: BPF prog-id=184 op=LOAD Dec 13 02:02:42.523000 audit[4485]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000247e8 items=0 ppid=4476 pid=4485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:42.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865376264383034663631653436373461363134336366613037353139 Dec 13 02:02:42.525805 systemd-resolved[1146]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:02:42.538679 env[1210]: time="2024-12-13T02:02:42.538640548Z" level=info msg="CreateContainer within sandbox \"6aa5a7273c6fde45a2688f03c9f39d78b8154f3aeb0a349cf16713df60cdfa26\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"dfd9a5883231e5a7d9304f50e4b6fc671aa759c334c01a00c04ee0c2152570d7\"" Dec 13 02:02:42.539291 env[1210]: time="2024-12-13T02:02:42.539273388Z" level=info msg="StartContainer for \"dfd9a5883231e5a7d9304f50e4b6fc671aa759c334c01a00c04ee0c2152570d7\"" Dec 13 02:02:42.548708 env[1210]: time="2024-12-13T02:02:42.548666153Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-x45b5,Uid:e29c8a77-070d-4285-9177-8eb0d1821236,Namespace:kube-system,Attempt:1,} returns sandbox id \"8e7bd804f61e4674a6143cfa07519cc6589bfc10fa24f14f5c2da0254c22528c\"" Dec 13 02:02:42.549511 kubelet[2064]: E1213 02:02:42.549488 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:02:42.553217 env[1210]: time="2024-12-13T02:02:42.553175439Z" level=info msg="CreateContainer within sandbox \"8e7bd804f61e4674a6143cfa07519cc6589bfc10fa24f14f5c2da0254c22528c\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 02:02:42.554400 systemd[1]: Started cri-containerd-dfd9a5883231e5a7d9304f50e4b6fc671aa759c334c01a00c04ee0c2152570d7.scope. Dec 13 02:02:42.569000 audit[4517]: AVC avc: denied { perfmon } for pid=4517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.569000 audit[4517]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7fab7950cad8 items=0 ppid=4062 pid=4517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:42.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466643961353838333233316535613764393330346635306534623666 Dec 13 02:02:42.569000 audit[4517]: AVC avc: denied { bpf } for pid=4517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.569000 audit[4517]: AVC avc: denied { bpf } for pid=4517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.569000 audit[4517]: AVC avc: denied { bpf } for pid=4517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.569000 audit[4517]: AVC avc: denied { perfmon } for pid=4517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.569000 audit[4517]: AVC avc: denied { perfmon } for pid=4517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.569000 audit[4517]: AVC avc: denied { perfmon } for pid=4517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.569000 audit[4517]: AVC avc: denied { perfmon } for pid=4517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.569000 audit[4517]: AVC avc: denied { perfmon } for pid=4517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.569000 audit[4517]: AVC avc: denied { bpf } for pid=4517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.569000 audit[4517]: AVC avc: denied { bpf } for pid=4517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.569000 audit: BPF prog-id=185 op=LOAD Dec 13 02:02:42.569000 audit[4517]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0001b6f68 items=0 ppid=4062 pid=4517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:42.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466643961353838333233316535613764393330346635306534623666 Dec 13 02:02:42.569000 audit[4517]: AVC avc: denied { bpf } for pid=4517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.569000 audit[4517]: AVC avc: denied { bpf } for pid=4517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.569000 audit[4517]: AVC avc: denied { perfmon } for pid=4517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.569000 audit[4517]: AVC avc: denied { perfmon } for pid=4517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.569000 audit[4517]: AVC avc: denied { perfmon } for pid=4517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.569000 audit[4517]: AVC avc: denied { perfmon } for pid=4517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.569000 audit[4517]: AVC avc: denied { perfmon } for pid=4517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.569000 audit[4517]: AVC avc: denied { bpf } for pid=4517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.569000 audit[4517]: AVC avc: denied { bpf } for pid=4517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.569000 audit: BPF prog-id=186 op=LOAD Dec 13 02:02:42.569000 audit[4517]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0001b6fb8 items=0 ppid=4062 pid=4517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:42.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466643961353838333233316535613764393330346635306534623666 Dec 13 02:02:42.569000 audit: BPF prog-id=186 op=UNLOAD Dec 13 02:02:42.569000 audit: BPF prog-id=185 op=UNLOAD Dec 13 02:02:42.569000 audit[4517]: AVC avc: denied { bpf } for pid=4517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.569000 audit[4517]: AVC avc: denied { bpf } for pid=4517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.569000 audit[4517]: AVC avc: denied { bpf } for pid=4517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.569000 audit[4517]: AVC avc: denied { perfmon } for pid=4517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.569000 audit[4517]: AVC avc: denied { perfmon } for pid=4517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.569000 audit[4517]: AVC avc: denied { perfmon } for pid=4517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.569000 audit[4517]: AVC avc: denied { perfmon } for pid=4517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.569000 audit[4517]: AVC avc: denied { perfmon } for pid=4517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.569000 audit[4517]: AVC avc: denied { bpf } for pid=4517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.569000 audit[4517]: AVC avc: denied { bpf } for pid=4517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.569000 audit: BPF prog-id=187 op=LOAD Dec 13 02:02:42.569000 audit[4517]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0001b7048 items=0 ppid=4062 pid=4517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:42.569000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466643961353838333233316535613764393330346635306534623666 Dec 13 02:02:42.572084 env[1210]: time="2024-12-13T02:02:42.570905862Z" level=info msg="CreateContainer within sandbox \"8e7bd804f61e4674a6143cfa07519cc6589bfc10fa24f14f5c2da0254c22528c\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"247b49657ce864b30091f8bbb7c8fbfa7db1d8131a05e98bba9ed545ffaa5803\"" Dec 13 02:02:42.572287 env[1210]: time="2024-12-13T02:02:42.572249302Z" level=info msg="StartContainer for \"247b49657ce864b30091f8bbb7c8fbfa7db1d8131a05e98bba9ed545ffaa5803\"" Dec 13 02:02:42.588752 systemd[1]: Started cri-containerd-247b49657ce864b30091f8bbb7c8fbfa7db1d8131a05e98bba9ed545ffaa5803.scope. Dec 13 02:02:42.634939 env[1210]: time="2024-12-13T02:02:42.634887942Z" level=info msg="StartContainer for \"dfd9a5883231e5a7d9304f50e4b6fc671aa759c334c01a00c04ee0c2152570d7\" returns successfully" Dec 13 02:02:42.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.636000 audit: BPF prog-id=188 op=LOAD Dec 13 02:02:42.637000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.637000 audit[4544]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4476 pid=4544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:42.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234376234393635376365383634623330303931663862626237633866 Dec 13 02:02:42.637000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.637000 audit[4544]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4476 pid=4544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:42.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234376234393635376365383634623330303931663862626237633866 Dec 13 02:02:42.637000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.637000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.637000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.637000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.637000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.637000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.637000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.637000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.637000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.637000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.637000 audit: BPF prog-id=189 op=LOAD Dec 13 02:02:42.637000 audit[4544]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000108cc0 items=0 ppid=4476 pid=4544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:42.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234376234393635376365383634623330303931663862626237633866 Dec 13 02:02:42.637000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.637000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.637000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.637000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.637000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.637000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.637000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.637000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.637000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.637000 audit: BPF prog-id=190 op=LOAD Dec 13 02:02:42.637000 audit[4544]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000108d08 items=0 ppid=4476 pid=4544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:42.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234376234393635376365383634623330303931663862626237633866 Dec 13 02:02:42.637000 audit: BPF prog-id=190 op=UNLOAD Dec 13 02:02:42.637000 audit: BPF prog-id=189 op=UNLOAD Dec 13 02:02:42.637000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.637000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.637000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.637000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.637000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.637000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.637000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.637000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.637000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.637000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:42.637000 audit: BPF prog-id=191 op=LOAD Dec 13 02:02:42.637000 audit[4544]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000109118 items=0 ppid=4476 pid=4544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:42.637000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234376234393635376365383634623330303931663862626237633866 Dec 13 02:02:42.650624 env[1210]: time="2024-12-13T02:02:42.650590246Z" level=info msg="StartContainer for \"247b49657ce864b30091f8bbb7c8fbfa7db1d8131a05e98bba9ed545ffaa5803\" returns successfully" Dec 13 02:02:42.792452 env[1210]: time="2024-12-13T02:02:42.792339674Z" level=info msg="StopPodSandbox for \"8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b\"" Dec 13 02:02:42.793028 env[1210]: time="2024-12-13T02:02:42.792468451Z" level=info msg="StopPodSandbox for \"09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea\"" Dec 13 02:02:42.869895 kubelet[2064]: I1213 02:02:42.869760 2064 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 02:02:42.870761 kubelet[2064]: I1213 02:02:42.870746 2064 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 02:02:42.871824 env[1210]: 2024-12-13 02:02:42.839 [INFO][4618] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b" Dec 13 02:02:42.871824 env[1210]: 2024-12-13 02:02:42.839 [INFO][4618] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b" iface="eth0" netns="/var/run/netns/cni-d18d89e3-57c8-c635-524c-e4755cdbb688" Dec 13 02:02:42.871824 env[1210]: 2024-12-13 02:02:42.839 [INFO][4618] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b" iface="eth0" netns="/var/run/netns/cni-d18d89e3-57c8-c635-524c-e4755cdbb688" Dec 13 02:02:42.871824 env[1210]: 2024-12-13 02:02:42.839 [INFO][4618] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b" iface="eth0" netns="/var/run/netns/cni-d18d89e3-57c8-c635-524c-e4755cdbb688" Dec 13 02:02:42.871824 env[1210]: 2024-12-13 02:02:42.840 [INFO][4618] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b" Dec 13 02:02:42.871824 env[1210]: 2024-12-13 02:02:42.840 [INFO][4618] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b" Dec 13 02:02:42.871824 env[1210]: 2024-12-13 02:02:42.860 [INFO][4638] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b" HandleID="k8s-pod-network.8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b" Workload="localhost-k8s-calico--apiserver--54d647d779--f9rwt-eth0" Dec 13 02:02:42.871824 env[1210]: 2024-12-13 02:02:42.860 [INFO][4638] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:02:42.871824 env[1210]: 2024-12-13 02:02:42.860 [INFO][4638] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:02:42.871824 env[1210]: 2024-12-13 02:02:42.866 [WARNING][4638] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b" HandleID="k8s-pod-network.8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b" Workload="localhost-k8s-calico--apiserver--54d647d779--f9rwt-eth0" Dec 13 02:02:42.871824 env[1210]: 2024-12-13 02:02:42.866 [INFO][4638] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b" HandleID="k8s-pod-network.8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b" Workload="localhost-k8s-calico--apiserver--54d647d779--f9rwt-eth0" Dec 13 02:02:42.871824 env[1210]: 2024-12-13 02:02:42.867 [INFO][4638] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:02:42.871824 env[1210]: 2024-12-13 02:02:42.869 [INFO][4618] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b" Dec 13 02:02:42.877211 systemd[1]: run-netns-cni\x2dd18d89e3\x2d57c8\x2dc635\x2d524c\x2de4755cdbb688.mount: Deactivated successfully. Dec 13 02:02:42.877734 env[1210]: time="2024-12-13T02:02:42.877547233Z" level=info msg="TearDown network for sandbox \"8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b\" successfully" Dec 13 02:02:42.877734 env[1210]: time="2024-12-13T02:02:42.877596918Z" level=info msg="StopPodSandbox for \"8eb166012d479abbc91d87d08e7fa504dca491e0df9cd986d1a70a0ce434b36b\" returns successfully" Dec 13 02:02:42.878925 env[1210]: time="2024-12-13T02:02:42.878868890Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-54d647d779-f9rwt,Uid:5d37fa34-73a1-48e6-a14e-66e002882c9f,Namespace:calico-apiserver,Attempt:1,}" Dec 13 02:02:42.881687 env[1210]: 2024-12-13 02:02:42.838 [INFO][4623] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea" Dec 13 02:02:42.881687 env[1210]: 2024-12-13 02:02:42.838 [INFO][4623] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea" iface="eth0" netns="/var/run/netns/cni-84fe26c7-a43e-7ae8-5a1c-5559bb6b33b6" Dec 13 02:02:42.881687 env[1210]: 2024-12-13 02:02:42.838 [INFO][4623] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea" iface="eth0" netns="/var/run/netns/cni-84fe26c7-a43e-7ae8-5a1c-5559bb6b33b6" Dec 13 02:02:42.881687 env[1210]: 2024-12-13 02:02:42.840 [INFO][4623] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea" iface="eth0" netns="/var/run/netns/cni-84fe26c7-a43e-7ae8-5a1c-5559bb6b33b6" Dec 13 02:02:42.881687 env[1210]: 2024-12-13 02:02:42.841 [INFO][4623] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea" Dec 13 02:02:42.881687 env[1210]: 2024-12-13 02:02:42.841 [INFO][4623] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea" Dec 13 02:02:42.881687 env[1210]: 2024-12-13 02:02:42.864 [INFO][4639] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea" HandleID="k8s-pod-network.09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea" Workload="localhost-k8s-coredns--76f75df574--s84nw-eth0" Dec 13 02:02:42.881687 env[1210]: 2024-12-13 02:02:42.864 [INFO][4639] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:02:42.881687 env[1210]: 2024-12-13 02:02:42.869 [INFO][4639] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:02:42.881687 env[1210]: 2024-12-13 02:02:42.875 [WARNING][4639] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea" HandleID="k8s-pod-network.09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea" Workload="localhost-k8s-coredns--76f75df574--s84nw-eth0" Dec 13 02:02:42.881687 env[1210]: 2024-12-13 02:02:42.875 [INFO][4639] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea" HandleID="k8s-pod-network.09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea" Workload="localhost-k8s-coredns--76f75df574--s84nw-eth0" Dec 13 02:02:42.881687 env[1210]: 2024-12-13 02:02:42.876 [INFO][4639] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:02:42.881687 env[1210]: 2024-12-13 02:02:42.879 [INFO][4623] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea" Dec 13 02:02:42.882354 env[1210]: time="2024-12-13T02:02:42.882093068Z" level=info msg="TearDown network for sandbox \"09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea\" successfully" Dec 13 02:02:42.882354 env[1210]: time="2024-12-13T02:02:42.882126351Z" level=info msg="StopPodSandbox for \"09610aaa69f5f4009f4b8c67732adf04b9a4854d4cee8301a489c82300b8c1ea\" returns successfully" Dec 13 02:02:42.883014 kubelet[2064]: E1213 02:02:42.882990 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:02:42.885598 env[1210]: time="2024-12-13T02:02:42.885551552Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-s84nw,Uid:04bdc1d0-7f7e-4114-a70c-e1aa18271a20,Namespace:kube-system,Attempt:1,}" Dec 13 02:02:42.887337 systemd[1]: run-netns-cni\x2d84fe26c7\x2da43e\x2d7ae8\x2d5a1c\x2d5559bb6b33b6.mount: Deactivated successfully. Dec 13 02:02:43.010082 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic3ca569a208: link becomes ready Dec 13 02:02:43.010286 systemd-networkd[1030]: calic3ca569a208: Link UP Dec 13 02:02:43.010479 systemd-networkd[1030]: calic3ca569a208: Gained carrier Dec 13 02:02:43.017566 kubelet[2064]: E1213 02:02:43.016518 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:02:43.029943 kubelet[2064]: I1213 02:02:43.028519 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-x45b5" podStartSLOduration=51.028473977 podStartE2EDuration="51.028473977s" podCreationTimestamp="2024-12-13 02:01:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:02:43.02804162 +0000 UTC m=+66.333359825" watchObservedRunningTime="2024-12-13 02:02:43.028473977 +0000 UTC m=+66.333792182" Dec 13 02:02:43.030829 env[1210]: 2024-12-13 02:02:42.945 [INFO][4653] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--54d647d779--f9rwt-eth0 calico-apiserver-54d647d779- calico-apiserver 5d37fa34-73a1-48e6-a14e-66e002882c9f 1020 0 2024-12-13 02:02:00 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:54d647d779 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-54d647d779-f9rwt eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calic3ca569a208 [] []}} ContainerID="db7905b898fd1e734c910095486e8ee69588e3dc7f2af97b42090bc62e9e7bf1" Namespace="calico-apiserver" Pod="calico-apiserver-54d647d779-f9rwt" WorkloadEndpoint="localhost-k8s-calico--apiserver--54d647d779--f9rwt-" Dec 13 02:02:43.030829 env[1210]: 2024-12-13 02:02:42.945 [INFO][4653] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="db7905b898fd1e734c910095486e8ee69588e3dc7f2af97b42090bc62e9e7bf1" Namespace="calico-apiserver" Pod="calico-apiserver-54d647d779-f9rwt" WorkloadEndpoint="localhost-k8s-calico--apiserver--54d647d779--f9rwt-eth0" Dec 13 02:02:43.030829 env[1210]: 2024-12-13 02:02:42.969 [INFO][4684] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="db7905b898fd1e734c910095486e8ee69588e3dc7f2af97b42090bc62e9e7bf1" HandleID="k8s-pod-network.db7905b898fd1e734c910095486e8ee69588e3dc7f2af97b42090bc62e9e7bf1" Workload="localhost-k8s-calico--apiserver--54d647d779--f9rwt-eth0" Dec 13 02:02:43.030829 env[1210]: 2024-12-13 02:02:42.978 [INFO][4684] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="db7905b898fd1e734c910095486e8ee69588e3dc7f2af97b42090bc62e9e7bf1" HandleID="k8s-pod-network.db7905b898fd1e734c910095486e8ee69588e3dc7f2af97b42090bc62e9e7bf1" Workload="localhost-k8s-calico--apiserver--54d647d779--f9rwt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000390d70), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-54d647d779-f9rwt", "timestamp":"2024-12-13 02:02:42.969444416 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:02:43.030829 env[1210]: 2024-12-13 02:02:42.978 [INFO][4684] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:02:43.030829 env[1210]: 2024-12-13 02:02:42.978 [INFO][4684] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:02:43.030829 env[1210]: 2024-12-13 02:02:42.978 [INFO][4684] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 02:02:43.030829 env[1210]: 2024-12-13 02:02:42.979 [INFO][4684] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.db7905b898fd1e734c910095486e8ee69588e3dc7f2af97b42090bc62e9e7bf1" host="localhost" Dec 13 02:02:43.030829 env[1210]: 2024-12-13 02:02:42.985 [INFO][4684] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 02:02:43.030829 env[1210]: 2024-12-13 02:02:42.989 [INFO][4684] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 02:02:43.030829 env[1210]: 2024-12-13 02:02:42.990 [INFO][4684] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 02:02:43.030829 env[1210]: 2024-12-13 02:02:42.991 [INFO][4684] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 02:02:43.030829 env[1210]: 2024-12-13 02:02:42.991 [INFO][4684] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.db7905b898fd1e734c910095486e8ee69588e3dc7f2af97b42090bc62e9e7bf1" host="localhost" Dec 13 02:02:43.030829 env[1210]: 2024-12-13 02:02:42.992 [INFO][4684] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.db7905b898fd1e734c910095486e8ee69588e3dc7f2af97b42090bc62e9e7bf1 Dec 13 02:02:43.030829 env[1210]: 2024-12-13 02:02:42.999 [INFO][4684] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.db7905b898fd1e734c910095486e8ee69588e3dc7f2af97b42090bc62e9e7bf1" host="localhost" Dec 13 02:02:43.030829 env[1210]: 2024-12-13 02:02:43.005 [INFO][4684] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.db7905b898fd1e734c910095486e8ee69588e3dc7f2af97b42090bc62e9e7bf1" host="localhost" Dec 13 02:02:43.030829 env[1210]: 2024-12-13 02:02:43.005 [INFO][4684] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.db7905b898fd1e734c910095486e8ee69588e3dc7f2af97b42090bc62e9e7bf1" host="localhost" Dec 13 02:02:43.030829 env[1210]: 2024-12-13 02:02:43.005 [INFO][4684] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:02:43.030829 env[1210]: 2024-12-13 02:02:43.005 [INFO][4684] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="db7905b898fd1e734c910095486e8ee69588e3dc7f2af97b42090bc62e9e7bf1" HandleID="k8s-pod-network.db7905b898fd1e734c910095486e8ee69588e3dc7f2af97b42090bc62e9e7bf1" Workload="localhost-k8s-calico--apiserver--54d647d779--f9rwt-eth0" Dec 13 02:02:43.031616 env[1210]: 2024-12-13 02:02:43.007 [INFO][4653] cni-plugin/k8s.go 386: Populated endpoint ContainerID="db7905b898fd1e734c910095486e8ee69588e3dc7f2af97b42090bc62e9e7bf1" Namespace="calico-apiserver" Pod="calico-apiserver-54d647d779-f9rwt" WorkloadEndpoint="localhost-k8s-calico--apiserver--54d647d779--f9rwt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--54d647d779--f9rwt-eth0", GenerateName:"calico-apiserver-54d647d779-", Namespace:"calico-apiserver", SelfLink:"", UID:"5d37fa34-73a1-48e6-a14e-66e002882c9f", ResourceVersion:"1020", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 2, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"54d647d779", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-54d647d779-f9rwt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic3ca569a208", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:02:43.031616 env[1210]: 2024-12-13 02:02:43.007 [INFO][4653] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="db7905b898fd1e734c910095486e8ee69588e3dc7f2af97b42090bc62e9e7bf1" Namespace="calico-apiserver" Pod="calico-apiserver-54d647d779-f9rwt" WorkloadEndpoint="localhost-k8s-calico--apiserver--54d647d779--f9rwt-eth0" Dec 13 02:02:43.031616 env[1210]: 2024-12-13 02:02:43.007 [INFO][4653] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic3ca569a208 ContainerID="db7905b898fd1e734c910095486e8ee69588e3dc7f2af97b42090bc62e9e7bf1" Namespace="calico-apiserver" Pod="calico-apiserver-54d647d779-f9rwt" WorkloadEndpoint="localhost-k8s-calico--apiserver--54d647d779--f9rwt-eth0" Dec 13 02:02:43.031616 env[1210]: 2024-12-13 02:02:43.011 [INFO][4653] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="db7905b898fd1e734c910095486e8ee69588e3dc7f2af97b42090bc62e9e7bf1" Namespace="calico-apiserver" Pod="calico-apiserver-54d647d779-f9rwt" WorkloadEndpoint="localhost-k8s-calico--apiserver--54d647d779--f9rwt-eth0" Dec 13 02:02:43.031616 env[1210]: 2024-12-13 02:02:43.012 [INFO][4653] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="db7905b898fd1e734c910095486e8ee69588e3dc7f2af97b42090bc62e9e7bf1" Namespace="calico-apiserver" Pod="calico-apiserver-54d647d779-f9rwt" WorkloadEndpoint="localhost-k8s-calico--apiserver--54d647d779--f9rwt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--54d647d779--f9rwt-eth0", GenerateName:"calico-apiserver-54d647d779-", Namespace:"calico-apiserver", SelfLink:"", UID:"5d37fa34-73a1-48e6-a14e-66e002882c9f", ResourceVersion:"1020", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 2, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"54d647d779", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"db7905b898fd1e734c910095486e8ee69588e3dc7f2af97b42090bc62e9e7bf1", Pod:"calico-apiserver-54d647d779-f9rwt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic3ca569a208", MAC:"de:22:8a:ae:be:bf", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:02:43.031616 env[1210]: 2024-12-13 02:02:43.024 [INFO][4653] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="db7905b898fd1e734c910095486e8ee69588e3dc7f2af97b42090bc62e9e7bf1" Namespace="calico-apiserver" Pod="calico-apiserver-54d647d779-f9rwt" WorkloadEndpoint="localhost-k8s-calico--apiserver--54d647d779--f9rwt-eth0" Dec 13 02:02:43.039000 audit[4710]: NETFILTER_CFG table=filter:109 family=2 entries=14 op=nft_register_rule pid=4710 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:02:43.042677 kernel: kauditd_printk_skb: 288 callbacks suppressed Dec 13 02:02:43.042755 kernel: audit: type=1325 audit(1734055363.039:1342): table=filter:109 family=2 entries=14 op=nft_register_rule pid=4710 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:02:43.061741 kernel: audit: type=1300 audit(1734055363.039:1342): arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffc1907b890 a2=0 a3=7ffc1907b87c items=0 ppid=2244 pid=4710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.039000 audit[4710]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffc1907b890 a2=0 a3=7ffc1907b87c items=0 ppid=2244 pid=4710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.061983 env[1210]: time="2024-12-13T02:02:43.053645548Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:02:43.061983 env[1210]: time="2024-12-13T02:02:43.053689922Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:02:43.061983 env[1210]: time="2024-12-13T02:02:43.053700813Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:02:43.061983 env[1210]: time="2024-12-13T02:02:43.053975999Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/db7905b898fd1e734c910095486e8ee69588e3dc7f2af97b42090bc62e9e7bf1 pid=4718 runtime=io.containerd.runc.v2 Dec 13 02:02:43.068789 kernel: audit: type=1327 audit(1734055363.039:1342): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:02:43.039000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:02:43.078976 kernel: audit: type=1325 audit(1734055363.059:1343): table=filter:110 family=2 entries=46 op=nft_register_chain pid=4711 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:02:43.079096 kernel: audit: type=1300 audit(1734055363.059:1343): arch=c000003e syscall=46 success=yes exit=23892 a0=3 a1=7ffdd1786940 a2=0 a3=7ffdd178692c items=0 ppid=3497 pid=4711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.059000 audit[4711]: NETFILTER_CFG table=filter:110 family=2 entries=46 op=nft_register_chain pid=4711 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:02:43.059000 audit[4711]: SYSCALL arch=c000003e syscall=46 success=yes exit=23892 a0=3 a1=7ffdd1786940 a2=0 a3=7ffdd178692c items=0 ppid=3497 pid=4711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.059000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:02:43.083699 kernel: audit: type=1327 audit(1734055363.059:1343): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:02:43.085193 systemd[1]: Started cri-containerd-db7905b898fd1e734c910095486e8ee69588e3dc7f2af97b42090bc62e9e7bf1.scope. Dec 13 02:02:43.064000 audit[4710]: NETFILTER_CFG table=nat:111 family=2 entries=16 op=nft_register_rule pid=4710 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:02:43.095969 kernel: audit: type=1325 audit(1734055363.064:1344): table=nat:111 family=2 entries=16 op=nft_register_rule pid=4710 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:02:43.096083 kernel: audit: type=1300 audit(1734055363.064:1344): arch=c000003e syscall=46 success=yes exit=4236 a0=3 a1=7ffc1907b890 a2=0 a3=0 items=0 ppid=2244 pid=4710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.064000 audit[4710]: SYSCALL arch=c000003e syscall=46 success=yes exit=4236 a0=3 a1=7ffc1907b890 a2=0 a3=0 items=0 ppid=2244 pid=4710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.064000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:02:43.097797 systemd-networkd[1030]: cali63b79ba00c3: Link UP Dec 13 02:02:43.100064 kernel: audit: type=1327 audit(1734055363.064:1344): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:02:43.100106 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali63b79ba00c3: link becomes ready Dec 13 02:02:43.100553 systemd-networkd[1030]: cali63b79ba00c3: Gained carrier Dec 13 02:02:43.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.109340 kubelet[2064]: I1213 02:02:43.108781 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-m7k69" podStartSLOduration=36.620326136 podStartE2EDuration="43.108730295s" podCreationTimestamp="2024-12-13 02:02:00 +0000 UTC" firstStartedPulling="2024-12-13 02:02:36.032501917 +0000 UTC m=+59.337820112" lastFinishedPulling="2024-12-13 02:02:42.520906076 +0000 UTC m=+65.826224271" observedRunningTime="2024-12-13 02:02:43.063593329 +0000 UTC m=+66.368911554" watchObservedRunningTime="2024-12-13 02:02:43.108730295 +0000 UTC m=+66.414048490" Dec 13 02:02:43.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.111086 kernel: audit: type=1400 audit(1734055363.105:1345): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.105000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.105000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.106000 audit: BPF prog-id=192 op=LOAD Dec 13 02:02:43.106000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.106000 audit[4730]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4718 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462373930356238393866643165373334633931303039353438366538 Dec 13 02:02:43.106000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.106000 audit[4730]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4718 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462373930356238393866643165373334633931303039353438366538 Dec 13 02:02:43.106000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.106000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.106000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.106000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.106000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.106000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.106000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.106000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.106000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.106000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.106000 audit: BPF prog-id=193 op=LOAD Dec 13 02:02:43.106000 audit[4730]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00030c0f0 items=0 ppid=4718 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.106000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462373930356238393866643165373334633931303039353438366538 Dec 13 02:02:43.111000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.111000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.111000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.111000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.111000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.111000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.111000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.111000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.111000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.111000 audit: BPF prog-id=194 op=LOAD Dec 13 02:02:43.111000 audit[4730]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00030c138 items=0 ppid=4718 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462373930356238393866643165373334633931303039353438366538 Dec 13 02:02:43.111000 audit: BPF prog-id=194 op=UNLOAD Dec 13 02:02:43.111000 audit: BPF prog-id=193 op=UNLOAD Dec 13 02:02:43.111000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.111000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.113295 env[1210]: 2024-12-13 02:02:42.935 [INFO][4652] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--76f75df574--s84nw-eth0 coredns-76f75df574- kube-system 04bdc1d0-7f7e-4114-a70c-e1aa18271a20 1019 0 2024-12-13 02:01:52 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-76f75df574-s84nw eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali63b79ba00c3 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="a722a1e1c613e1bf385d5ae41a035e611cd8725752fa51e8aae9e7cceec31384" Namespace="kube-system" Pod="coredns-76f75df574-s84nw" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--s84nw-" Dec 13 02:02:43.113295 env[1210]: 2024-12-13 02:02:42.936 [INFO][4652] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a722a1e1c613e1bf385d5ae41a035e611cd8725752fa51e8aae9e7cceec31384" Namespace="kube-system" Pod="coredns-76f75df574-s84nw" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--s84nw-eth0" Dec 13 02:02:43.113295 env[1210]: 2024-12-13 02:02:42.974 [INFO][4679] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a722a1e1c613e1bf385d5ae41a035e611cd8725752fa51e8aae9e7cceec31384" HandleID="k8s-pod-network.a722a1e1c613e1bf385d5ae41a035e611cd8725752fa51e8aae9e7cceec31384" Workload="localhost-k8s-coredns--76f75df574--s84nw-eth0" Dec 13 02:02:43.113295 env[1210]: 2024-12-13 02:02:42.980 [INFO][4679] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a722a1e1c613e1bf385d5ae41a035e611cd8725752fa51e8aae9e7cceec31384" HandleID="k8s-pod-network.a722a1e1c613e1bf385d5ae41a035e611cd8725752fa51e8aae9e7cceec31384" Workload="localhost-k8s-coredns--76f75df574--s84nw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000542fb0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-76f75df574-s84nw", "timestamp":"2024-12-13 02:02:42.973993116 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 02:02:43.113295 env[1210]: 2024-12-13 02:02:42.981 [INFO][4679] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 02:02:43.113295 env[1210]: 2024-12-13 02:02:43.005 [INFO][4679] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 02:02:43.113295 env[1210]: 2024-12-13 02:02:43.005 [INFO][4679] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 02:02:43.113295 env[1210]: 2024-12-13 02:02:43.022 [INFO][4679] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a722a1e1c613e1bf385d5ae41a035e611cd8725752fa51e8aae9e7cceec31384" host="localhost" Dec 13 02:02:43.113295 env[1210]: 2024-12-13 02:02:43.035 [INFO][4679] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 02:02:43.113295 env[1210]: 2024-12-13 02:02:43.062 [INFO][4679] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 02:02:43.113295 env[1210]: 2024-12-13 02:02:43.069 [INFO][4679] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 02:02:43.113295 env[1210]: 2024-12-13 02:02:43.074 [INFO][4679] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 02:02:43.113295 env[1210]: 2024-12-13 02:02:43.074 [INFO][4679] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.a722a1e1c613e1bf385d5ae41a035e611cd8725752fa51e8aae9e7cceec31384" host="localhost" Dec 13 02:02:43.113295 env[1210]: 2024-12-13 02:02:43.076 [INFO][4679] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a722a1e1c613e1bf385d5ae41a035e611cd8725752fa51e8aae9e7cceec31384 Dec 13 02:02:43.113295 env[1210]: 2024-12-13 02:02:43.084 [INFO][4679] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.a722a1e1c613e1bf385d5ae41a035e611cd8725752fa51e8aae9e7cceec31384" host="localhost" Dec 13 02:02:43.113295 env[1210]: 2024-12-13 02:02:43.091 [INFO][4679] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.a722a1e1c613e1bf385d5ae41a035e611cd8725752fa51e8aae9e7cceec31384" host="localhost" Dec 13 02:02:43.113295 env[1210]: 2024-12-13 02:02:43.091 [INFO][4679] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.a722a1e1c613e1bf385d5ae41a035e611cd8725752fa51e8aae9e7cceec31384" host="localhost" Dec 13 02:02:43.113295 env[1210]: 2024-12-13 02:02:43.091 [INFO][4679] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 02:02:43.113295 env[1210]: 2024-12-13 02:02:43.091 [INFO][4679] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="a722a1e1c613e1bf385d5ae41a035e611cd8725752fa51e8aae9e7cceec31384" HandleID="k8s-pod-network.a722a1e1c613e1bf385d5ae41a035e611cd8725752fa51e8aae9e7cceec31384" Workload="localhost-k8s-coredns--76f75df574--s84nw-eth0" Dec 13 02:02:43.113923 env[1210]: 2024-12-13 02:02:43.095 [INFO][4652] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a722a1e1c613e1bf385d5ae41a035e611cd8725752fa51e8aae9e7cceec31384" Namespace="kube-system" Pod="coredns-76f75df574-s84nw" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--s84nw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--s84nw-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"04bdc1d0-7f7e-4114-a70c-e1aa18271a20", ResourceVersion:"1019", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 1, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-76f75df574-s84nw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali63b79ba00c3", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:02:43.113923 env[1210]: 2024-12-13 02:02:43.095 [INFO][4652] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="a722a1e1c613e1bf385d5ae41a035e611cd8725752fa51e8aae9e7cceec31384" Namespace="kube-system" Pod="coredns-76f75df574-s84nw" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--s84nw-eth0" Dec 13 02:02:43.113923 env[1210]: 2024-12-13 02:02:43.095 [INFO][4652] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali63b79ba00c3 ContainerID="a722a1e1c613e1bf385d5ae41a035e611cd8725752fa51e8aae9e7cceec31384" Namespace="kube-system" Pod="coredns-76f75df574-s84nw" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--s84nw-eth0" Dec 13 02:02:43.113923 env[1210]: 2024-12-13 02:02:43.101 [INFO][4652] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a722a1e1c613e1bf385d5ae41a035e611cd8725752fa51e8aae9e7cceec31384" Namespace="kube-system" Pod="coredns-76f75df574-s84nw" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--s84nw-eth0" Dec 13 02:02:43.113923 env[1210]: 2024-12-13 02:02:43.101 [INFO][4652] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a722a1e1c613e1bf385d5ae41a035e611cd8725752fa51e8aae9e7cceec31384" Namespace="kube-system" Pod="coredns-76f75df574-s84nw" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--s84nw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--s84nw-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"04bdc1d0-7f7e-4114-a70c-e1aa18271a20", ResourceVersion:"1019", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 2, 1, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a722a1e1c613e1bf385d5ae41a035e611cd8725752fa51e8aae9e7cceec31384", Pod:"coredns-76f75df574-s84nw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali63b79ba00c3", MAC:"36:e0:84:f9:4b:1b", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 02:02:43.113923 env[1210]: 2024-12-13 02:02:43.109 [INFO][4652] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a722a1e1c613e1bf385d5ae41a035e611cd8725752fa51e8aae9e7cceec31384" Namespace="kube-system" Pod="coredns-76f75df574-s84nw" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--s84nw-eth0" Dec 13 02:02:43.111000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.111000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.111000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.111000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.111000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.111000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.111000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.111000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.111000 audit: BPF prog-id=195 op=LOAD Dec 13 02:02:43.111000 audit[4730]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00030c548 items=0 ppid=4718 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462373930356238393866643165373334633931303039353438366538 Dec 13 02:02:43.112000 audit[4751]: NETFILTER_CFG table=filter:112 family=2 entries=11 op=nft_register_rule pid=4751 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:02:43.112000 audit[4751]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdb9876d70 a2=0 a3=7ffdb9876d5c items=0 ppid=2244 pid=4751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.112000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:02:43.114250 systemd-resolved[1146]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:02:43.118000 audit[4751]: NETFILTER_CFG table=nat:113 family=2 entries=37 op=nft_register_chain pid=4751 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:02:43.118000 audit[4751]: SYSCALL arch=c000003e syscall=46 success=yes exit=14964 a0=3 a1=7ffdb9876d70 a2=0 a3=7ffdb9876d5c items=0 ppid=2244 pid=4751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.118000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:02:43.128297 env[1210]: time="2024-12-13T02:02:43.127872838Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 02:02:43.128297 env[1210]: time="2024-12-13T02:02:43.127916362Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 02:02:43.128297 env[1210]: time="2024-12-13T02:02:43.127926341Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 02:02:43.128297 env[1210]: time="2024-12-13T02:02:43.128218610Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a722a1e1c613e1bf385d5ae41a035e611cd8725752fa51e8aae9e7cceec31384 pid=4776 runtime=io.containerd.runc.v2 Dec 13 02:02:43.137438 systemd[1]: Started cri-containerd-a722a1e1c613e1bf385d5ae41a035e611cd8725752fa51e8aae9e7cceec31384.scope. Dec 13 02:02:43.143534 env[1210]: time="2024-12-13T02:02:43.143462628Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-54d647d779-f9rwt,Uid:5d37fa34-73a1-48e6-a14e-66e002882c9f,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"db7905b898fd1e734c910095486e8ee69588e3dc7f2af97b42090bc62e9e7bf1\"" Dec 13 02:02:43.149442 env[1210]: time="2024-12-13T02:02:43.149401664Z" level=info msg="CreateContainer within sandbox \"db7905b898fd1e734c910095486e8ee69588e3dc7f2af97b42090bc62e9e7bf1\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 02:02:43.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.153000 audit: BPF prog-id=196 op=LOAD Dec 13 02:02:43.151000 audit[4807]: NETFILTER_CFG table=filter:114 family=2 entries=46 op=nft_register_chain pid=4807 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 02:02:43.151000 audit[4807]: SYSCALL arch=c000003e syscall=46 success=yes exit=21784 a0=3 a1=7fff0e657220 a2=0 a3=7fff0e65720c items=0 ppid=3497 pid=4807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.151000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 02:02:43.153000 audit[4784]: AVC avc: denied { bpf } for pid=4784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.153000 audit[4784]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4776 pid=4784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137323261316531633631336531626633383564356165343161303335 Dec 13 02:02:43.153000 audit[4784]: AVC avc: denied { perfmon } for pid=4784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.153000 audit[4784]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4776 pid=4784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137323261316531633631336531626633383564356165343161303335 Dec 13 02:02:43.153000 audit[4784]: AVC avc: denied { bpf } for pid=4784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.153000 audit[4784]: AVC avc: denied { bpf } for pid=4784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.153000 audit[4784]: AVC avc: denied { bpf } for pid=4784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.153000 audit[4784]: AVC avc: denied { perfmon } for pid=4784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.153000 audit[4784]: AVC avc: denied { perfmon } for pid=4784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.153000 audit[4784]: AVC avc: denied { perfmon } for pid=4784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.153000 audit[4784]: AVC avc: denied { perfmon } for pid=4784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.153000 audit[4784]: AVC avc: denied { perfmon } for pid=4784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.153000 audit[4784]: AVC avc: denied { bpf } for pid=4784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.153000 audit[4784]: AVC avc: denied { bpf } for pid=4784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.153000 audit: BPF prog-id=197 op=LOAD Dec 13 02:02:43.153000 audit[4784]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000099c30 items=0 ppid=4776 pid=4784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137323261316531633631336531626633383564356165343161303335 Dec 13 02:02:43.153000 audit[4784]: AVC avc: denied { bpf } for pid=4784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.153000 audit[4784]: AVC avc: denied { bpf } for pid=4784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.153000 audit[4784]: AVC avc: denied { perfmon } for pid=4784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.153000 audit[4784]: AVC avc: denied { perfmon } for pid=4784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.153000 audit[4784]: AVC avc: denied { perfmon } for pid=4784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.153000 audit[4784]: AVC avc: denied { perfmon } for pid=4784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.153000 audit[4784]: AVC avc: denied { perfmon } for pid=4784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.153000 audit[4784]: AVC avc: denied { bpf } for pid=4784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.153000 audit[4784]: AVC avc: denied { bpf } for pid=4784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.153000 audit: BPF prog-id=198 op=LOAD Dec 13 02:02:43.153000 audit[4784]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000099c78 items=0 ppid=4776 pid=4784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137323261316531633631336531626633383564356165343161303335 Dec 13 02:02:43.153000 audit: BPF prog-id=198 op=UNLOAD Dec 13 02:02:43.153000 audit: BPF prog-id=197 op=UNLOAD Dec 13 02:02:43.154000 audit[4784]: AVC avc: denied { bpf } for pid=4784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.154000 audit[4784]: AVC avc: denied { bpf } for pid=4784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.154000 audit[4784]: AVC avc: denied { bpf } for pid=4784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.154000 audit[4784]: AVC avc: denied { perfmon } for pid=4784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.154000 audit[4784]: AVC avc: denied { perfmon } for pid=4784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.154000 audit[4784]: AVC avc: denied { perfmon } for pid=4784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.154000 audit[4784]: AVC avc: denied { perfmon } for pid=4784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.154000 audit[4784]: AVC avc: denied { perfmon } for pid=4784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.154000 audit[4784]: AVC avc: denied { bpf } for pid=4784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.154000 audit[4784]: AVC avc: denied { bpf } for pid=4784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.154000 audit: BPF prog-id=199 op=LOAD Dec 13 02:02:43.154000 audit[4784]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00039a088 items=0 ppid=4776 pid=4784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137323261316531633631336531626633383564356165343161303335 Dec 13 02:02:43.157117 systemd-resolved[1146]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 02:02:43.166206 env[1210]: time="2024-12-13T02:02:43.166150609Z" level=info msg="CreateContainer within sandbox \"db7905b898fd1e734c910095486e8ee69588e3dc7f2af97b42090bc62e9e7bf1\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"d2f8dd7dd53dfdf625048c85be9476ec6268f5d784fbf9db572664fe8825fdfc\"" Dec 13 02:02:43.166855 env[1210]: time="2024-12-13T02:02:43.166838786Z" level=info msg="StartContainer for \"d2f8dd7dd53dfdf625048c85be9476ec6268f5d784fbf9db572664fe8825fdfc\"" Dec 13 02:02:43.181844 env[1210]: time="2024-12-13T02:02:43.181802578Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-s84nw,Uid:04bdc1d0-7f7e-4114-a70c-e1aa18271a20,Namespace:kube-system,Attempt:1,} returns sandbox id \"a722a1e1c613e1bf385d5ae41a035e611cd8725752fa51e8aae9e7cceec31384\"" Dec 13 02:02:43.183658 kubelet[2064]: E1213 02:02:43.182677 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:02:43.187937 env[1210]: time="2024-12-13T02:02:43.187898173Z" level=info msg="CreateContainer within sandbox \"a722a1e1c613e1bf385d5ae41a035e611cd8725752fa51e8aae9e7cceec31384\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 02:02:43.190450 systemd[1]: Started cri-containerd-d2f8dd7dd53dfdf625048c85be9476ec6268f5d784fbf9db572664fe8825fdfc.scope. Dec 13 02:02:43.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.203000 audit: BPF prog-id=200 op=LOAD Dec 13 02:02:43.204670 env[1210]: time="2024-12-13T02:02:43.204634374Z" level=info msg="CreateContainer within sandbox \"a722a1e1c613e1bf385d5ae41a035e611cd8725752fa51e8aae9e7cceec31384\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"11164d689acd0149fecbd0bf2810216356febba73f1bfb1f1868a1cc389c77e4\"" Dec 13 02:02:43.203000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.203000 audit[4823]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4718 pid=4823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432663864643764643533646664663632353034386338356265393437 Dec 13 02:02:43.203000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.203000 audit[4823]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=4718 pid=4823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432663864643764643533646664663632353034386338356265393437 Dec 13 02:02:43.203000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.203000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.203000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.203000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.203000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.203000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.203000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.203000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.203000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.203000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.203000 audit: BPF prog-id=201 op=LOAD Dec 13 02:02:43.203000 audit[4823]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00028acf0 items=0 ppid=4718 pid=4823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432663864643764643533646664663632353034386338356265393437 Dec 13 02:02:43.204000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.204000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.204000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.204000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.204000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.204000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.204000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.204000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.204000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.204000 audit: BPF prog-id=202 op=LOAD Dec 13 02:02:43.204000 audit[4823]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00028ad38 items=0 ppid=4718 pid=4823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.204000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432663864643764643533646664663632353034386338356265393437 Dec 13 02:02:43.204000 audit: BPF prog-id=202 op=UNLOAD Dec 13 02:02:43.204000 audit: BPF prog-id=201 op=UNLOAD Dec 13 02:02:43.204000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.204000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.204000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.204000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.204000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.204000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.204000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.204000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.204000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.204000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.204000 audit: BPF prog-id=203 op=LOAD Dec 13 02:02:43.204000 audit[4823]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00028b148 items=0 ppid=4718 pid=4823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.204000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432663864643764643533646664663632353034386338356265393437 Dec 13 02:02:43.207019 env[1210]: time="2024-12-13T02:02:43.206993896Z" level=info msg="StartContainer for \"11164d689acd0149fecbd0bf2810216356febba73f1bfb1f1868a1cc389c77e4\"" Dec 13 02:02:43.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.73:22-10.0.0.1:37286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:43.220705 systemd[1]: Started sshd@18-10.0.0.73:22-10.0.0.1:37286.service. Dec 13 02:02:43.225136 systemd[1]: Started cri-containerd-11164d689acd0149fecbd0bf2810216356febba73f1bfb1f1868a1cc389c77e4.scope. Dec 13 02:02:43.234599 env[1210]: time="2024-12-13T02:02:43.234265953Z" level=info msg="StartContainer for \"d2f8dd7dd53dfdf625048c85be9476ec6268f5d784fbf9db572664fe8825fdfc\" returns successfully" Dec 13 02:02:43.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.240000 audit: BPF prog-id=204 op=LOAD Dec 13 02:02:43.241000 audit[4850]: AVC avc: denied { bpf } for pid=4850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.241000 audit[4850]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4776 pid=4850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131313634643638396163643031343966656362643062663238313032 Dec 13 02:02:43.241000 audit[4850]: AVC avc: denied { perfmon } for pid=4850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.241000 audit[4850]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4776 pid=4850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131313634643638396163643031343966656362643062663238313032 Dec 13 02:02:43.241000 audit[4850]: AVC avc: denied { bpf } for pid=4850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.241000 audit[4850]: AVC avc: denied { bpf } for pid=4850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.241000 audit[4850]: AVC avc: denied { bpf } for pid=4850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.241000 audit[4850]: AVC avc: denied { perfmon } for pid=4850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.241000 audit[4850]: AVC avc: denied { perfmon } for pid=4850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.241000 audit[4850]: AVC avc: denied { perfmon } for pid=4850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.241000 audit[4850]: AVC avc: denied { perfmon } for pid=4850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.241000 audit[4850]: AVC avc: denied { perfmon } for pid=4850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.241000 audit[4850]: AVC avc: denied { bpf } for pid=4850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.241000 audit[4850]: AVC avc: denied { bpf } for pid=4850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.241000 audit: BPF prog-id=205 op=LOAD Dec 13 02:02:43.241000 audit[4850]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003bcc30 items=0 ppid=4776 pid=4850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131313634643638396163643031343966656362643062663238313032 Dec 13 02:02:43.241000 audit[4850]: AVC avc: denied { bpf } for pid=4850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.241000 audit[4850]: AVC avc: denied { bpf } for pid=4850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.241000 audit[4850]: AVC avc: denied { perfmon } for pid=4850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.241000 audit[4850]: AVC avc: denied { perfmon } for pid=4850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.241000 audit[4850]: AVC avc: denied { perfmon } for pid=4850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.241000 audit[4850]: AVC avc: denied { perfmon } for pid=4850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.241000 audit[4850]: AVC avc: denied { perfmon } for pid=4850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.241000 audit[4850]: AVC avc: denied { bpf } for pid=4850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.241000 audit[4850]: AVC avc: denied { bpf } for pid=4850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.241000 audit: BPF prog-id=206 op=LOAD Dec 13 02:02:43.241000 audit[4850]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003bcc78 items=0 ppid=4776 pid=4850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131313634643638396163643031343966656362643062663238313032 Dec 13 02:02:43.241000 audit: BPF prog-id=206 op=UNLOAD Dec 13 02:02:43.241000 audit: BPF prog-id=205 op=UNLOAD Dec 13 02:02:43.241000 audit[4850]: AVC avc: denied { bpf } for pid=4850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.241000 audit[4850]: AVC avc: denied { bpf } for pid=4850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.241000 audit[4850]: AVC avc: denied { bpf } for pid=4850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.241000 audit[4850]: AVC avc: denied { perfmon } for pid=4850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.241000 audit[4850]: AVC avc: denied { perfmon } for pid=4850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.241000 audit[4850]: AVC avc: denied { perfmon } for pid=4850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.241000 audit[4850]: AVC avc: denied { perfmon } for pid=4850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.241000 audit[4850]: AVC avc: denied { perfmon } for pid=4850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.241000 audit[4850]: AVC avc: denied { bpf } for pid=4850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.241000 audit[4850]: AVC avc: denied { bpf } for pid=4850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 02:02:43.241000 audit: BPF prog-id=207 op=LOAD Dec 13 02:02:43.241000 audit[4850]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003bd088 items=0 ppid=4776 pid=4850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131313634643638396163643031343966656362643062663238313032 Dec 13 02:02:43.262242 env[1210]: time="2024-12-13T02:02:43.262164258Z" level=info msg="StartContainer for \"11164d689acd0149fecbd0bf2810216356febba73f1bfb1f1868a1cc389c77e4\" returns successfully" Dec 13 02:02:43.263000 audit[4860]: USER_ACCT pid=4860 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:43.264000 audit[4860]: CRED_ACQ pid=4860 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:43.265949 sshd[4860]: Accepted publickey for core from 10.0.0.1 port 37286 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:02:43.265000 audit[4860]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd12d4ab20 a2=3 a3=0 items=0 ppid=1 pid=4860 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.265000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:02:43.267136 sshd[4860]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:02:43.272208 systemd[1]: Started session-19.scope. Dec 13 02:02:43.272523 systemd-logind[1189]: New session 19 of user core. Dec 13 02:02:43.279000 audit[4860]: USER_START pid=4860 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:43.283000 audit[4898]: CRED_ACQ pid=4898 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:43.399502 sshd[4860]: pam_unix(sshd:session): session closed for user core Dec 13 02:02:43.399000 audit[4860]: USER_END pid=4860 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:43.399000 audit[4860]: CRED_DISP pid=4860 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:43.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.73:22-10.0.0.1:37290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:43.402663 systemd[1]: Started sshd@19-10.0.0.73:22-10.0.0.1:37290.service. Dec 13 02:02:43.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.73:22-10.0.0.1:37286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:43.403860 systemd-logind[1189]: Session 19 logged out. Waiting for processes to exit. Dec 13 02:02:43.403934 systemd[1]: sshd@18-10.0.0.73:22-10.0.0.1:37286.service: Deactivated successfully. Dec 13 02:02:43.404462 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 02:02:43.405584 systemd-logind[1189]: Removed session 19. Dec 13 02:02:43.433000 audit[4908]: USER_ACCT pid=4908 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:43.434846 sshd[4908]: Accepted publickey for core from 10.0.0.1 port 37290 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:02:43.434000 audit[4908]: CRED_ACQ pid=4908 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:43.434000 audit[4908]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed5ae9c80 a2=3 a3=0 items=0 ppid=1 pid=4908 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.434000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:02:43.435916 sshd[4908]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:02:43.439321 systemd-logind[1189]: New session 20 of user core. Dec 13 02:02:43.440038 systemd[1]: Started session-20.scope. Dec 13 02:02:43.443000 audit[4908]: USER_START pid=4908 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:43.444000 audit[4911]: CRED_ACQ pid=4911 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:43.614125 sshd[4908]: pam_unix(sshd:session): session closed for user core Dec 13 02:02:43.614000 audit[4908]: USER_END pid=4908 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:43.614000 audit[4908]: CRED_DISP pid=4908 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:43.616959 systemd[1]: sshd@19-10.0.0.73:22-10.0.0.1:37290.service: Deactivated successfully. Dec 13 02:02:43.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.73:22-10.0.0.1:37290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:43.617512 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 02:02:43.617982 systemd-logind[1189]: Session 20 logged out. Waiting for processes to exit. Dec 13 02:02:43.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.73:22-10.0.0.1:37300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:43.619084 systemd[1]: Started sshd@20-10.0.0.73:22-10.0.0.1:37300.service. Dec 13 02:02:43.619768 systemd-logind[1189]: Removed session 20. Dec 13 02:02:43.651000 audit[4921]: USER_ACCT pid=4921 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:43.653031 sshd[4921]: Accepted publickey for core from 10.0.0.1 port 37300 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:02:43.652000 audit[4921]: CRED_ACQ pid=4921 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:43.652000 audit[4921]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5546b510 a2=3 a3=0 items=0 ppid=1 pid=4921 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:43.652000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:02:43.654195 sshd[4921]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:02:43.657929 systemd-logind[1189]: New session 21 of user core. Dec 13 02:02:43.658706 systemd[1]: Started session-21.scope. Dec 13 02:02:43.661000 audit[4921]: USER_START pid=4921 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:43.663000 audit[4923]: CRED_ACQ pid=4923 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:44.026874 kubelet[2064]: E1213 02:02:44.026175 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:02:44.027377 kubelet[2064]: E1213 02:02:44.026998 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:02:44.037484 kubelet[2064]: I1213 02:02:44.037434 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-s84nw" podStartSLOduration=52.037388199 podStartE2EDuration="52.037388199s" podCreationTimestamp="2024-12-13 02:01:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:02:44.037091923 +0000 UTC m=+67.342410128" watchObservedRunningTime="2024-12-13 02:02:44.037388199 +0000 UTC m=+67.342706394" Dec 13 02:02:44.051000 audit[4931]: NETFILTER_CFG table=filter:115 family=2 entries=8 op=nft_register_rule pid=4931 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:02:44.051000 audit[4931]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffeaa07b8d0 a2=0 a3=7ffeaa07b8bc items=0 ppid=2244 pid=4931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:44.051000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:02:44.057000 audit[4931]: NETFILTER_CFG table=nat:116 family=2 entries=46 op=nft_register_rule pid=4931 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:02:44.057000 audit[4931]: SYSCALL arch=c000003e syscall=46 success=yes exit=14964 a0=3 a1=7ffeaa07b8d0 a2=0 a3=7ffeaa07b8bc items=0 ppid=2244 pid=4931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:44.057000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:02:44.062235 kubelet[2064]: I1213 02:02:44.062181 2064 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-54d647d779-f9rwt" podStartSLOduration=44.062133931 podStartE2EDuration="44.062133931s" podCreationTimestamp="2024-12-13 02:02:00 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 02:02:44.062095898 +0000 UTC m=+67.367414124" watchObservedRunningTime="2024-12-13 02:02:44.062133931 +0000 UTC m=+67.367452146" Dec 13 02:02:44.090000 audit[4834]: AVC avc: denied { watch } for pid=4834 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_02_02_18.1718584640/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c545,c847 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c545,c847 tclass=file permissive=0 Dec 13 02:02:44.090000 audit[4834]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000fd23a0 a2=fc6 a3=0 items=0 ppid=4718 pid=4834 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c545,c847 key=(null) Dec 13 02:02:44.090000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 02:02:44.323719 systemd-networkd[1030]: calib3b94f80c90: Gained IPv6LL Dec 13 02:02:44.377531 systemd-networkd[1030]: cali63b79ba00c3: Gained IPv6LL Dec 13 02:02:44.697643 systemd-networkd[1030]: calic3ca569a208: Gained IPv6LL Dec 13 02:02:45.029136 kubelet[2064]: E1213 02:02:45.029015 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:02:45.029574 kubelet[2064]: E1213 02:02:45.029071 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:02:45.102000 audit[4937]: NETFILTER_CFG table=filter:117 family=2 entries=8 op=nft_register_rule pid=4937 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:02:45.102000 audit[4937]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe6a4343e0 a2=0 a3=7ffe6a4343cc items=0 ppid=2244 pid=4937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:45.102000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:02:45.115000 audit[4937]: NETFILTER_CFG table=nat:118 family=2 entries=66 op=nft_register_chain pid=4937 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:02:45.115000 audit[4937]: SYSCALL arch=c000003e syscall=46 success=yes exit=23436 a0=3 a1=7ffe6a4343e0 a2=0 a3=7ffe6a4343cc items=0 ppid=2244 pid=4937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:45.115000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:02:45.340414 sshd[4921]: pam_unix(sshd:session): session closed for user core Dec 13 02:02:45.341000 audit[4921]: USER_END pid=4921 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:45.341000 audit[4921]: CRED_DISP pid=4921 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:45.342000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.73:22-10.0.0.1:37304 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:45.344000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.73:22-10.0.0.1:37300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:45.343849 systemd[1]: Started sshd@21-10.0.0.73:22-10.0.0.1:37304.service. Dec 13 02:02:45.344896 systemd[1]: sshd@20-10.0.0.73:22-10.0.0.1:37300.service: Deactivated successfully. Dec 13 02:02:45.345911 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 02:02:45.346464 systemd-logind[1189]: Session 21 logged out. Waiting for processes to exit. Dec 13 02:02:45.347504 systemd-logind[1189]: Removed session 21. Dec 13 02:02:45.379000 audit[4940]: USER_ACCT pid=4940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:45.381100 sshd[4940]: Accepted publickey for core from 10.0.0.1 port 37304 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:02:45.380000 audit[4940]: CRED_ACQ pid=4940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:45.380000 audit[4940]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7507c8c0 a2=3 a3=0 items=0 ppid=1 pid=4940 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:45.380000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:02:45.382369 sshd[4940]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:02:45.386225 systemd-logind[1189]: New session 22 of user core. Dec 13 02:02:45.387251 systemd[1]: Started session-22.scope. Dec 13 02:02:45.391000 audit[4940]: USER_START pid=4940 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:45.392000 audit[4943]: CRED_ACQ pid=4943 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:45.625862 sshd[4940]: pam_unix(sshd:session): session closed for user core Dec 13 02:02:45.626000 audit[4940]: USER_END pid=4940 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:45.626000 audit[4940]: CRED_DISP pid=4940 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:45.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.73:22-10.0.0.1:37310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:45.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.73:22-10.0.0.1:37304 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:45.629200 systemd[1]: Started sshd@22-10.0.0.73:22-10.0.0.1:37310.service. Dec 13 02:02:45.629633 systemd[1]: sshd@21-10.0.0.73:22-10.0.0.1:37304.service: Deactivated successfully. Dec 13 02:02:45.631783 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 02:02:45.632888 systemd-logind[1189]: Session 22 logged out. Waiting for processes to exit. Dec 13 02:02:45.634541 systemd-logind[1189]: Removed session 22. Dec 13 02:02:45.660000 audit[4951]: USER_ACCT pid=4951 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:45.661771 sshd[4951]: Accepted publickey for core from 10.0.0.1 port 37310 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:02:45.661000 audit[4951]: CRED_ACQ pid=4951 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:45.661000 audit[4951]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe37780ef0 a2=3 a3=0 items=0 ppid=1 pid=4951 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:45.661000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:02:45.662702 sshd[4951]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:02:45.665647 systemd-logind[1189]: New session 23 of user core. Dec 13 02:02:45.666511 systemd[1]: Started session-23.scope. Dec 13 02:02:45.669000 audit[4951]: USER_START pid=4951 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:45.670000 audit[4954]: CRED_ACQ pid=4954 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:45.778857 sshd[4951]: pam_unix(sshd:session): session closed for user core Dec 13 02:02:45.779000 audit[4951]: USER_END pid=4951 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:45.779000 audit[4951]: CRED_DISP pid=4951 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:45.781303 systemd[1]: sshd@22-10.0.0.73:22-10.0.0.1:37310.service: Deactivated successfully. Dec 13 02:02:45.780000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.73:22-10.0.0.1:37310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:45.782117 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 02:02:45.782734 systemd-logind[1189]: Session 23 logged out. Waiting for processes to exit. Dec 13 02:02:45.783575 systemd-logind[1189]: Removed session 23. Dec 13 02:02:46.030827 kubelet[2064]: E1213 02:02:46.030799 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:02:46.134000 audit[4966]: NETFILTER_CFG table=filter:119 family=2 entries=20 op=nft_register_rule pid=4966 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:02:46.134000 audit[4966]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffec35ef100 a2=0 a3=7ffec35ef0ec items=0 ppid=2244 pid=4966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:46.134000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:02:46.139000 audit[4966]: NETFILTER_CFG table=nat:120 family=2 entries=34 op=nft_register_chain pid=4966 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:02:46.139000 audit[4966]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffec35ef100 a2=0 a3=7ffec35ef0ec items=0 ppid=2244 pid=4966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:46.139000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:02:50.784070 systemd[1]: Started sshd@23-10.0.0.73:22-10.0.0.1:33072.service. Dec 13 02:02:50.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.73:22-10.0.0.1:33072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:50.785286 kernel: kauditd_printk_skb: 312 callbacks suppressed Dec 13 02:02:50.785427 kernel: audit: type=1130 audit(1734055370.783:1472): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.73:22-10.0.0.1:33072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:50.816000 audit[4994]: USER_ACCT pid=4994 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:50.817838 sshd[4994]: Accepted publickey for core from 10.0.0.1 port 33072 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:02:50.820000 audit[4994]: CRED_ACQ pid=4994 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:50.821957 sshd[4994]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:02:50.825612 kernel: audit: type=1101 audit(1734055370.816:1473): pid=4994 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:50.825664 kernel: audit: type=1103 audit(1734055370.820:1474): pid=4994 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:50.825683 kernel: audit: type=1006 audit(1734055370.820:1475): pid=4994 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 02:02:50.825256 systemd-logind[1189]: New session 24 of user core. Dec 13 02:02:50.826026 systemd[1]: Started session-24.scope. Dec 13 02:02:50.820000 audit[4994]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6b98e750 a2=3 a3=0 items=0 ppid=1 pid=4994 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:50.831919 kernel: audit: type=1300 audit(1734055370.820:1475): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6b98e750 a2=3 a3=0 items=0 ppid=1 pid=4994 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:50.831967 kernel: audit: type=1327 audit(1734055370.820:1475): proctitle=737368643A20636F7265205B707269765D Dec 13 02:02:50.820000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:02:50.833238 kernel: audit: type=1105 audit(1734055370.828:1476): pid=4994 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:50.828000 audit[4994]: USER_START pid=4994 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:50.837456 kernel: audit: type=1103 audit(1734055370.829:1477): pid=4996 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:50.829000 audit[4996]: CRED_ACQ pid=4996 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:50.931202 sshd[4994]: pam_unix(sshd:session): session closed for user core Dec 13 02:02:50.931000 audit[4994]: USER_END pid=4994 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:50.933892 systemd[1]: sshd@23-10.0.0.73:22-10.0.0.1:33072.service: Deactivated successfully. Dec 13 02:02:50.934774 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 02:02:50.935651 systemd-logind[1189]: Session 24 logged out. Waiting for processes to exit. Dec 13 02:02:50.936339 systemd-logind[1189]: Removed session 24. Dec 13 02:02:50.931000 audit[4994]: CRED_DISP pid=4994 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:50.941062 kernel: audit: type=1106 audit(1734055370.931:1478): pid=4994 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:50.941107 kernel: audit: type=1104 audit(1734055370.931:1479): pid=4994 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:50.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.73:22-10.0.0.1:33072 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:52.189000 audit[5007]: NETFILTER_CFG table=filter:121 family=2 entries=20 op=nft_register_rule pid=5007 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:02:52.189000 audit[5007]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff6f6b60b0 a2=0 a3=7fff6f6b609c items=0 ppid=2244 pid=5007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:52.189000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:02:52.197000 audit[5007]: NETFILTER_CFG table=nat:122 family=2 entries=106 op=nft_register_chain pid=5007 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 02:02:52.197000 audit[5007]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff6f6b60b0 a2=0 a3=7fff6f6b609c items=0 ppid=2244 pid=5007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:52.197000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 02:02:55.936196 systemd[1]: Started sshd@24-10.0.0.73:22-10.0.0.1:33086.service. Dec 13 02:02:55.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.73:22-10.0.0.1:33086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:55.937406 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 02:02:55.937452 kernel: audit: type=1130 audit(1734055375.935:1483): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.73:22-10.0.0.1:33086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:55.967000 audit[5020]: USER_ACCT pid=5020 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:55.969009 sshd[5020]: Accepted publickey for core from 10.0.0.1 port 33086 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:02:55.970750 sshd[5020]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:02:55.969000 audit[5020]: CRED_ACQ pid=5020 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:55.974183 systemd-logind[1189]: New session 25 of user core. Dec 13 02:02:55.975106 systemd[1]: Started session-25.scope. Dec 13 02:02:55.976836 kernel: audit: type=1101 audit(1734055375.967:1484): pid=5020 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:55.976883 kernel: audit: type=1103 audit(1734055375.969:1485): pid=5020 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:55.976906 kernel: audit: type=1006 audit(1734055375.969:1486): pid=5020 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 13 02:02:55.969000 audit[5020]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecaac1ac0 a2=3 a3=0 items=0 ppid=1 pid=5020 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:55.984172 kernel: audit: type=1300 audit(1734055375.969:1486): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecaac1ac0 a2=3 a3=0 items=0 ppid=1 pid=5020 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:02:55.969000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:02:55.986065 kernel: audit: type=1327 audit(1734055375.969:1486): proctitle=737368643A20636F7265205B707269765D Dec 13 02:02:55.986098 kernel: audit: type=1105 audit(1734055375.978:1487): pid=5020 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:55.978000 audit[5020]: USER_START pid=5020 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:55.990395 kernel: audit: type=1103 audit(1734055375.979:1488): pid=5022 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:55.979000 audit[5022]: CRED_ACQ pid=5022 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:56.073484 sshd[5020]: pam_unix(sshd:session): session closed for user core Dec 13 02:02:56.073000 audit[5020]: USER_END pid=5020 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:56.075639 systemd[1]: sshd@24-10.0.0.73:22-10.0.0.1:33086.service: Deactivated successfully. Dec 13 02:02:56.076435 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 02:02:56.077728 systemd-logind[1189]: Session 25 logged out. Waiting for processes to exit. Dec 13 02:02:56.078555 systemd-logind[1189]: Removed session 25. Dec 13 02:02:56.073000 audit[5020]: CRED_DISP pid=5020 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:56.083082 kernel: audit: type=1106 audit(1734055376.073:1489): pid=5020 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:56.083136 kernel: audit: type=1104 audit(1734055376.073:1490): pid=5020 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:02:56.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.73:22-10.0.0.1:33086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:02:58.791736 kubelet[2064]: E1213 02:02:58.791691 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:01.078995 systemd[1]: Started sshd@25-10.0.0.73:22-10.0.0.1:50038.service. Dec 13 02:03:01.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.73:22-10.0.0.1:50038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:01.080521 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:03:01.080573 kernel: audit: type=1130 audit(1734055381.078:1492): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.73:22-10.0.0.1:50038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:01.113000 audit[5035]: USER_ACCT pid=5035 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:01.114916 sshd[5035]: Accepted publickey for core from 10.0.0.1 port 50038 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:03:01.116747 sshd[5035]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:03:01.115000 audit[5035]: CRED_ACQ pid=5035 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:01.120770 systemd-logind[1189]: New session 26 of user core. Dec 13 02:03:01.121673 systemd[1]: Started session-26.scope. Dec 13 02:03:01.123846 kernel: audit: type=1101 audit(1734055381.113:1493): pid=5035 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:01.123892 kernel: audit: type=1103 audit(1734055381.115:1494): pid=5035 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:01.123913 kernel: audit: type=1006 audit(1734055381.115:1495): pid=5035 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Dec 13 02:03:01.115000 audit[5035]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff1129a2d0 a2=3 a3=0 items=0 ppid=1 pid=5035 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:01.130534 kernel: audit: type=1300 audit(1734055381.115:1495): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff1129a2d0 a2=3 a3=0 items=0 ppid=1 pid=5035 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:01.130598 kernel: audit: type=1327 audit(1734055381.115:1495): proctitle=737368643A20636F7265205B707269765D Dec 13 02:03:01.115000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:03:01.125000 audit[5035]: USER_START pid=5035 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:01.136394 kernel: audit: type=1105 audit(1734055381.125:1496): pid=5035 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:01.136443 kernel: audit: type=1103 audit(1734055381.126:1497): pid=5037 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:01.126000 audit[5037]: CRED_ACQ pid=5037 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:01.273849 sshd[5035]: pam_unix(sshd:session): session closed for user core Dec 13 02:03:01.273000 audit[5035]: USER_END pid=5035 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:01.276322 systemd[1]: sshd@25-10.0.0.73:22-10.0.0.1:50038.service: Deactivated successfully. Dec 13 02:03:01.277023 systemd[1]: session-26.scope: Deactivated successfully. Dec 13 02:03:01.277547 systemd-logind[1189]: Session 26 logged out. Waiting for processes to exit. Dec 13 02:03:01.278507 systemd-logind[1189]: Removed session 26. Dec 13 02:03:01.273000 audit[5035]: CRED_DISP pid=5035 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:01.284586 kernel: audit: type=1106 audit(1734055381.273:1498): pid=5035 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:01.284642 kernel: audit: type=1104 audit(1734055381.273:1499): pid=5035 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:01.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.73:22-10.0.0.1:50038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:03.706262 kubelet[2064]: E1213 02:03:03.706227 2064 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Dec 13 02:03:06.280138 systemd[1]: Started sshd@26-10.0.0.73:22-10.0.0.1:40982.service. Dec 13 02:03:06.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.73:22-10.0.0.1:40982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:06.281645 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 02:03:06.281772 kernel: audit: type=1130 audit(1734055386.279:1501): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.73:22-10.0.0.1:40982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 02:03:06.320000 audit[5072]: USER_ACCT pid=5072 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:06.321795 sshd[5072]: Accepted publickey for core from 10.0.0.1 port 40982 ssh2: RSA SHA256:x3bGe46DV3PhhP3e9zafVi+waO6W4gVuKhz8/ATtw3M Dec 13 02:03:06.323719 sshd[5072]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 02:03:06.322000 audit[5072]: CRED_ACQ pid=5072 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:06.328468 systemd-logind[1189]: New session 27 of user core. Dec 13 02:03:06.329079 systemd[1]: Started session-27.scope. Dec 13 02:03:06.331638 kernel: audit: type=1101 audit(1734055386.320:1502): pid=5072 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:06.331734 kernel: audit: type=1103 audit(1734055386.322:1503): pid=5072 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:06.335266 kernel: audit: type=1006 audit(1734055386.322:1504): pid=5072 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Dec 13 02:03:06.335347 kernel: audit: type=1300 audit(1734055386.322:1504): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8585f260 a2=3 a3=0 items=0 ppid=1 pid=5072 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:06.322000 audit[5072]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8585f260 a2=3 a3=0 items=0 ppid=1 pid=5072 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 02:03:06.322000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 02:03:06.342466 kernel: audit: type=1327 audit(1734055386.322:1504): proctitle=737368643A20636F7265205B707269765D Dec 13 02:03:06.342509 kernel: audit: type=1105 audit(1734055386.339:1505): pid=5072 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:06.339000 audit[5072]: USER_START pid=5072 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:06.341000 audit[5074]: CRED_ACQ pid=5074 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:06.350067 kernel: audit: type=1103 audit(1734055386.341:1506): pid=5074 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:06.466844 sshd[5072]: pam_unix(sshd:session): session closed for user core Dec 13 02:03:06.466000 audit[5072]: USER_END pid=5072 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:06.469351 systemd[1]: sshd@26-10.0.0.73:22-10.0.0.1:40982.service: Deactivated successfully. Dec 13 02:03:06.470537 systemd[1]: session-27.scope: Deactivated successfully. Dec 13 02:03:06.471257 systemd-logind[1189]: Session 27 logged out. Waiting for processes to exit. Dec 13 02:03:06.466000 audit[5072]: CRED_DISP pid=5072 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:06.472166 systemd-logind[1189]: Removed session 27. Dec 13 02:03:06.475899 kernel: audit: type=1106 audit(1734055386.466:1507): pid=5072 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:06.475977 kernel: audit: type=1104 audit(1734055386.466:1508): pid=5072 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Dec 13 02:03:06.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.73:22-10.0.0.1:40982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'